Font Size: a A A

Based On Phone Microblogging Covert Communication Technology Research

Posted on:2013-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhaoFull Text:PDF
GTID:2218330371459772Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
It's the general principle of the information hiding technology and application to implement covert communication by mainstream internet applications. Implementation of covert communication based on the microblog application has the following advantages: freedom of carrier choosing, better steathiness, higher anti-forensics ability etc. In the thesis, Sina microblog is taken as the public communication channel the image steganographic algorithm adequate for JPEG images in microblog messages is studied, and the covert communications software based on Android mobile operating system is developed.The main contributions of the dissertation can be included as:(1) The basic concepts, characteristics, state-of-art and the advantages about image steganography are introduced. The development trends of covert communication and the advantage of covert communication based on microblog messages are expounded.(2) With Sina microblog as the public channel of covert communication, the image processing operation after uploading onto the Sina's figure sever are thoroughly analyzed. The current master JPEG steganographic algorithms are summarized and the key robustness enhance manners are generalized. At last, the JPEG steganographic algorithm based on error correction codes, syndrome coding and embedding with distribution persevering is proposed.(3) Based on Android mobile operating system, the microblog covert communications software is designed and implemented. The software implements covert communication via microblog which can embed secret information in the process of sending a message with pictures and extract the secret information after the pictures are downloaded.(4) Each functional module of the microblog covert communications software is tested to verify the validity of our scheme and development.Finally, a summarization of the dissertation is given and the future work is prospected.
Keywords/Search Tags:Information hiding, JPEG image, Mobile microblogging
PDF Full Text Request
Related items