Font Size: a A A

Research And Application Of Information Hiding And Detection Techniques

Posted on:2007-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:D HuaFull Text:PDF
GTID:2208360182966618Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Steganography may cause the secret or restricted data through ordinary carrier such as text,image,audio,video to cross the firewall system easily.Therefore in the examination network tranmits whether the iamge document does include the hidden information regarding the maintenance network security,prevent the unlawful element divulges a secret using the network,has the extremely vital significance regarding the maintenance network security. This article emphatically has conducted the research to the text and the image steganography,based on these algorithms,we produced algorithms to analysis them.In the last section,introduced a system which can detect the images transfers on the internet.There are six chapters in this article.Chapter 1 introduces the concept of steganography and steganalysis,application background,after the key question of steganography and steganalysis,draws out the goal whick the selected topic of the direction and the goal the paper must realize.Chapter 2 mainly introduced the technology of steganography,sets the request of steganography,and based on the characters,and then the current steganography technologies was summarized.Chapter 3 is the key content of this article.First theoretically classifying introduced the weakness of steganography,then the possible analysis method was given out.Chapter 4 introduces the model of the project,and the detect result was given out.As the last part of this article, we draw our conclusion ?...
Keywords/Search Tags:steganography, steganalysis, detect ratio, false positive
PDF Full Text Request
Related items