Font Size: a A A

Study On Content-Based Information Hiding Algorithms Using Knight's Tour Transformation

Posted on:2007-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:J X XuFull Text:PDF
GTID:2178360182473185Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Currently, digital images are widely used as an information carrier in network. It brings us various convenience as well as a series of problem about information security. Moreover, traditional information security protection such as cryptography can not solve this problem. This paper mainly discusses the image information hiding technology. After introducing relative concepts and features about information hiding technology, this paper put forward a kind of information hiding algorithm based on image context which goes with knight's tour transformation. This algorithm takes advantages of several hiding features, combines global image characters with knight's tour transformation and automatically hides secure information in the boundary of digital image. Furthermore, this paper also does some meaningful exploration with some unmentioned characters. Since this algorithm needs to frequently invoke the procedure of initializing knight's tour transformation metric to form some different knight's tour transformation metrics, the complexity of knight's tour transformation metric proceeding has great affection on the total performance of the whole algorithm. Hence, this paper brings forward a new type of knight's tour transformation algorithm and downward the complexity of circuit metric proceeding by doing quantity of experiments. In order to improve the quality of this paper, we concern with some image pretreatment technology such as chaos system based on logistic mapping. The last part of this paper does a considerable research about the total capacity of information which hide in color image. The information hiding algorithm based on context involves the knight's tour transformation and automatically hides the secure information in the surrounding zones of boundary of the digital image. The series of experiments show that this algorithm improves the security of information hiding system, boosts the total capacity of hidden information and enhances the defense ability of anti-consequence attack as well as anti-channel attack.
Keywords/Search Tags:Image boundary, HVS, KTT, hiding information
PDF Full Text Request
Related items