Font Size: a A A

Bmp File-based Information Hidden Three-dimensional Defense Research And Applications

Posted on:2009-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:D H LiuFull Text:PDF
GTID:2208360272491487Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the information age, a variety of multimedia information disseminated on the Internet. Being convenient and fast, more and more people choose the network as a means of transmitting information. however, the security threats in network such as computer viruses, hacker, and the Trojan horse request network to provide better security to protect the individual information and the government information to transfer and release safely(there were information security technology in ancient times, such as, classical cryptography, the network only strengthened the information security and information security technology to civilian areas, previously only used for national and military fields). Information security involves many areas, information hiding is a new field in information security, and is also an effective way to protect information security. As practical application of the digital watermarks perfects, the information hiding technology will play a greater role in people's lives. Therefore, there is practical value to research the hidden information.Based on the study of hidden information technology, the thesis analysis the digital image watermarking technology which is on the basis of the BMP image as the carrier. The main contribution in this thesis are the two following points:(1) The thesis studied the human visual characteristics and the idea of adaptive algorithm and designed adaptive watermarking algorithm based on the human visual characteristics and combined human visual model with image features. Though estimating size of the carrier capacity and length of secret information to choose a suitable hidden way, embedded information to the corresponding location of the image pixel color and made a reasonable improvement to the space LSB algorithm.(2) The thesis made a analysis and study to the data encryption technology and information hiding technology, though the combination of the data encryption technology and hidden information technology and the way of Rijndael encryption algorithm, the thesis made a pretreatment to the secret information. And introduced cryptography in the embedding algorithm. That is to say, though the use of embedded key and extract key to ensure information security to realize the three-dimensional defense of the information hidden.The algorithm uses the Visual Basic6.0 to program, and gives the process and the main code and analyzes the results. Experiment results show that, to a large extent, the algorithm eased the conflict among the invisible, hidden capacity and robustness. Finally, the thesis made a summary and prospect to the information hiding technology and gave further research items.
Keywords/Search Tags:Digital watermarking, Information hiding, Adaptive, HVS, Information security
PDF Full Text Request
Related items