Font Size: a A A

Steganography Based On Identity Authentication In Spatial Domain

Posted on:2019-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:X B XuFull Text:PDF
GTID:2428330566494420Subject:Information security and cryptography
Abstract/Summary:PDF Full Text Request
Steganography has been widely applied to secure communication especially in military espionage for a long time.It hides sensitive messages in a cover such as images.The redundancy of these covers is employed for embedding to avoid the hidden messages being detected.So existed steganaographic schemes absorb in improving the undetectability of the hidden messages against different kinds of steganalytic tools.The premise of these schemes are based on the receiver is trustworthy.But in practical situation,steganography may exist multiple receivers,and not every receiver is trustworthy.And when there are multiple sensitive messages needs to be sent to different receivers,it is obviously insecure to embed all the messages in the same cover.In view of the above problems,the main work of this paper includes:(1)FIBE-based identity steganography scheme.The algorithm uses FIBE(Fuzzy Identity-Based Encryption)to control the generation of embedded masks and implements identity-based embedding.The scheme embeds multiple messages into the same cover image at the same time,and controls the receiver through the attribute set to obtain the mask which embeds the secret information,so as to extract a certain message.(2)Identity steganography algorithm based on the Blakley threshold scheme.The scheme can embeds multiple messages in turn,and control whether the receivers can obtain the secret key of a certain message through the attribute set,then obtain the information embedded mask to extract the message.Compared with the first scheme,this scheme has a more flexible embedding model and a higher AMTP(average maximum total payload)of message.(3)Through experimental simulation,the two schemes are steganalzed and compared with the two popular steganalysis algorithms.It is found that the scheme proposed in this paper has better embedding effect in higher payload.In the security analysis,the experiment proves that the two algorithms proposed in this paper can guarantee that the extracted information will not affect the security of the remaining information in the cover image after embedding multiple information simultaneously.
Keywords/Search Tags:steganography, identity authentication, FIBE, Blakley threshold scheme, multiple embedding
PDF Full Text Request
Related items