Font Size: a A A

Wavelet Transform Applied Research In Network And Information Security

Posted on:2005-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2208360122985599Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the wide application and the fast development of the computer and multimedia, people depend more on the computer. And the Internet has been an important spread means of the knowledge and economy time. The multimedia enrich the behaving of computer information, and it has become a signify part of the computer information. So how to protect the safe of the multimedia is eager. The multimedia usually contains more information and it is copied easily, so it is difficult that we protect the safe of the multimedia through encryption and its converse arithmetic. Just so, there are some new kinds of technology can protect the safe of theimultimedia in the digital world. Information Hiding is one of them.Wavelet is a useful analysis tool. It has gotten notable success. More and more scientists and investigators pay attention to wavelet in all kinds of fields and subjects. The digital image process on wavelet has been a hotspot in the study and application of wavelet.This thesis describes the development history and the basis theory of wavelet briefly. Then we introduce the conception and application of information hiding. And we explore the digital image process with wavelet. With the multi-resolution analysis of wavelet and the vision character of the human eyes we decompose the image inwavelet domain, which can get better image and is more robust than the arithmetic embedded with hid information in airspace. When the hid file is a image, common image process will affect the attracted information if we hide the hid image into the original image by its own scan order. So we scramble the hid image before it is embedded to the original image. Here we use the baker transposition to scramble the hid information to get better attracted image. The experiment result indicates it can get a invisible hid image and it is also robust through our arithmetic. With the integer wavelet transform to the original image we apply a general hid means in wavelet domain for all kinds of files especially for the executable files and text files. The result shows that we can get an invisible image.
Keywords/Search Tags:Wavelet transform, information safety, image hiding, executable files hiding, text files hiding
PDF Full Text Request
Related items