Font Size: a A A

Bmp Image-based Information Hiding Method

Posted on:2009-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y H TianFull Text:PDF
GTID:2208360245479589Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With fast development of computer technology , information processing technology , as well as the network communication technology , the problem of information safety is more and more necessary. Information hiding is used to convey information by making imperceptible changes to a host object. By embedding a secret message into a carrier stego-image is obtained. Steganalysis simply aims to identify the presence or absence of the secret message.In this paper, a series of problems about the data-hiding theory and specific techniques are proposed, studied, resolved and concluded. Many aspects are concerned, such as data-hiding algorithm, attack-analyzing, data-hiding capacity and etc. After making a deep research on bit-plane data-hiding algorithm, it is ameliorated consumedly.This paper mainly discusses two aspects of information hiding:1. An information hiding algorithm for images based on section is introduced. This paper firstly analyses the information hiding algorithm for images based on section, and indicates the limitation of the algorithm. Intenting to improving the capacity of information hiding, this paper used the method of permutation the information which to be hided stochasticly, chose location stochasticly to improve the algorithm.Throughing many testing,the statistic character of image changes more imperceptibility, it has nicer transparency and the resistance capability of attack is advanced.2. According to principle of lossless data-hiding,this paper advanced a new method of information hiding based on BMP images.This algorithm has doughty robustness and ability of resist analyzing of bit-plane, but the capacity is lower. Thus this paper selected proper image to improve it. The cryptic information can be distilled correctly though the carrier image be rotating, cutting or noising.This method achieving a good trade-off between embedding capacity and security.
Keywords/Search Tags:information hiding, bit-plane, lossless, attackdetection
PDF Full Text Request
Related items