Font Size: a A A

An Improved Least Significant Bit Information Hideaway Algorithm Research

Posted on:2014-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:B Q YuFull Text:PDF
GTID:2268330425958731Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Since in the1990of the20th century, with the rapid development of computer network technology, Governments, companies and individuals have used this open interconnection of public information network platform, build their own private network, passing their information. As the Internet becomes more widely available, the increasingly highlight the importance of information security, current computer research in the field has become the key point and the hot spot. In recent years, because to protected the digital product intellectual property rights and carries on the secret correspondence the special demand, the traditional encryption technology already cannot meet the current needs, the hiding technology because of The transparency and covert stronger arises at the historic moment.Information hiding is in copyright protection and encryption techniques do not apply to secret from areas such as communications. It hides the secret information in the carrier information, without disrupting the basic properties of vector information and value, carriers of the channels remain in the transfer of meaningful information, the third party is difficult to judge whether they contain secret information. Includes the secret information digital carrier signal with secret information provides the characteristics of perception and the original use value,is the highlight of it different from traditional encryption technology. Not only the information hideaway technology hide the secret information content, but also hide the secret information existence, therefore demonstrates the new vigor in the information security domain. In recent years, the information hiding already became in the information security domain the research hot spot, particularly in the military hiding correspondence, the digital product property right protection, the commercial bill really false and so on the domains had the widespread application prospect.Study on information hiding algorithms based on this article, for spatial characteristics of the robustness of least significant bit algorithm, proposed one kind of use logic relations realize the information hideaway method. The article improvement algorithm in the full research traditional LSB algorithm and LSB algorithm based on XOR operation foundation, Summarizes through enhancing the links between the low bits and high bits, and changing the location of the secret bit stream realizes the enhancement algorithm the robustness. Typically, each pixel in digital image was indicated by a byte. That random two bit four types in each byte combine (00,01,10,11), can express0,1,2,3low four bits of the image in bytes. The method is by adjusting the lowest two bits of the carrier image, which makes it the vector information represents a bit with a bit of secret information that is consistent to achieve the purpose of hiding secret information. Firstly, the improved algorithm used the Arnold transform scrambling secret information to enhancing the security of the information hiding. Secondly using the logical representation of the lowest four vector image bytes indirectly expressed secret information embedding position to strengthen the secret information bit stream and vector images byte bit links, instead of the traditional LSB algorithm directly embedded in the least significant bit secret information. Effectively enhanced its robustness and resist to cutting, adding noise, compression and filtering of such illegal attack capability. The method only used the logical operation, so the operation of embedding and extraction operation are simple and efficient, to ensuring the usefulness of the algorithm.
Keywords/Search Tags:Information hiding, the least significant bits, Arnold transform, X-or operator
PDF Full Text Request
Related items