Font Size: a A A

Research On The Pre-processing Of Carrier For Steganography Technology Based On The Energy Analysis

Posted on:2019-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y XuFull Text:PDF
GTID:2428330563495202Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet,information dissemination has become more convenient and faster,but at the same time it has brought great challenges to information security.Information hiding technology provides reliable technical means for the secure transmission of information by the existence of transmission and the concealment of information.Compared with traditional secrecy,information hiding technology hides secret information in the redundant information of the multimedia and transmits the secret information through the open channel without causing the third party to notice it,so that the secret information cannot be understood.Become invisible,greatly reducing the probability of secret information being attacked by a third party,thereby improving the security of the information.This paper mainly studies the information steganography technology based on digital images.It focuses on the design and selection of information hiding regions and the formulation of information steganography rules.Two kinds of information steganography algorithms are proposed: First,based on CL multiwavelet transform.The matrix information steganography algorithm.The algorithm firstly performs CL multiwavelet transform on the carrier image to obtain four component subgraphs.According to the energy characteristics,LH2 and HL2 are selected as the carrier area,then the carrier area is decomposed by l??color space to obtain ? and ? components.Finally,the direction encoding is used to encode ?.,? components to achieve the hidden secret information.Experiments show that the algorithm has higher embedding capacity and better invisibility;second,the design and research of information steganography algorithm based on second-order balanced multiwavelet transform.The algorithm performs second-order balanced multiwavelet transform on the carrier image to obtain four regions with close properties.The pre-hidden information is divided into two parts.LL2 and LH2 hide part of the information and the two components hide the same information.HL2 and HH2 are hidden.The other part of the information,the two components also hide the same information.Then we do a singularmatrix decomposition on the partitioned area and select the last three bits of the larger singular value to use the matrix encoding to hide the secret information.The algorithm uses the redundancy mechanism to implement the secret information embedding.Therefore,the algorithm has good robustness and can resist compression and clipping and other attacks.The dissertation studies the hidden regions of digital images and information steganography rules,and proposes two steganographic algorithms to improve the mutual restriction between robustness,embedded capacity and invisibility of steganographic algorithms.With its high embedded capacity,it can also resist attacks such as compression and clipping.
Keywords/Search Tags:information steganography, CL multiwavelet transform, second-order balanced multiwavelet transform, direction coding, matrix coding, singular matrix decomposition
PDF Full Text Request
Related items