Font Size: a A A

Research Of Digital Image Steganography Algorithm Based On Sharing

Posted on:2016-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q YuanFull Text:PDF
GTID:2298330467992756Subject:Computer technology
Abstract/Summary:PDF Full Text Request
At the background of information age, Internet develops rapidly and has been applied to various fields such as economy, military and policy. It more and more profoundly changes the way of people’ study, work and life, and even makes an influence on social process. However, the openness of Internet poses some risks on the transmission of important information, which exists serious security problems to a certain extent. So information hiding technology arises at the historic moment and is extensive popular in researchers at home and abroad. Meanwhile it has developed rapidly and made great contributions to secure the transmission of network information.As an integral part of the information hiding technology, Steganography hides the important information in public media and then transmits. Steganography mainly hides the fact of existing of the important information to avoid attacks by the third parties and achieve covert communication. Steganography is often combined with cryptography, and is applied in fields involving information security. Currently, researchers have put forward plenty of excellent steganography algorithm and scheme. However, it is still the focus of our study that how to better balance the contradiction between embedding capacity, concealment and security.Based on the analysis of existing steganography model and algorithm, and according to characteristics of different types of cover image, this paper takes model establishment and steganography algorithm as research focus and combines password technology to conduct the thorough research on digital image steganography which is based on sharing. It builds sharing steganography model of different types of image to achieve steganography algorithm, and makes the embedded capacity increased, security improved and achieves the blind extraction. The main contents of this paper as follows: 1. Researching on image sharing idea describes the principle of image sharing based on Frobenius problems, Chinese remainder theorem, the theorem of quadratic residues and Bernstein polynomial. The paper presents the sharing steganography algorithm that the original carrier image is based on binary image and gray image from airspace, and builds sharing steganography model.2. For the single characteristic that either black or white of binary image, and little capacity and poor concealment in binary image, the paper put sharing idea into steganography technology that based on binary image and builds a sharing steganography model based on binary image to achieve binary image’s steganography algorithm that based on multi-carrier. The simulation experiment and performance analysis show the effectiveness and feasibility of the algorithm.3. Traditional gray image sharing steganography algorithm is more sharing secret information to many children and respectively embedded to carrier image. The paper decomposes carrier image into multiple images by sharing technology, then embeds secret information in them by combined with matrix coding technology. The simulation experiment and performance analysis show the effectiveness and feasibility of the algorithm.4. The paper presents that scrambling pretreats secret information by chaotic map to improve the security, so that it is impossible to accurately extract secret information during transmission even if it was attacked or detected.
Keywords/Search Tags:information hiding, steganography, image sharing, steganography model, chaotic map, security
PDF Full Text Request
Related items