Font Size: a A A

Research On The Security Of Spread Spectrum Steganography In Image

Posted on:2015-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y N WangFull Text:PDF
GTID:2348330485493704Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Since the 1990 s, along with the rapid development of the network technology and digital multimedia technology, information hiding technology has begun and developed rapidly, becoming one of the research topics in the field of information security. Information hiding refers to embedding undetectable secret information into the cover to accomplish copyright protection, concealed communication and so on. Image is used as the cover in image information hiding to transfer the secret information. As the attacking technology, image steganalysis technology aims at revealing the existence of secret information, which has also caused the eager concern of many researchers, and it has important significance for the development and improvement of information security tec hnology.In this paper we study the security of spread spectrum steganography in Image. Firstly, this paper presents attack of spread spectrum steganography aiming at detecting presence of hidden message, estimating location and length of hidden message or extracting hidden message, and basing on the attack, the security of spread spectrum steganography is studied. Then, this paper proposes a spread-spectrum steganalysis scheme based on weak textured patch. Considering the grayscale threshold effect occurred in the process of steganography in images, we propose a scheme to mark the patches which may have been rounded. So when we select weak textured patches from a single noisy image based on the gradients of the patches, we may avoid selecting the patches. Then we estimate the strength of the steganography based on weak textured patches using principal component analysis(PCA). Finally, in order to validate the feasibility and robustness of the proposed algorithm, we use the Matlab to do the simulation experiment. Experimental results demonstrate the effectiveness of this approach.
Keywords/Search Tags:spread spectrum, image steganalysis, security, strength estimation, PCA
PDF Full Text Request
Related items