您好,欢迎访问三七文档
当前位置:首页 > 电子/通信 > 数据通信与网络 > 数字图像嵌入隐藏信息技术研究
华中科技大学硕士学位论文数字图像嵌入隐藏信息技术研究姓名:罗志兵申请学位级别:硕士专业:通信与信息系统指导教师:谈新权20050501IIITheinformationhidingwhichisnewlyarisenacrosslotsoffields,hasbrokenthetraditionalcryptographicideas.Itisanewpointofviewtosurveytheinformationsecurityandisanewdirectioninthatrealm.Theinformationhidingtechniqueswillraisetheimportantfunctioninsecretcommunicationespeciallytheinformationsecurityonthenetworks.CombinedwithHVS(HumanVisualSystem),wecanputsecretmessageintheimagewithoutdegradingthequalityforitsredundancyandtosecuretheinformation.Themessagetobetransferredcanbeimageortextfile,andcanbehidedinthespacedomainorfrequencydomainoftheimage.Atpresenttime,mostofthestudiesfocusondigitalwatermarkingtechniques,andfewaredoneonsteganography,oneofthemostimportantdirectionsinthefieldofinformationhiding.Thisthesisconcernsthesteganography.Wealsoplaceemphasisonitsapplicationsindigitalimages.Incontrastwithencryption,theexistenceofcommunicationprocessandbothcommunicationsidesishidedinthesteganography.Inthispaper,firstly,thebasicknowledgeaboutinformationhidingispresented,andthenthetechniquesofdigitalimagesbasedinformationhidinginthedomainofspaceanddomainoffrequency.Therespectiveadvantagesanddisadvantagesarepresented.Baseontheanalysisofsecurityofembeddingdatainimage,aschemeforsecretcommunicationisdesigned.Thescheme’securityisstrong,anditcanbeusedformartialsecretcommunicationande-commerceetc.Keyword:InformationHiding;Secretcommunication;SteganographyDataembeddingDigitalimage______12“”“”[7]345678“”“”9“”“”“”“”“”“”1011121314151616)12(cos16)12(cos),(4)()(),(770ppvyuxyxfvCuCvuFoxy++=∑∑==16)12(cos16)12(cos),(4)()(),(770ppvyuxvuFvCuCyxfovu++=∑∑==)0(,1)()0(,21)(===uuCuuC)0(,1)()0(,21)(===vvCvvC),(yxfyx,),(vuFvu,173.73.718192021DCTDCTDCT2223242526272829(a)Lena.bmp(c)bman.bmp(e)(g)(f)(h)(d)3031KBKbitbit64810243*512*512*444114*64)1310(==+++++-KBKbitbit2419210243*512*512*444114*64)1310(*4==+++++-),(jifij32∑∑==-′=NjMijifjifMNMSE121)),(),((1MSEPSNR2255lg10=.1db93=PSNRdb8.72=PSNR3334353637xDCTHashDCTDCT38x`DCTHashDCT39404142200253017042005443Herodotus.TheHistories.London:Dent&SonsLtd.1992AndersonR.J.PetitcolasF.A.P.Onthelimitsofsteganography.SelectedAreasinCommunications,IEEEJournalonVol.16,Issue4,May1998:474-481ShannonC.E.CommunicationTheoryofSecrecySystems.BellSystemTechnicalJournal.1949.(28)4:656-715SimmonsG.J.ThePrisoners'ProblemandtheSubliminalChannel.InAdvanceinCryptlopy,ProceedingsofCRYPTO'83.PlenumPress1984:51-67,VenkatramanS,AjithAbraham,PaprzyckiM.Significanceofsteganographyondatasecurity.InformationTechnology:CodingandComputing,2004.Proceedings.ITCC2004.InternationalConferenceonVo.2.5-7April2004:347-351FabienA.P.Petitcolas,RossJ.AndersonandMarkusG.Kuhn.InformationHiding--ASurvey.ProceedingsoftheIEEE,specialissueonprotectionofmultimediacontent,July1999:1062-107844CoxIJ,KilianJ,LeightonT.Securespreadspectrumwatermarkingformultimedia.IEEETransactiononImageprocessing.1997.6(12):1673-1687Niels,ProvosandHoneyman.HideandseedAnintroductiontosteganography.IEEESecurity&PrivacyMay/June2003:32-44LamEY,GoodmanW.AmathematicalanalysisoftheDCTcoefficientdistributionsforimages.IEEETrans.OnImageProcessing,2000.9(10):16611666WenNungLie,GuoShiangLin,etc.RobustimagewatermarkingontheDCTdomain.IEEEInternationalSymposiumonCircuitsandSystems,2000.1:228-231.SuthaharanS.Transformdomaintechnique:robustwatermarkingfordigitalimages.ProceedingsoftheIEEE7-9April2000:407-412WestfeldA,PfitzmannA.AttacksonSteganographicSystems.InProcessingofInformationHiding,ThirdInternationalWorkshop.1999FridrichJ,LongM.SteganalysisofLSBEncodinginColorImages.Multimedia45andExpo,2000.ICME2000.2000IEEEInternationalConferenceonVolume3,30July-2Aug2000:1279-1282FridrichJ,GoljanM,RuiDu.DetectingLSBSteganographyinColorandGray-scaleImages.Multimedia,IEEEVol.8,Issue4,Oct-Dec2001:22-28LeeYK,ChenLH.AnAdaptiveImageSteganographicModelBasedonMinimum-errorLSBReplacement.ProceedingsoftheNinthNationalConferenceonInformationSecurity,Taiwan.1999:8-15LinGS,LieWN.StudyonDetectingImageHidingByFeatureAnalysis.Proc.ofIEEEInternationalSymposiumonCircuitsandSystems,ISCAS-2001,Sydney,Australia.2001:149-152FaridH.DetectingHiddenMessagesUsingHigher-orderStatisticalModels.InternationalConferenceonImageProcessing,Rochester,NY,2002ProvosN,HoneymanP.DetectingSteganographicContentontheInternet.TechnicalReportCITI01-1a,UniversityofMichigan.2001FridrichJ,GoljanM,DuR.SteganalysisBasedonJPEGCompatibility,SPIEMultimediaSystemsandApplicationsIV.SPIEPress,Bellingham,Wash.2001YsmailAvcyba.ImageQualityStatisticsandTheirUseInSteganalysisandCompression.BoaziciUniversity.2001SteveBurnettandStephenPainStefanKatzenbeisser,FabienA.PPetitcolas.InformationHidingTechniquesforSteganographyandDigitalWatermarking.ArtechHouse.200046数字图像嵌入隐藏信息技术研究作者:罗志兵学位授予单位:华中科技大学相似文献(10条)1.学位论文柏森基于信息隐藏的隐蔽通信技术研究2002在人类历史的长河中,人们在不断地寻求更新的、更有效的交流与通信方式。从最早的洞穴图画、烽烟信号、鸣鼓警报,到后来文字产生、电报发明、广播传送、电视普及,直至今天的Internet与E-mail。这还仅仅是我们所能描述的一个小小的片段,未来的通信将是难以想象的。不过,随着时代的前进,社会的进步,科技的发展,新的需要、新的发展机会将不断产生;通信中新的问题、新的方式将不断涌现。以信息隐藏技术为基础的隐蔽通信技术正是最新涌现出的一朵绚丽奇葩。加密通信仅能隐蔽通信的内容,让别人不能理解。而基于信息隐藏的隐蔽通信,不仅能隐蔽通信的内容,而且能隐蔽通
本文标题:数字图像嵌入隐藏信息技术研究
链接地址:https://www.777doc.com/doc-47421 .html