Font Size: a A A

Research On Information Hiding Schemes For Specific Carriers

Posted on:2016-02-10Degree:DoctorType:Dissertation
Country:ChinaCandidate:B FengFull Text:PDF
GTID:1318330482967101Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and digital electronic equipment, the Internet has become indispensable information transmission medium in our daily life. However, on account of the Internet is open network environment, a malicious attacker can use various illegal means to obtain the data and destroy the information transmission via the Internet. Especially if the transmitted text or image is the core data in the related field, then the loss or damage of information will cause incalculable consequences. Compared with traditional encryption methods, information hiding technology not only has important theoretical significance, but also has much practical application prospects. This paper introduced Information hiding technology in detail about the research background, significance and current situation of the development. And through its application in the text, bioinformatics and images, the information hiding technology and its important application has been researched deeply. The main research achievements were as follows:(1) Using characteristic based on lookalike traditional and simplified Chinese characters, we propose a novel method which realizes information hiding using lookalike traditional characters and simplified characters. For data transmission, text information hiding requires less storage space and smaller bandwidth and its application has obvious universality and universality. However, since the text information has lower redundancy, which may bring some difficulties when hiding the secret data. This paper uses lookalike traditional and simplified Chinese characters to simplify the embedding and extracting procedures and the experimental results proved the feasibility of the scheme.(2) In the data hiding schemes with DNA sequences, we put forward a novel method to implement information hiding with carrier DNA sequence based on the complementary nucleotides rules and the injective relationship based on the complementary rules and secret bits. And, using the changed distance bits between two nucleotide to represent the hidden secret data, then realized higher security and robustness compared with the traditional carrier of information hiding, such as text, audio, video and others. At the same time, our method is based on Shimanovsky's substitution method to realize data hiding scheme, so this scheme not only retains the advantage of substitution method of carrier DNA sequence length not changed, but largely reduced the rate of change of DNA sequence. The experimental results proved the feasibility of the scheme.(3) We propose a novel proactive secret sharing scheme by renewing the corresponding shadows periodically under the premise of never changing the shared secret. At the same time, expanding the proactive secret sharing technology in the field of image, a reversible proactive secret image sharing scheme in specific group is proposed. The scheme realized the protection of secret image with a long life cycle by renewing the corresponding shares periodically under the premise of never changing the shared secret image. Simultaneously, the scheme is based on the reversible (k, n)-threshold secret image sharing scheme. The scheme is also reversible which means it can reconstruct the image without loss. The experimental results can also prove the quality of the shadow image and the secret capacity is satisfactory.
Keywords/Search Tags:Information Hiding, Text Steganography, Secret Sharing, Secret Image Sharing, DNA
PDF Full Text Request
Related items