Font Size: a A A

Research And Implementation Of Information Hiding Based On Real-time Voice

Posted on:2013-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y GaoFull Text:PDF
GTID:2248330362963704Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Information Hiding is a new technology to preserve confidential information. But it ismuch different from encryption technology. Nowadays, the infrastructure of Internet is gettingbetter and better. Application of real-time voice is growing fast. Real-time voice gets a lot ofsignificant advantages. Firstly, on account of immense data flow it can carry large-scaleconfidential data in transmission. Secondly, the data of real-time voice generate and transferimmediately. The data of real-time voice would be abandoned when we extracted theconfidential data from it. Therefore it is having lower chances for confidential data beingexposed and makes the confidential data safer. To sum up, those advantages attract researchersgive attention to real-time voice.This paper focus on information hiding based on real-time voice. Below are the mainworks to be followed.(1) In order to improve the security of confidential data this paper analyzes the features ofLSB matching and optimized this algorithm to make the histogram of cover data less changeafter embed confidential data.(2) This paper also designed a transmission model which base on UDP to ensure thereliability of confidential data in transmission.(3) Build a information hiding system that based on real-time voice. Friends can talk witheach other through this system while in the same time the data of secret file will be embed invoice and then transfer to the other side. This system reveals good performance as well assecurity in file transmission, which makes it applicable to the transmission of sensitiveinformation for individual users.In summary, the reliable confidential data transmission model and new LSB matchingalgorithm can enhance the security of confidential data in real-time voice transmission and give the capability to ensure the reliability of confidential data.
Keywords/Search Tags:information hiding, real-time voice, LSB, reliable confidential data transmissionmodel
PDF Full Text Request
Related items