Font Size: a A A

Research Of Image Steganography Based On Hamming Code

Posted on:2018-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:K MaoFull Text:PDF
GTID:2348330515483729Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information and multimedia technology,information technology has been integrated into daily lives of people,and gradually changes people's production and lifestyle.Internet brings convenience for people,and however,it also faces serious network security issues.Therefore,how to protect the valuable data in the process of storage or transmission and further protect the privacy of all users to prevent 'illegal third-party interception or tampering has become a hot research field of information security.As an important branch of information security technology,data hiding provides an effective guarantee for the security of secret information storage and transmission on the Internet.Inorder to enhance the security of data during transmission and storage,the stega nography algorithm,Hamming Code technology and other image processing technolo gies were studied deeply in this paper,and proposed two data hiding methods,one is in the plaintext domain,and another is in the cipher domain,they are all based on hamming code.For the data hiding method in plaintext domain,we through the in-depth study of the Hamming Code,we found that the quality of the stego image can be improved when several Hamming Code have been combined in the process of image steganography.In addition,an adaptive information hiding algorithm was proposed based on the fact that the human eye is less sensitive to the edge region while more sensitive to the smooth region,which can be combined with the edge detection technique that is commonly used in image processing.In this method,the image is first partitioned into blocks of the same size,and then a partitioning algorithm of sharp degree is obtained by the result of edge detection.Experimental results show that the algorithm has a higher payload and better imperceptibility.In order to facilitate management and reduce the burden on the sender,information embedded operation and the interaction with the recipient can be outsourced to half-trusted third-party server.To protect the image content privacy of the image owner,the original image needs to be encrypted,and the third-party server needs to hide the information on the ciphertext image.Since the encryption technology makes the correlation between adjacent pixels disappear,it is a huge challenge to information hiding technology on the ciphertext image undoubtedly.Fortunately,the Hamming Code based information hiding methods,does not need the help of this correlation feature of adjacent pixels.For the data hiding method in plaintext domain,we presented and proved a theorem named perfect stream theorem which based on(7,4)hamming code.Based on this theorem,an information hiding algorithm was proposed in this paper.Experimental results show that the image encryption algorithm used in this algorithm is very safe and can greatly improve the information payload while ensuring the accuracy of extracted secret information.
Keywords/Search Tags:Data hiding, Hamming Code, Edge detection, Image encryption
PDF Full Text Request
Related items