Font Size: a A A

Design And Implementation Of Data Steganography System In Enterprise

Posted on:2022-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:J W HuiFull Text:PDF
GTID:2518306605470214Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
The data produced,used,transmitted and stored in most domestic scientific research institutions are highly confidential,and their work is often highly secretive,high-tech and high-risk.Therefore,the security of data involved in the work is required to be high.In the case of only encrypting confidential data,it is easy to attract the attention of attackers,which makes them interested in decoding or destroying the data.Therefore,the security protection of important data,in addition to its encryption,should also try to hide the fact that confidential data exists.The research goal of this project is to build a enterprise data steganography system for these enterprises with high data security requirements,and provide users with real-time voice communication based on data steganography and information hiding services based on a variety of multimedia file formats.Users can further hide the fact that confidential data exists on the basis of data encryption.Based on F5 steganography algorithm,this paper studies data steganography schemes of various audio and video carriers.Based on the experimental data of PESQ and PSNR,this paper explores the best embedding location of AMRNB,MP3,FLAC,WAV and H.264,and then uses F5 steganography algorithm complete the data steganography.Then this project uses software engineering method to complete the implementation of the enterprise data steganography system.First,this paper fully investigate the data security problems to be solved by enterprises,and then analyze the requirements of the system.Then based on this,the system is designed and divided into several modules.On the basis of the outline design,the detailed design and implementation of each module of the system are carried out by using the method of class diagram and sequence diagram,and the specific implementation of data steganography and extraction algorithm is explained by using pseudo code and algorithm flow chart.Finally,the functional test and performance test of the system are carried out to verify that the system meets the user's functional and performance requirements at the beginning of the design.At present,the first version of the system has been developed,which can better meet the needs of users for steganography of confidential data in transmission and storage.
Keywords/Search Tags:instant messaging, information hiding, video data steganography, F5 steganography algorithm
PDF Full Text Request
Related items