Font Size: a A A

Research And Implementation Of A Steganography System Combining Multi-Carrier And Multi-Algorithm

Posted on:2022-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:Q WuFull Text:PDF
GTID:2518306350465634Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The rapid development of the Internet not only brings convenience to people,but also brings many hidden dangers to people's lives,among which information security is particularly important.In order to improve the security of transmitted information and protect personal privacy,many scholars are engaged in the research of steganography technology.It uses the redundancy of the carrier to embed secret information into the carrier for transmission through public channels to avoid third-party suspicion.Transmission of secret information.Image is one of the commonly used carriers for steganography.Traditional steganography using images as a carrier uses a single image as a carrier,but the capacity of a single image as a carrier is limited.In order to meet actual needs and ensure the safe transmission of secret information,image steganography based on multiple carriers has become one of the research hotspots.This article will focus on the combination of multiple carrier images and multiple steganography algorithms.The main work is as follows:1.In order to study the relationship between carrier format and steganographic capacity and security,this article first established an image library containing common multiple formats,such as bmp,jpg,png,etc.,and then selected steganographic algorithms with different characteristics to construct an algorithm library,Including the LSBM(Least Significant Bit Matching)algorithm with large steganographic capacity and low computational complexity,the earliest classic algorithm JSteg steganography algorithm suitable for JPEG images,and the F5 steganography algorithm with high embedding efficiency,which can be effective J-UNIWARD(JPEG UNIversal WAvelet Relative Distortion)steganography algorithm and its improved steganography algorithm based on JEPG domain resisting steganalysis detection,and UERD(Uniform Embedding Revisited Distortion)which further improves the steganography capacity of the algorithm Steganography algorithm,these several steganography algorithms together form the algorithm library of this article to meet the different needs of steganography,and each algorithm is divided into different levels according to the security of it.2.Designed and implemented a steganography strategy of the shortest path that is traversed first.In the same experimental environment,test the anti-stegal analysis ability of each steganography algorithm in the algorithm library,and set the embedding rate to 0.1-0.5.Write down the time required to complete the embedding under different embedding rates and record it as;at the same time record the steganalysis error rate under this embedding rate and record it as.Then the secret information is divided into different levels according to the importance of the content,and the steganography algorithm of the corresponding level is selected.Comprehensive consideration,according to the shortest path principle to select the corresponding steganography algorithm and the best amount of embedded information,according to the image format applicable to the algorithm and the difference in the modification method of the carrier image during steganography,the performance of the algorithm can be achieved by selecting from the image library The best image is used as the carrier image for steganography.On the basis of theoretical verification,this paper verifies the feasibility of this method through experiments.At the same time,it proves through steganalysis experiments that the combination of multi-carrier and multi-algorithm effectively solves the problem of single-carrier hiding while ensuring safety.The problem of insufficient writing capacity,while avoiding the waste of resources.
Keywords/Search Tags:information hiding, multiple algorithms, multiple carriers, shortest path
PDF Full Text Request
Related items