Font Size: a A A

Research Of Coverless Information Hiding Method Based On Emoji Image Set

Posted on:2021-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:S J ZhangFull Text:PDF
GTID:2428330605461519Subject:Engineering. Th
Abstract/Summary:PDF Full Text Request
With the advent of the 5G era and the exponential growth of big data,people's daily lives can no longer be separated from the Internet.However,at the same time,the rapid develop-ment of science and technology always brings information security issues.In recent years,telecommunications fraud has become commonplace.People's personal information in the fields of finance,education,medical care,travel,residence and emotions is constantly stolen,and confidential documents of businesses and organizations also have hidden dangers.Even the struggle for information security between nations has never stopped.Therefore,ensuring that information security is not violated is an important factor for maintaining social harmony and stability.With the change of communication methods and forms of communication,coverless information hiding technology has become one of the mainstream technologies of information hiding technology.This thesis is based on the chat habits of people in the instant messaging chat mode,using popular emoji emoticons as image carriers,and based on the emoji image set,to achieve the communication process without cover information hiding technology.The main work of this thesis includes the following aspects:(1)Observating people's habit of sending messages on social platforms in modern society,and putting forward emoji images as carriers,and using the encoding method of emoji images to establish the mapping relationship between emoji image sets and secret information.By hiding secret information in daily life in common emoji expressions,the carrier image is sent to the receiver to complete the transmission of secret information.(2)Analysing the Unicode encoding corresponding to the emoji image,finding the rules under the UTF-8 encoding mode,using the Logistic chaotic system to process the secret information,and adding the sort function to the secret information to convert the original confidential information into disorder preprocessing information.Then,based on the pre-processed information and UTF-8 encoding of emoji,a mapping relationship is established to complete the information hiding process.(3)An information hiding method based on the combination mode of text and expression image is proposed.Add emoji images without secret information before and after the carrier image,use the least significant bits of the text to generate positioning labels,and use the punctuation mapping table and the rules for adding and deleting spaces before and after the text to indicate the number of carriers and the length of the information,so as to achieve more safe and effective The purpose of transmitting secret information;(4)An application scenario based on social network environment is proposed.The purpose of transmitting secret information is achieved by the sender commenting on the posts in the social network;the reliability and concealment of the transmission are improved by count-ing the probability of the common friends of both parties in communication and the sender's comments on others.The receiver obtains the secret carrier by browsing the social network and obtains the secret information.This application scenario greatly improves hidden ca-pacity and efficiency;(5)Based on the two frameworks and algorithms of the two systems,this thesis implements and simulates the functions of the two systems and the scenario,and tests and analyzes the functions and performance of the systems.Judging from the results,the systems not only can complete the function of information hiding,but also perform well on security and robustness.
Keywords/Search Tags:Coverless information hiding, Emoji Unicode, Logistic chaotic system, Positioning label, Social network application scenarios
PDF Full Text Request
Related items