信息隐藏算法的研究与应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着因特网的迅猛发展和多媒体技术的广泛应用,信息隐藏技术已经成为信息安全领域一个新的研究热点。目前的研究主要是利用图像、声音、视频等载体来进行信息隐藏。本文首先介绍了信息隐藏的基本概念和理论,如其特性、分类、应用等,然后就基于文本的信息隐藏技术和基于图像的信息隐藏技术做了相关研究。
     (1)基于文本的信息隐藏算法的改进
     本文在深入研究目前文本数字水印技术、分析了文本信息隐藏算法缺陷的基础上,改进了一种基于文本的零水印算法。该算法首先通过文本中的标点符号来确定文本特征,然后通过将加密后的水印信息和加密后的文本特征相异或,将水印信息加到宿主信息中。实验证明该算法具有完好的隐蔽性和较强的鲁棒性。但是该方法,只能应用于信息的隐秘性,不能应用于版权保护,还有待改进。
     (2)基于图像的信息隐藏算法的改进
     本文根据对离散余弦变换(DCT)、离散小波变换(DWT)理论的分析研究,提出了变换域内实现数字图像水印嵌入的改进算法。在深入理解数字图像小波变换后系数具有相关性特点的基础上,对变换后的数字图像系数作DCT变换,再嵌入数字水印,这使得算法兼有了两种变换的特点,增强了水印算法的稳健性。本文对所提出的算法进行了不可见性和鲁棒性实验。实验结果表明,算法具有很好的不可见性,对常见的图像处理操作具有较好的鲁棒性。本文最后对信息隐藏技术的发展作了展望。
With dramatic advance of Internet and wide application of the multimedia technology, information-hiding techniques have become a new hot topic in the domain of the information security. Today's information hiding techniques mainly use image,audio and video as cover objects. In the thesis, firstly we introduce the basic concepts and theoretics of information hiding technologies and digital watermarking, such as charachteristics, classification and application and so on, then the information hiding techniques based on text and on image are discussed in detail in this paper.
     (1) Improvement on information hiding algorithms based on text
     We analyze the information hiding techniques based on text in detail and give a survey of today's polular algorithms of text document information hiding and their advantages and shortcomings. In this algorithm the text characters are firstly determined by punctuations, and then by XOR the encrypted charcters and the encrypted watermarking information, the watermark is embedded into the text. The experimental results show that the algorithm has complete hiding effectiveness and strong robustness. However, the method can only be applied to information hiding, not be used for copyright protection, yet to be improved.
     (2) Improvement on information hiding algorithms based on image
     A digital watermark embedding algorithms in transform domain is presented, which is based on analysis and research of DCT, DWT and Neural Network. With the coefficients after Discrete Cosine Transform(DWT) of the digital image having correlations, we firstly consider making another Discrete Cosine Transform(DCT) of them, and then embedding digital watermark. The algorithm has the characteristics of both DWT and DCT, so enhances the robustness. Finally, in order to verify the impercettibility and robustness of the algorithms proplsed in this paper, a lot of experiments have been done. The experimental results show that the algorithms has good imperceptibility and very strong ability against geometry attack and common image processing operations. At last a conclusion and prospect of this paper have been done.
引文
[1]林代茂,胡岚,郭云彪,周琳娜.广义信息隐藏技术的安全问题.中山大学学报(自然科学版),2004,43(2):14-16
    [2]Ming-Ni Wu,Chin-Chen Chang,A Novel High Capacity Reversible Information Hiding Scheme Based on Side-Match Prediction and Shortest Spanning Path,Circuits,Systems,and Signal Processing.2008,27(2):137-153
    [3]王育民,张彤,黄继武.信息隐藏—理论与技术.清华大学出版社,2006
    [4]王丽娜,张焕国,信息隐藏技术与应用.武汉大学出版社,2003
    [5]Liu Bin,Li Zhitang and Tu Hao,An image encryption method on bit plane hiding technology.Wuhan University Journal of Natural Sciences,2006,11(4):1283-1286
    [6]黄华,齐春.一种新的基于超文本的信息隐藏方法.计算机工程,2005,31(12):136-137
    [7]Byung-Ho Cha and Jay Kuo.Design and Analysis of High-Capacity Anti-Collusion Hiding Codes.Circuits,Systems,and Signal Processing.2008,27(2):195-211
    [8]Sun Jiande and Liu Ju.A blind video watermarking scheme based on ICA and shot segmentation.Science in China Series F:Information Sciences.2006,49(3):302-312
    [9]Zhang Xin-Peng and Wang Shuo-Zhong.Fragile watermarking based on robust hidden information.Journal of Shanghai University(English Edition).2003,7(3):261-264
    [10]Shu-Fen Tu and Ching-Sheng Hsu.A DCT-based ownership identification method with gray-level and colorful signatures.Pattern Analysis &Applications,Springer London.2006,9(2-3):229-242
    [11]程玉柱,孙星明等.一种新的基于混沌映射的文本零水印算法,计算机 应用,2005,25(12):2753-2754,2758
    [12]傅德胜,韦宝然.基于DCT系数的信息隐藏系统的设计与实现.计算机工程与设计,2007,29(6):1562-1564
    [13]胡国胜,冯亚东,张国红.信息隐藏学—一个古老又年轻的学科.科学学与科学技术管理,2003,4(6):89-92
    [14]李丽娟,熊淑华.基于文本的信息隐藏技术研究.现代电子技术.2006,7(5):67-69
    [15]吴金海,林福宗.基于数字水印的图像认证技术.计算机学报,2004,27(9):1153-1161
    [16]Petitcolas FAP,Anderson RJKuhn M G.Information hiding—a survey.Proc.of the IEEE,1999,87(7):1062-1077
    [17]F.Hartung,M.Kutter,Multimedia watermarking techniques,Proc.of IEEE,1999,87(7):1079-1107
    [18]温泉,孙锬锋,王树勋.零水印的概念与应用.电子学报,2003,31(2):214-216
    [19]卢开澄.计算机密码学-计算机网络中的数据保密与安全.清华大学出版社.2004
    [20]白剑,杨榆,徐迎辉.基于文本的信息隐藏算法.计算机应用,2005,11(4):32-35
    [21]Chapman M,Davida G.A software system for concealing ciphertext as innoueuous text.ICICS '2004-International Conference on Information and Communications Security,2004:335-345
    [22]Bender W,eral.Techniques for data hiding.IBM Systems Journal,1996,35(3&4):313-336
    [23]Stefan Katzenbeisseer,Fabien A.P.Petitcolas,Information Hiding Techniques for Steganography and Digital Watermarking.Chinese Journal of Computers,2003,26(7):779-788
    [24]舒后,杨潮等.基于文本内容的数字水印算法的设计与实现,计算机工程与设计,2008,29(5):1299-1302
    [25]眭新光,罗慧.一种安全的基于文本的信息隐藏技术.计算机工程, 2005,30(19):104-105
    [26]耿红琴.基于Word文本文档的信息隐藏技术研究.科学技术与工程,2007,6(11):2991-2993
    [27]陈萍,程磊.通过缩放字符比例在Word文档中隐藏信息的算法研究.科学技术与工程,2007,6(12):2991-2993
    [28]D.Huang,H.Yan.Interwod distance changes represented by sine waves for watermarking text images.IEEE Transactions on Circuits and Systems for Video Technology,2005,11(12):1237-1245
    [29]戈英民,郑岗.一种利用字符特征变化的文本数字水印方法.开发应用,2005,21(3):36-39
    [30]Yanling Zhao,Xiaoshi Zheng,Na Li,Guangqi Liu,Qingxi Wang.A Digital Image Watermark Algorithm Based on DC Coefficients Quantization.The 6~(th) World Congress on Intelligent Control and Automation.2006
    [31]郑晓势,赵彦玲,李那.数字水印重复嵌入及提取方法.系统仿真学报,2006,8(18):388-390
    [32]Wang H J,Li N.An algorithm of digital image watermark based on multiresolution wavelet analysis.IEEE Intl.Workshop VLSI Design&Video Tech,2005:272-275
    [33]张冉,陈向东.一种基于小波变换的灰度数字水印嵌入技术.通信学报,2004,2(2):125-130
    [34]张光桃,乐红兵.一种基于小波变换的图像数字水印方法.计算机工程与设计,2006,7(13):2480-2481,2510
    [35]赵耀.基于小波变换的抵抗几何攻击的鲁棒视频水印.中国科学(E).2006,36(2):137-152

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700