Font Size: a A A

Research And Implementation Of Image Information Hiding Technology

Posted on:2022-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2518306734957589Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of multimedia,network information security issues have threatened individuals,companies,and even countries.Information transmitted through the network may be attacked at any time.Therefore,information hiding technology has emerged.Information hiding technology plays an important role in the future network due to its strong confidentiality.However,the three most critical characteristics of information hiding technology,invisibility,the amount of embedded secret information,and robustness are mutually restricted.If the performance of any one of the three features is improved,the performance of the other two features will be somewhat reduced,and a balanced state will not be reached.In order to solve the mutual constraints of invisibility,embedding amount,and robustness in information hiding technology,this thesis proposes an algorithm that combines the highest bit sequence optimization algorithm with the human visual system.First,the most significant bit sequence optimization algorithm is used to balance the problem.The problem of mutual restriction between visibility and the amount of secret information embedded,and the highest bit is matched and replaced without changing the most significant bit value,the robustness is effectively improved;secondly,the embedded depth is constructed by using the human visual system Table,according to the embedding depth table to maximize the estimation of the hidden space of the image in order to embed more secret information,to achieve the purpose of balancing invisibility,embedding amount and robustness.The main tasks of this article are as follows:(1)Study the Arnold image encryption algorithm to enhance security.(2)The most significant bit sequence optimization algorithm is designed to form a new compressed secret information sequence,and then the human visual system is used to construct an embedding depth table to estimate the hidden space of the original carrier image.(3)Select a suitable plane to embed and extract secret information.(4)Experiment with MATLAB development environment to verify that the algorithm in this thesis has good robustness,embedding capacity and invisibility.
Keywords/Search Tags:information hiding, the most effective bit, human visual system, matlab, common attacks
PDF Full Text Request
Related items