Font Size: a A A

Research And Application Of ECC And Image Hiding In Secure Transmission Of Confidential Documents

Posted on:2011-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:K P XuFull Text:PDF
GTID:2178330338976312Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the army information construction, information technology in the military application has got increasingly widespread, and information transmission through the network has gradually become the major means of the communication. At the same time, information security is becoming increasingly prominent, however, traditional encryption hardly deal with this problem. Therefore the paper proposes a system model for secure transmission of confidential documents based on elliptic curve cryptography and image hiding, moreover, studies the key technology of the system.The main research contents and originality of this paper can be summarized as following:(1) The paper studies the implementation of elliptic curve cryptography and algorithms related, focusing on research of scalar multiplication. According to the idea of trading inversions for multiplications, the paper proposes two efficient algorithms to computer 5P and 5k P directly over finite fields in terms of affine coordinates, moreover, applies the two algorithms and other existing fast algorithms to elliptic curve fast scalar multiplication combined with multibase chains. The experimental results show that the proposed method is faster than traditional methods.(2) An adaptive color image hiding algorithm based on properties of human visual system is proposed, which can regulate embedded strength with cover image characteristic adaptively. The experimental results show that the algorithm has large hiding capacity of information and maintains good visual quality of stego-image.(3) According to varying degrees of human eye retinal cone cells to the perception of red, green, and blue, the paper proposes weighted root-mean-square error and weighted peak signal-to-noise ration to assess 24-bit BMP stego-image quality. The proposed method is effective, easily mounted, and meets human visual characteristic.(4) Confidential documents security transmission system is designed and implemented. The system combines elliptic curve cryptography with image hiding technology, and implements functions of security parameters selection, encryption, decryption, information hiding and extraction, which can effectively ensure that confidential documents transmit securely.
Keywords/Search Tags:elliptic curve cryptography, scalar multiplication, image hiding, human visual system, LSB, adaptive
PDF Full Text Request
Related items