Font Size: a A A

The Improvement And Practice Of Image Hiding Based On (t,n) Threshold

Posted on:2012-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y MeiFull Text:PDF
GTID:2178330335464024Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Image hiding is a kind of information hiding technology. Compared with traditional cryptography which deals with important information through direct encryption, image hiding technology hides important information in the carrier images without changing the carrier images in appearance. Since cryptography is directly encrypting the important information, as a result, the important information is easily exposed. But the image hiding technology will not change the appearance of carrier materials which therefore is of more elusiveness.JPG is the most widely used image storage format at present. Nowadays, there are many image hiding technologies taking JPG as the object of study. They take advantage of some characteristics of JPG to achieve the hiding of images. However, many scholars have already worked out the corresponding attack techniques in allusion to the image hiding technologies which use JPG as the hiding carrier image.Considering the problems above, from the view of image hiding carrier, this paper has put forward a new image hiding method which uses FITS as the image hiding carrier. Compared with the ordinary JPG images, FITS has its particular open mode as a format used in astronomical data. Currently the attack techniques in allusion to image hiding technologies are basically in format of JPG. Therefore images with FITS as the image hiding carrier are apparently of incomparable security.In order to obtain better security, the image hiding program with (t, n) threshold would be especially adopt,which could store some target image information in n images with specific methods. So it is managed to recover the original image information as long as we get t or more than t pictures of the carrier image information. As a result, even if a few carrier images are lost or broken by attacks, we could still recover the original image information. And undoubtedly, the whole image hiding technology is of more security.In this paper, the extant hiding algorithm based on the usage of this technology in order to obtain better image hiding efficiency is also be improved. Meanwhile, the parity technology would also be bring in, just expecting a better image recovery effect.
Keywords/Search Tags:information hiding, JPG, attack technology, (t, n) threshold
PDF Full Text Request
Related items