Font Size: a A A

Research And Realization Of An On-Line Communication System Based On Steganography And Imdividualized Encryption

Posted on:2006-10-18Degree:MasterType:Thesis
Country:ChinaCandidate:B Z RenFull Text:PDF
GTID:2168360155460001Subject:Transportation planning and management
Abstract/Summary:PDF Full Text Request
Along with the rapid development of Internet and advance of the digital techniques, the application of information exchange has been used widely on the computer network. Based on this, information-hiding and information-encryption nowadays have become hot research fields due to the further study and the enhanced idea of network information security.Information-hiding, which is steganography or data hiding, is a new field based on the encoding methods and information theory. In this paper a communication system being researched and being designed is a steganography system by using information hiding technique and secret keys exchange mechanism of Individualized encryption. A realized scheme of information hiding technique is that a secret message is embedded into a JPEG image' s DCT coefficients in the processing of JPEG encoding. For the information security of the communication system, the digital signature and the secret keys exchange scheme is adopted. In the paper, we design a random key generator and a secret keys exchange scheme, and the latter is realized by using the individuation encryption. In order to protect the integrality of the message, the method of digital signature is adopted. By using those methods, the communication system' s security is boosted. And in the paper we give some analysis of information theory about the information hiding based on JPEG image as a cover image. The paper presents some methods of enhancing network security and steganography of JPEG image embedding secret messages.In the paper the realization of communication system proves that the scheme of steganography system has a very good performance at camouflage and no-juggling secret messages based on a JPEG cover image. The method of embedding secretmessages is strongly undetectable and robust.
Keywords/Search Tags:Information Hiding, Steganography, Individualized Encryption, DCT, Key Exchange
PDF Full Text Request
Related items