Font Size: a A A

Theory And Method Of Data Hiding In Information Security

Posted on:2004-12-10Degree:DoctorType:Dissertation
Country:ChinaCandidate:X W KongFull Text:PDF
GTID:1118360095955227Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
The digital information revolution has brought profound changes into our society and life. The prevalence of digital media and Internet has generated great challenges as well as opportunities for innovation. Digital products copyright protection, information content security and security communication make information hiding that is a new science and art of information security field.As an effective technique used for convert communication and copyright protection, information hiding has drawn a lot of attention over the past few years in the field of information security.This thesis discusses the issues regarding multimedia information hiding theory and method for multimedia copyright protection and security communication. It also addresses copyright protection system of digital products, digital watermarking system, steganography evaluation and steganalysis.Based on the study of digital products distribution channel in the Internet as well as all participants' right and benefits, the paper analyses the functions of intellectual property protection departments, such as management, copyright organization, supervision and digital watermarking. A digital products copyright protection system model based on digital watermarking has been proposed as the final result of this part.In the robust digital watermarking systems part, a robust watermarking embedding mechanism and a watermarking detector based on minimum error rate are presented. Based on the robust watermarking model, a robust and blind watermarking scheme for print and scan images and a robust and blind watermarking scheme for image object are proposed.In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as PSNR and WPSNR are studied. Based on analysis local error that is introduced by embedding information, combining HVS, three objective perception evaluation method for steganography performance are proposed, which are based on Human Visual Systems and local statistic error distribution respectively.In the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented. According to the presented steganalysis model, a steganalysis method based on statistical filter and complexity is designed. Experimental results show that they can reveal the facts that there is information embedded in the image for general substitution systems.
Keywords/Search Tags:Information Security, Information Hiding, Digital Watermarking, Steganography, Steganalysis, Copyright Protection, Security Attack, Performance Evaluation
PDF Full Text Request
Related items