Font Size: a A A

Research And Application Of Coverless Information Hiding Algorithm Based On Image

Posted on:2021-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:H Y DengFull Text:PDF
GTID:2568306461952749Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology,it has been used widely in medical,military and judicial fields.More and more individuals and organizations are using the Internet to transmit data,which contains a lot of secret information.However,technology is a double-edged sword.Advanced information technology can also be used by information thieves to steal users’ secret information.Frequent information leakage events makes the public pay more attention to information security.In the past,the mechanisms of resolving secret information leak were based on cryptography.But data encryption based on cryptography just encrypts the data into unreadable ciphertext,which is more likely to attract the attention of data attackers,to find ways to decrypt the ciphertext.In contrast to encryption,information hiding algorithm turns "incomprehensible" secret information into "invisible" secret information.However,the traditional information hiding algorithms need to modify the carrier,which undoubtedly leaves traces for steganography tools.In order to solve this problem,the concept of coverless information hiding is proposed.The existing coverless information hiding algorithms are less robustness and the information capacity is low.In view of the above background,this paper proposes a coverless information hiding algorithm based on the cover image,aiming to improve the robustness of coverless information hiding algorithm and increase the information hiding capacity.The main work of the paper is as follows:(1)Chapter II emphatically analyzes the relevant technologies of existing coverless information hiding algorithms,summarizing the hiding methods based on "mapping",and making the further research with this idea.At the same time,the basic knowledge of information hiding and algorithm evaluation criteria are introduced.(2)A coverless information hiding algorithm based on the Most Significant Bit(MSB)of image is proposed in chapter III.First of all,the secret information is compressed by Run Length Encoding(RLE),reducing the amount of secret information that needs to be sent.Then,according to the Matching Key(Km)decided in advance by the communication parties,MSB of each cover image block is used to match the secret information,and the Flag Key(Kf)is output,completing the process of information hiding.The receiver needs to combine the Kf and the Km to extract the secret information from the stego image completely and accurately.Experiments show that the algorithm has the characteristics of higher security,stronger robustness and larger information hiding capacity than the existing information hiding algorithm.(3)In order to meet the increasing demand of image privacy protection,chapter IV proposes an coverless information hiding algorithm based on image to protect secret images.Experiments show that the algorithm proposed in this chapter can recover the secret image accurately.Compared to the similar method based on coverless information hiding algorithm,the algorithm proposed not only has a better quality of secret image recovery,but also has a slight advantage in information hiding capacity.
Keywords/Search Tags:Coverless Information Hiding, Most Significant Bit of the cover Image, Gradient Direction of the cover Image, Run Length Encoding
PDF Full Text Request
Related items