Font Size: a A A

Binary Image Information Hiding Algorithm And Its Application In Electronic Document Authentication

Posted on:2013-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:F WangFull Text:PDF
GTID:2248330374989197Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The development of Internet and technology of computer takes the convenient on transformation and processing of information, meanwhile, it also brings the threats on security of digital media. The information hiding technique which acts as an effective method to protect the security and integrity of digital media becomes a research hotspot in the field of information security at present. By using the insensitivity of the human sensory organs and the redundancy of digital media to hide the existence of the information, the information hiding technique ensures the hidden secret information not be noticed and destroyed by attacker.This dissertation focuses on the study of information hiding in binary images, including the scheme of information hiding in binary images and its application in electronic document authentication. The summaries and analyses of the theory and superiority-inferiority in image quality, embed capacity, robustness, etc. on some typical algorithms are finished firstly. Then, based on the characteristics of binary image, an algorithm of data hiding in binary images which acts on the parity matrix is proposed. In this algorithm, the original image is blocked twice, and the sign matrix is used to check the embeddability of block, the information is embedded by changing at most one value of the embeddable block. Our experiment results show that the present algorithm has the properties of excellent image quality, fewer pixels change, and larger embed capacity. Thirdly, a scheme of electronic document authentication. based on the above algorithm is proposed in the present paper. In this scheme, the abstract values of electronic document are hided in the binary image which have the characteristics of script, and then used by receiver to check the integrity of electronic document. The program of the embedding hidden information in the electronic document and the program of verification are introduced, and these programs are easy to implement. Finally, the embedding capacity of hand written signature image is analyzed, and by enlarging the signature image and checking the cyclic redundancy of abstract, the effect of scheme is also improved.
Keywords/Search Tags:information hiding, binary images, electronicdocument authentication, handwriting signature
PDF Full Text Request
Related items