Font Size: a A A

Analysis Of Batch Steganography And The Steganographic Secure

Posted on:2013-10-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y L WuFull Text:PDF
GTID:2248330371468389Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In recent years, with the popularity and the rapid development of internet technology,electronic commerce, government affairs, military industries and other domains have alsoobtained spans development. The government, enterprises and various organizations generallyto construct their own channel to transmit the open or secret information. The open Internetpublic information platform of digital information to facilitate a timely manner to spread, butthe security of the data information also caused major user’s concerns, secret informationsecurity problems have become increasingly prominent.Along with the development of science and technology, in the cradle of products of newage in which the digital, computer, network and so on, based on information theory, themathematical statistics theory, cognitive psychology and modern information technologymeans, new steganographic methods arises at the historic moment, as an important part ofinformation hiding, also is the important way to realize the concealed communication.Through guaranteeing secret information does not cause the attacker’s attention, to reduce thepossibility of infringement, making up the fatal defects of password technology. Based on theanalysis of the model’s steganographic capacity and security, combined with digital imagetransformation diversity and batch steganographic system, constructed a image transformationmodel of zero-batch steganography, and then proposed the security steganographic schemewithout carrying secret information, to a certain extent, increase the embedding capacity,enhance the secret information security. The main contents of this paper are as follows:1. Based on batch steganography, proposed a secure steganographic model for batchsteganography which conformed to the absolute safety definition for limitations of singlecarrier steganographic small capacity and low safety. From the viewpoint of the informationtheory proved the safety of the model under certain constraint conditions. The experimentalresults and analysis results show the validity of the model, and applied to the image concealed communication.2. Traditional steganographic model recovery stego images much need the help of thecarrier image, and in depth analysis of digital image structure and image transform principle,using the image transform algorithm to deduce the secret information, constructed asteganographic model for carrier image did not carry the secret information.3. Based on the Bernstein polynomial transform, Frobenius number problem and theremaining two theorems in combination with Rabin cryptosystem algorithm realization ofcarrier image sharing, after the pretreatment of secret information to use 2 model embeddedsub images. Realization of image sharing and steganography organic combination, increasedthe capacity of steganography and improved the security of secret information.4. Based on the type of image conversion, the features of gray value changes for grayscale images, proposed a batch model of zero steganography which gray scale images did notcarry secret information. Combined with batch steganography and the characteristics of grayimage, firstly selected a number of cover images, through a particular transformationalgorithm for carrier image transforming, and then found out the correlation of pixelinformation between secret image and new images, finally reverted new images to its originalfor transmission.
Keywords/Search Tags:batch steganography, zero-steganographic model, carrier sharing, graphic transform, algorithm deduction, security
PDF Full Text Request
Related items