Font Size: a A A

Research On Trusted Coverless Information Hiding Based On Carrier Characteristics

Posted on:2021-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z L YangFull Text:PDF
GTID:2518306050954069Subject:Cryptography
Abstract/Summary:PDF Full Text Request
On October 26,2019,the Fourteenth Meeting of the Standing Committee of the Thirteenth National People's Congress passed the "Cryptography Law of the People's Republic of China".The passage of this law shows the country's emphasis on network information security and the affirmation of cryptographic technology.As another branch of cryptography,which is also a part of the information security system,information hiding technology has also received the attention and research of a large number of scholars and experts,and will flourish after this.Information hiding technology can be divided into two major categories from the macro perspective-embedded information hiding and coverless information hiding.However,because the embedded information hiding technology itself needs to modify the carrier to achieve the purpose of embedding the secret information,this kind of limitation makes many targeted steganalysis techniques to detect the strangeness of the carrier,so that it can determine whether the carrier is hidden.The information was even cracked to get the ciphertext.In order to make up for the above shortcomings,a new type of information hiding technology-coverless information hiding technology has been proposed by experts and scholars.This information hiding method makes the traditional steganalysis technology no longer work and has strong invisibility.Based on the different source properties of image carriers,image coverless information hiding techniques are divided into coverless information hiding techniques based on natural images and coverless information hiding techniques based on generated images.Coverless information hiding technology is a new type of information hiding technology that has only been proposed in recent years.Therefore,various aspects of research are still in the exploratory stage.The research results based on this technology are not yet perfect.For example,the hidden capacity is relatively low,the robustness is poor,and the security cannot be guaranteed during information transmission,etc.Therefore,after doing a lot of research work on coverless information hiding technology,this article has done the following research based on different image carriers:Firstly,in the coverless information hiding classification based on natural images,a trusted coverless information hiding scheme is proposed.The transmission security of the previous coverless information hiding scheme is not enough.Although the carrier is invisible,the carrier cannot resist indifferent attacks and naturally occurring noise pollution.In the event of an error in the transmitted carrier,the receiver will decrypt the wrong information.This paper proposes a coverless information hiding scheme based on the principle of linear codes and chaotic mapping theory.Experiments and analysis show that the scheme guarantees information security,enhances randomness,and has verifiability,which makes the proposed information hiding scheme trustworthy.In addition,compared with other solutions,the hidden capacity of this solution has been greatly improved,and the storage resource consumption of the information base has been greatly reduced.Secondly,in the coverless information hiding classification based on generated images,a coverless information hiding scheme based on conditional generation confrontation network is proposed.This scheme uses the SIFT feature conditions and initial conditions of the image to train the data set in the generative adversarial network to generate the required SIFT feature images.The generated image has strong invisibility,can effectively resist the statistics-based steganalysis technology,and has large hiding capacity and strong robustness.The whole scheme is highly innovative,which will be a new idea to study the coverless information hiding technology for generating images.Thirdly,after a lot of research and learning on the coverless information hiding technology,we summarize the current defects and shortcomings of this technology,then look forward to the future development trends.
Keywords/Search Tags:Information Hiding, Coverless, Cryptography, Trusted, Image Feature
PDF Full Text Request
Related items