Font Size: a A A

Research Of Information Hiding Algorithm Based On Cascade Spatiotemporal Chaos

Posted on:2008-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:C X ZhaoFull Text:PDF
GTID:2178360245479841Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
The 21st century is the era of information technology. Information technology is a powerful impetus for the development of science, education, industrial production, as well as the national defense and so on. It greatly improves the openness of the modern civilized society and the human life. When it brings great convenience for human life, information security has increasingly become an urgent problem at the same time. It has become a major topic to ensure the security of information and to transmit the information safely and effectively. Information hiding which is a new information security technology has been extensively applied in copyright protection and concealment communication. It has become a hotspot in the field of information security. How to deal with the relations of the imperceptibility, robustness and capacity of the information hiding, especially to design the information hiding algorithm with better performance has become the emphases of the research. This paper focus on the information hiding which is based on the cascaded spatiotemporal chaos and the security network card based on the information hiding techniques, the following are the two main points:(1) A DCT information hiding algorithm which is based on the cascade spatiotemporal chaos encryption is presented in this paper. The algorithm uses the double-way CML as the spatiotemporal chaos model, and constructs the cascaded spatiotemporal chaos system through cascading the spatiotemporal chaos. It adopts meaningful binary image as secret message, uses the three-tiered cascaded spatiotemporal chaos to generate chaos binary sequence, and encrypts the secret message as a pretreatment with this sequence, and then embeds the secret message which has been pretreated into the DCT coefficients of intermediate and low-frequency of the carrier images. Lastly, makes an analysis of the results of the imitated experiment to prove its feasibility. And the experimental shows the robustness of this algorithm.(2) This paper presents a design of security network card which is based on the information hiding technology. It introduces the IPSec technology briefly, analyzes the function and hardware structure of the network card deeply, and then gives an improvement of the IPSec technology. According to the above contents, the implementing scheme of security network card, which includes implementing the information hiding function and part of the encapsulation function on the hardware of the network card, and implementing the IPSec basic function, the negotiation and management function of SA and key in the network card driver are presented. The function flow chart is given, and the processing of the inbound and the outbound data via the security network card is analyzed.
Keywords/Search Tags:Information Hiding, CML, Cascade Spatiotemporal Chaos, DCT, IPSec, Security Network Card
PDF Full Text Request
Related items