Font Size: a A A

Study On The Steganography And Its Applications

Posted on:2003-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:X T FuFull Text:PDF
GTID:2168360062975012Subject:Cryptography
Abstract/Summary:PDF Full Text Request
This paper presents some research results in Steganography. The fundamentalconcepts, research background and on going research is introduced; The commonterminology in this field are defined, and classifies different steganography systems;Then the security issue involved in steganography system is further analyzed, and givesexamples of possible attack types. The relationships between digital signaturetechnology and information hiding technology are also discussed, that is, the researchon subliminal channel technology. Finally, four improved steganography schemes havebeen bring forward. Also provided are in-depth discussions of their respective security.The main contributions of this paper are:1.Based on the proofs given in [5], ordinary steganography system is insecure. In thispaper, a new model of steganography scheme is established; the security is not onlyensured by the selection of embedding function, but also in the whole hiding system.2.Observing the problem that the communicating parties aren't always able to share apredetermined secret key, an improved steganography scheme is brought forward. Inthis technique, at the beginning of the communication, the communicating parties areable to generate a secret key shared only by the two of them.3.Based on the idea of threshold, a new scheme of steganography is discussed. In thisscheme, even some data is lost during the communication, secret communication can bestill succeed if the receiver is able to get enough embedded information (more than thelow limit in the threshold method).
Keywords/Search Tags:Steganography, subliminal channel, Information-hiding, cryptography.
PDF Full Text Request
Related items