Research of Coverless Information Hiding Method Based on Emo
發(fā)布時間:2021-03-24 22:27
自人類社會進入21世紀(jì)以來,人們對互聯(lián)網(wǎng)的使用日益增加。隨著互聯(lián)網(wǎng)滲透到我們生活的方方面面,互聯(lián)網(wǎng)上的信息量呈爆炸式增長。由此產(chǎn)生的信息安全問題已成為當(dāng)代社會的熱點問題之一。在4G網(wǎng)絡(luò)廣泛使用之后,人們經(jīng)常使用一些應(yīng)用程序,包括社交,食品,金融,旅行,住宿,醫(yī)療,教育和娛樂等方面,使用的同時泄漏大量個人信息。一旦這些個人信息被非法的網(wǎng)站和機構(gòu)收集,將被用于電信欺詐,這極大地威脅了社會穩(wěn)定。在5G技術(shù)飛速發(fā)展的今天,信息安全問題不僅與個人息息相關(guān),而且還關(guān)系到企業(yè),社會和國家的發(fā)展。從歷史上看,人們提出了許多措施來維護信息安全。最典型的方法是加密。在早期的古典密碼學(xué)中,人們利用詩詞和字畫來隱藏信息。在現(xiàn)代密碼學(xué)中,人們開始依靠電子計算機和現(xiàn)代數(shù)學(xué)理論。在近代,研究者提出了公鑰加密算法,使密碼學(xué)成為一個成熟的理論體系。密碼學(xué)在過去的信息對抗中發(fā)揮了關(guān)鍵作用,但是密碼學(xué)也有明顯的缺陷。因此,在現(xiàn)代信息安全問題中,信息隱藏技術(shù)得到了越來越廣泛的使用。傳統(tǒng)的信息隱藏技術(shù)是根據(jù)一定的規(guī)則將秘密信息隱藏到載體中,并利用載體的冗余特性來達到隱藏信息的目的。就信息安全性和傳輸過程的魯棒性而言,信息隱藏技...
【文章來源】:華中師范大學(xué)湖北省 211工程院校 教育部直屬院校
【文章頁數(shù)】:75 頁
【學(xué)位級別】:碩士
【文章目錄】:
Abstract
摘要
Acknowledgements
1 Introduction
1.1 Research background
1.2 Research challenges
1.3 Objectives and contributions
1.4 Thesis structure
1.5 Summary
2 Literature Review
2.1 Classic information hiding methods
2.1.1 Least Significant Bits(LSB)
2.1.2 The method of Discrete Cosine Transform(DCT)
2.1.3 The method of Discrete Wavelet Transform(DWT)
2.1.4 Bag-of-Words model(BOW)
2.1.5 Information hiding technology based on GAN
2.2 Steganography method based on social network
2.3 The method in this thesis
2.4 Summary
3 Coverless Information Hiding Algorithm Based on Emoji Image Set
3.1 The characteristics and coding methods of emoji
3.1.1 The characteristics of emoji
3.1.2 Unicode and encoding rules
3.2 Research on logistics chaotic sequence theory
3.2.1 Logistic chaotic sequence
3.2.2 The characteristics of chaotic
3.3 The design of the information hiding system
3.3.1 Get emoji image set
3.3.2 Preprocessing of secret information
3.3.3 Generation of chaotic sequences
3.3.4 Establish mapping relationship with emoji image
3.3.5 Extract secret information from the received information
3.4 Instant communication hiding method based on combination of text and ex-pression image
3.4.1 System framework
3.4.2 Chinese text to generate anchor tags
3.4.3 Expression of the number and capacity of expression image
3.5 An application scenario based on social network environment
3.5.1 The specific idea of the scenario
3.5.2 Application method of information hiding technology in the scenario
3.6 Summary
4 Performance Testing
4.1 Functional test of the system
4.1.1 Information hiding based on emoji with sorted bits
4.1.2 Information hiding based on the mix of text and emoji
4.1.3 Simple simulation of application scenarios
4.2 Performance testing of the system
4.2.1 Security
4.2.2 Capacity
4.2.3 Robustness
4.3 Summary
5 Conclusion and Future Work
References
【參考文獻】:
期刊論文
[1]基于圖像Bag-of-Words模型的無載體信息隱藏[J]. 周志立,曹燚,孫星明. 應(yīng)用科學(xué)學(xué)報. 2016(05)
[2]基于網(wǎng)絡(luò)聊天環(huán)境的秘密信息隱蔽通信研究[J]. 王東,熊世桓. 內(nèi)蒙古師范大學(xué)學(xué)報(自然科學(xué)漢文版). 2014(05)
[3]一種基于文本和表情符號的信息隱藏算法[J]. 周苑,周巖. 河南工程學(xué)院學(xué)報(自然科學(xué)版). 2013(02)
本文編號:3098509
【文章來源】:華中師范大學(xué)湖北省 211工程院校 教育部直屬院校
【文章頁數(shù)】:75 頁
【學(xué)位級別】:碩士
【文章目錄】:
Abstract
摘要
Acknowledgements
1 Introduction
1.1 Research background
1.2 Research challenges
1.3 Objectives and contributions
1.4 Thesis structure
1.5 Summary
2 Literature Review
2.1 Classic information hiding methods
2.1.1 Least Significant Bits(LSB)
2.1.2 The method of Discrete Cosine Transform(DCT)
2.1.3 The method of Discrete Wavelet Transform(DWT)
2.1.4 Bag-of-Words model(BOW)
2.1.5 Information hiding technology based on GAN
2.2 Steganography method based on social network
2.3 The method in this thesis
2.4 Summary
3 Coverless Information Hiding Algorithm Based on Emoji Image Set
3.1 The characteristics and coding methods of emoji
3.1.1 The characteristics of emoji
3.1.2 Unicode and encoding rules
3.2 Research on logistics chaotic sequence theory
3.2.1 Logistic chaotic sequence
3.2.2 The characteristics of chaotic
3.3 The design of the information hiding system
3.3.1 Get emoji image set
3.3.2 Preprocessing of secret information
3.3.3 Generation of chaotic sequences
3.3.4 Establish mapping relationship with emoji image
3.3.5 Extract secret information from the received information
3.4 Instant communication hiding method based on combination of text and ex-pression image
3.4.1 System framework
3.4.2 Chinese text to generate anchor tags
3.4.3 Expression of the number and capacity of expression image
3.5 An application scenario based on social network environment
3.5.1 The specific idea of the scenario
3.5.2 Application method of information hiding technology in the scenario
3.6 Summary
4 Performance Testing
4.1 Functional test of the system
4.1.1 Information hiding based on emoji with sorted bits
4.1.2 Information hiding based on the mix of text and emoji
4.1.3 Simple simulation of application scenarios
4.2 Performance testing of the system
4.2.1 Security
4.2.2 Capacity
4.2.3 Robustness
4.3 Summary
5 Conclusion and Future Work
References
【參考文獻】:
期刊論文
[1]基于圖像Bag-of-Words模型的無載體信息隱藏[J]. 周志立,曹燚,孫星明. 應(yīng)用科學(xué)學(xué)報. 2016(05)
[2]基于網(wǎng)絡(luò)聊天環(huán)境的秘密信息隱蔽通信研究[J]. 王東,熊世桓. 內(nèi)蒙古師范大學(xué)學(xué)報(自然科學(xué)漢文版). 2014(05)
[3]一種基于文本和表情符號的信息隱藏算法[J]. 周苑,周巖. 河南工程學(xué)院學(xué)報(自然科學(xué)版). 2013(02)
本文編號:3098509
本文鏈接:http://sikaile.net/kejilunwen/shengwushengchang/3098509.html
最近更新
教材專著