Font Size: a A A

A New Information Hiding Algorithm Design Study

Posted on:2014-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:L K B K M S TeFull Text:PDF
GTID:2268330401964365Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communication technology, multimedia technologyand computer network technology, people are faced with information security issueshave become increasingly prominent. Information security related to the country’spolitical, economic, military, cultural and many other aspects related to the security andstability of the country, the information security technology has drawn increasingattention of Governments and research institutions.The QIM technology is its simple, anti JPEG (Joint Photographic Expert Group) isa lossy compression performance and good features and is very suitable for theapplication of information hiding aspects. However, based QIM digital steganographytechniques but there is a big security risk, making them vulnerable to attack. In thispaper, these security issues, a lot of analysis of experiments, suggested a solutionmethod. In this paper, digital steganography algorithm containing dense carrier storageand environmental factors should be fully taken into account, the security of thealgorithm fully understand and utilize the information on the environment based onideology, and be reflected in algorithm design, and a large number of experiments tovalidate. Meanwhile, in order to improve the speed of candidate vector library screening,a simple and rapid screening algorithm. The algorithm can be quickly and accurately inaccordance with the the requirements of the embedding algorithm filter out imagesavailable. Moreover, the adjustment method of the image blocks of the originalalgorithm improvements, reduce the effects of sub-block containing the encryptedimage, to improve the sensory containing dense image invisibility. Finally, increasespretreatment steps to embed secret information with the image of the carrier before thetransfer, both to improve the visibility containing the secret vector images statistics donot, they have maintained a good anti-JPEG compression performance.This article briefly describes the history of the development of information hiding,characteristics, classification, applications, information hiding technology andcryptography relationship, Research. Has introduced and analyzed hidden knowledge oftechnology-related human visual and digital image. And focused on the realization of the process based on airspace LSB information hiding technique. The combinationaccording to the characteristics of human visual image block with the pseudo-randomnumber to determine the hidden bit two airspace based on color image informationhiding.Constructed in accordance with the proposed algorithm, a static digital imagesteganography prototype system. The system could provide a masking media library,the candidate vector library, such as a key information, the secret information isembedded into a static digital image, and a variety of attacks that can be simulated forthe QIM algorithm, to detect the reliability of the algorithm and anti-attack.
Keywords/Search Tags:information security, information hiding, steganography the quantitative, index modulation, JPEG lossy compression
PDF Full Text Request
Related items