Font Size: a A A

Double Sorting Cross-correlation Subsequent Trees Of Text Information Hiding Technology Implementation

Posted on:2013-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2248330395450463Subject:Computer technology
Abstract/Summary:PDF Full Text Request
This is an era of information explosion. With the rapid development of Internet technology, a variety of information through the Internet is expanding at an index level, people daily through the Internet to transmit information in the format of text, images, audio, video, etc. Therefore, the message of security has been more and more attention. People through various ways protect their own message on the Internet. Currently, images, audio, video and other multimedia carrier in the spread of the Internet protection has been made very big progress, image, audio and video carriers can add a certain amount of information, to protect the carrier, in particular, the copyright of the carrier.However, with the development of the network, it was discovered that the information disseminated on the Internet, the more is spread by the format of text. Information hiding technology of the text as a carrier, relatively speaking, is relatively small, and relatively immature, Due to the particularity of the text, the text carrier are generally relatively small, the text generally have a unique immutable code, want to hide information not to be found in a smaller carrier, and can be attacked, is still able to provide hidden information, the difficulty becomes very large. Currently, the main text-based information hiding techniques, usually by a certain amount of information hidden in the text formatting information, in order to achieve the purpose of information hiding. However, the text information is not dependent on the format of the text, often by a simple copy and paste format to hide the information, will be able to hide completely erase, so this is a very unstable information hiding. This paper introduces a new zero-hidden information hiding technology, it does not changes the carrier, the carrier and hidden information separate pass, which is the successor tree of a dual sort interrelated by the carrier to create for each other associated successor tree, the establishment of a successor index of the carrier, and index the content and hidden information were combined to create a hidden text, and through the encryption of the RSA algorithm, and then passed through the network process. The IRST hidden information in the restore process, you need to use the RSA decryption algorithm and get the hidden text and vector combination of re-create the hidden information of the original process.IRST-based information hiding technology advantages:zero information hiding, the carrier does not modify any content, the carrier can be passed in the Internet; completely abandoned the carrier information hidden in public information, a separate spread of hidden information; information hiding a large amount of hidden information capacity does not depend on the size of the carrier; strong anti-attack capability, the information is not hidden in the carrier, carrier change will not result in changes of the hidden information.Shannon entropy to the implementation of copyright protection, we use the vector construct weak watermark, use the carrier of the feature vector set for strong watermark, played the role of copyright protection.
Keywords/Search Tags:IRST, Information Hiding, RSA encryption, strong watermark, weak watermark
PDF Full Text Request
Related items