Font Size: a A A

The Research On Text Information Hiding Technology

Posted on:2011-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:G LiFull Text:PDF
GTID:2178330332481635Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Information Hiding as a technology both old and young, has become an important part of the field of information security, and it is an urgent need to address a way to transmit secret information security in modern society. As a cover a wide range of science disciplines, involving perception science, information theory, cryptography and other disciplines, covers the signal processing, spread spectrum communications, image processing and other specialized technology research.In this paper, the theme of the text information hiding interdisciplinary research, a new method of protection of privacy and confidentiality.Articles by dialectical method of decomposition first and then integrated the whole system is divided into information and information into the process, of pretreatment process.Separately in the two processes work to improve the system robustness and transparency, and then design a comprehensive set of algorithms systems, and experiments to verify.Preprocessing in a text message, the article in-depth analysis of the specificity and sensitivity of the text information. This paper adopted as the text encoding, fault-tolerant control and text signals encrypted by means of the pretreatment. This paper presents an improved Unicode encoding, can solve a variety of character encoding issues, cross-platform performance is well. Text information hiding system, taking into account the similarity with the communication system, the text information hiding problem is equivalent to a digital communication model to application of digital communication signals encoded in error correction coding for fault-tolerant design to improve the robustness of the system; In this paper, a complex and chaotic encryption system, not only even if an attacker finds that cannot get information, while also avoiding fault-tolerant design with statistical regularity symbol of the state.In the information hiding process, the article analyzes and choose the best digital image as a carrier of hidden text. Because text information redundancy small, relatively general algorithm has large hidden capacity; In the Information hiding methods, This article uses the global Wavelet transform, avoid Visual effects on the block. Combined attack of use and optimize the central limit theorem. In the way of information hiding, Embedded not only in the low frequency sub-band information, but also in the high frequency sub-band multi-band embedded information, etc. Repeat embedded information to avoid a targeted attack; while secret information section, dispersed targets, to avoid the statistical analysis.Experiments show that the resulting vector image transparency is good, the algorithm system on common image processing operation has the strong robustness. For example:noise superposition, filtering and JPEG compression, etc. Especially in the know its attack which targeted embed and extract information in order to get the correct secret information. This algorithm system has a large capacity of information hiding, and the extraction process without the original image, it is a kind of Blind Information Hiding Algorithm.
Keywords/Search Tags:Text message, Information hiding, Text encoding, Error-correcting coding, Multi-band hidding
PDF Full Text Request
Related items