Font Size: a A A

A Research Of Steganography Approach Combined With HVS

Posted on:2011-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:L J K E B GuFull Text:PDF
GTID:2178360305489385Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, information processing technology and network communication technology, information security technology is constantly updated and improved. Information hiding technology, as an important information security technology, uses the human visual masking properties and inherent redundancy of digital image signals, to hide the secret information into the carrier images, and then pass the secret information by transporting the carrier images publicly. Information capacity is the most critical problem in information hiding technology research. However, so far, there is no theoretical method of precise calculation about how much information can be hidden in certain of information carriers.Biometrics technology, which is an essential identification tool in the era of network and information, has become popular and cutting-edge research at home and abroad. Furthermore, the palmprint identification is a new method of the biometric identification technology, and its theoretical and applied research has been paid attention from multi-branch. Palmprints can be used as the identity of the unique identifier for properties of uniqueness and invariance.This paper first summarizes the research background of the information hiding technology and research situation at home and aboard. Then the basic concepts and framework of digital watermarking and steganography are introduced in detail. And we discuss the characteristics of human visual system which is superior in digital steganography, which the digital image is treated as the carrier. After digital steganography methods are studied further, for information capacity issues in this paper, a large-capacity steganography method combined with human vision characteristics (for biometrics identification) is proposed, in which discrete cosine transform (DCT) and PCA are applied. We complete the task that the multiple palmprint images hidden in an open- transmission carrier image, and achieve secret communication in order to avoid the attackers' attention. Extensive experiments prove the differences between the digital watermarking and digital steganography.
Keywords/Search Tags:Digital Dteganography, Biometrics Technology, HVS, DCT
PDF Full Text Request
Related items