Font Size: a A A

Research And Application Of Pseudo-information Detection Technology Based On Information Hiding

Posted on:2019-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y XueFull Text:PDF
GTID:2348330545493306Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network and communication technologies,camouflage means are becoming more and more hidden and complex,the incidents posing as illegal activities by individuals and enterprises have occurred from time to time,the mutual authentication of communication parties has become a hot issue.In the existing instant messaging interaction scene,there are two kinds of interactive means: text and voice.This paper proposes a steganographic algorithm in instant messaging with high security,which provides the basis for mutual authentication and information authenticity detection in the communication process.The main work of this article is as follows:(1)The current covert communication algorithm for instant messaging is analyzed,and the shortcomings of existing algorithms are summarized.Mainly in the process of textual information hiding,the embedded capacity is low,the robustness of the carrier is poor,and it is vulnerable to replay attacks.However,the audio files have poor imperceptibility,and the decryption key cannot be securely transmitted through open channels.(2)Based on the problems of poor robustness and low embedded capacity in text-based communication,a steganography scheme based on interjection and expression sets is proposed.The program encodes the collection of interjections and expressions and elements,and uses the interjection and the expression to be placed before and after the text or the text information is displayed on the branch line to construct the steganographic space,thereby improving the embedded capacity and robustness of the system.Through theoretical proof and experimental analysis,the algorithm has good imperceptibility and security.(3)Aiming at the communication method that can be sent after recording in voice communication,an information hiding algorithm that embeds the verification information into the audio file is proposed.Through the change of the header file field in the audio file,the decryption key can be embedded in the additional information;the secret information is adaptively embedded in the data part of the audio file by the algorithm,so that the algorithm has a good imperceptibility and guarantees the algorithm safety.Both theory and experiment have proved its feasibility.
Keywords/Search Tags:Information hiding, Pseudo-information, Embedding capacity, Robustness, Imperceptibility
PDF Full Text Request
Related items