Font Size: a A A

Research And Implementation Of Tag-Based Information Embedding And Extraction Technology

Posted on:2016-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:2298330467491751Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of Computer Science and Internet Technology and the advent of era for Big Data, more and more digital information (image, text, video, audio, etc.) will be frequently transmitted in the network, causing the protection of digital information security becomes very prominent. Traditional information encryption technology can effectively protect the security of digital information, while the information hiding technology can achieve copyright protection, tamper detection, access control, authentication and other security features by hiding secret information in the digital information. The combination of information encryption technology and information hiding technology, which hides information in encrypted information, can guarantee digital information security and effective management and control for digital information. Information hiding technology in encrypted domain plays an important role in the information security field for its superiority.Therefore, this paper studies the Information embedding and extracting based on the encrypted domain information hiding, and proposes the tag-based encrypted domain information embedding and extracting algorithm, including:(1) Tag generation and file encryption algorithm. This paper introduces six kinds of image encryption algorithms. Meanwhile, it proposes a tag-based generation algorithm of RSA and linear block codes, which has high security and feature of self-verification. And then, proposes a file encryption algorithm based on chaotic sequence, which uses an auxiliary array and can greatly improve the speed of chaotic sequences quantification and file encryption.(2) Information embedding and extracting algorithm. This paper introduces six kinds of information embedding and extracting algorithm in plaintext and ciphertext domain, respectively. And then, proposes a tag-based embedding and extracting algorithm with chaotic sequences. The simulations and analysis results show that this algorithm has the feature of verifiable tag, strong robustness, safety, none damage, large embedding capacity, high application value.(3) Simulation and implementation. This paper analyzes each algorithm by simulation to compare their effectiveness, security and so on. Besides, this paper implements the Information embedding and extracting to evaluate its function and performance.
Keywords/Search Tags:Encryption Technology, Information Hiding Technology, Ciphertext Domain, Multimedia Information, Chaos
PDF Full Text Request
Related items