Font Size: a A A

Theory And Algorithm Research About Information Hiding And Steganalysis

Posted on:2007-06-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:N JiangFull Text:PDF
GTID:1118360185467809Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of digital technology and networking technology, people would quickly and easily communicate with each other through the network. Solving the correlative problems, such as copyright protection, intergrality authentication, privacy communication and etc., is becoming more and more urgent. Information hiding can solve these problems. It has two branches: digital watermarking and steganography. Digital watermarking is used main for copyright protection and intergrality authentication. Steganography is used main for privacy communication. At the same time, in order to protect the national security, steganalysis is developed gradually.This dissertation systemically researches the theory and the algorithm about information hiding and steganalysis. It is sponsored by the National Grand Fundamental Research 973 Program of China (No. TG1999035804), the National Natural Science Foundation of China (No. 60473016) and the Graduate Students Innovation Foundation of BUPT. The main work is as following:1. Designs three different digital watermarking algorithms for different application environments. The first algorithm is named self-adaptive HSI robust color images algorithm. It transforms images into HSI color model and gains the just noticed difference using the characteristic of human visual system. The second algorithm is called high robust images algorithm. Using the geometric invariable region, it can resist zooming in two rates of length and width, basic circumvolving, filtering, adding noise, format changing and etc. The merits of the algorithm also include: a) the hiding rate is very high; b) blind extraction; c) bits error rate is zero. The third algorithm is called...
Keywords/Search Tags:Information hiding, Robustness, Capacity, Imperceptibility, Security, Steganalysis
PDF Full Text Request
Related items