Font Size: a A A

Hiding Image Scrambling Technology Portfolio And Texture Characteristic

Posted on:2015-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y H ZhongFull Text:PDF
GTID:2268330431967359Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Entering21st century, the Internet and mobile communication as the representative of IT technology plays an increasingly important role in people’s life. However, with the increasingly information exchange of multimedia, infringing works, information tampering, theft and other issues, information security has become more and more important.The safety of digital image has always been a hot research topic in the field of information security. This paper first makes in-depth study on the state of art research on this area, and then we analyze the key technology of hidden digital image. Secret digital image scrambling encryption can make the image invisible, but the existing encryption technology can be cracked by the histogram statistics, differential attack, brute force and other tools. To solve this problem, we designed a new combination scrambling encryption methods; it introduces chaotic system to do secondary encryption for the pixel gray values based on the traditional scrambling encryption of image pixel locations and pixel points. It also introduces spread function to disrupt the correlation between neighboring pixels and circumvent aforementioned attack methods. Experiment results show it has good resistance to attack.The other key technology of hidden digital image is steganographic techniques. Existing image steganography techniques include airspace steganography technology (LSB) and frequency domain steganographic techniques (DCT, DWT, DFT), the former has some advantages such as large capacity of steganography and easy to implement, but it also has some pitfalls such as it’s easy to be detected by attackers. Therefore, in this paper we designed a new steganography method which can write different secret information based on the vector image’s own texture features. This method divided the image into texture regions, edge regions and smooth regions, and combines the most significant bit of vector image pixel to determine the information amount that will be embedded in the secret image. The experiment results show that this method can resolve the conflict between capacity of steganography and invisible.
Keywords/Search Tags:Image scrambling, Steganography, LSB, Texture, Entropy.
PDF Full Text Request
Related items