In recent years, with the rapid development of computer technology and the Internet technology and applications, data exchange and transmission become more and more convenient, and play an increasingly important role in many aspects such as political, economic, financial departments and others. However, the ensuing information security issues have become increasingly prominent while the information is faced with the possibility of theft and tampering all the time. In some special applications, such as national security agencies, intelligence and defense military and other security services, the information security becomes extremely important. Therefore, how to effectively ensure the confidentiality, integrity, availability, controllability and non-repudiation of digital information needs to be addressed urgently in the current network information security technology research. Encryption and decryption of information technology is the traditional way to solve such problems, but it is inherently defective. Information hiding technology as an effective means to solve such problems emerges, and has become a hot topic within the field of information security, which gains more and more attention of researchers.The system based on the information security issues of network, takes advantages of the traditional information encryption and decryption technology and information hiding technology. The system achieves information hiding and safely transferring in a specific environment, or some specific application, which makes the information to be transmitted unintelligible and invisible, thus maximizing the security of information.The system mainly includes the sending and receiving ends, which is built with C#language and SQL Sever2008database management system for the development platform. On the sending side, selects an image as carrier information, while the information to be transmitted in the form of text and file information is first chaotic encrypted or DES encrypted. And then hides encrypted information in the carrier to form a synthetic image based on LSB information hiding algorithm. At the receiver, the corresponding encryption information is extracted from the received synthetic image through corresponding algorithm, and the original information will be restored by the corresponding decryption algorithm.The security of the system is ensured by MD5encryption of the legitimate user login information. In order to facilitate information transferring between users, the system uses the P2P network transmission way. The system which makes use of a variety of information security technology has friendly interface and easy to be operated and has certain practical value and development prospects in particular fields. |