Font Size: a A A

Steganography Based On Statical Analysis

Posted on:2011-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:S Z DaiFull Text:PDF
GTID:2178360308461427Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the continuous development of Internet technology, the society of human-beings stepped into the age of information.From the prospect of world,the information has become the strategic resource of political, economic, military, science and technology,information security research is the basis for the protection of information resources.At meanwhile, multi-media technology and the widespread use of optical communication technology makes the transmission methods of message have been increasingly diversified.The research of information security based on multimedia has been a hot topic of current researches.At present, there are mainly two branches of information security research based on digital pictures, which are watermarking and steganography.The former focuses on the use of detection of the image contents of digital watermarking for digital images to achieve copyright protection;while the latter focuses on the use of digital images of this vector, the concealment of information transmission, to achieve the purpose of covert communication of information.This paper analyses the theory of modern information hiding system first,especially the trade-off relationship between the robustness and security of the system.Then a design method was proposed by this paper based on the research of human visual system. Based on JPEG image compression algorithm,this paper analyses how to hide information effectively through embedding information into DCT coefficients of intermediate frequency.With the result of researching upon, a statistical information hiding method was proposed through the judgment factor and judgment gate which were set in advance.The algorithm can successfully achieve steganography under the premise of invisible information hiding. The experimental results show that this algorithm can effectively resist statistical analysis and other physical attacks on hiding while maintains good picture effect.
Keywords/Search Tags:DCT, decision gate, decision factor, robustness
PDF Full Text Request
Related items