新型文本信息隱藏算法研究
[Abstract]:Information hiding is a science and art of embedding secret information into harmless carrier data by confusing means. It requires that the distortion caused by the embedding process to the carrier is imperceptible. Information hiding is not only an ancient technology, but also a young subject. It was widely used by the army to achieve secure communication during the ancient Greek and Roman wars, but then gradually marginalized. It was not until the development of Internet technology that information hiding was really concerned and widely studied. Encryption technology used to be considered sufficient to protect the security of people's communications. Encryption technology only prevents unauthorized people from reading the information, but the encrypted random code data exposes the importance of the information itself, but it is more likely to cause targeted surveillance and attack by interceptors. Different from cryptography, the purpose of information hiding is to hide the fact that secret information exists, so as to avoid attracting the attention of interceptors. However, information hiding is not used to replace encryption technology, through the combination of the two can often achieve more secure protection. Text, image, video, audio, network protocol data unit and so on are often used as information hiding carriers. Image, video and other multimedia data are rich in related research results because of their large redundant space and insensitive to modification, while text is limited to embedding, poor system robustness and immature development of natural language processing technology, and less attention has been paid to the research of text information hiding and detection algorithms. Although the use of text as the carrier of information is limited, but in the open Internet environment, the application of text is more extensive, and the attacker's attention is not on the text, so the research on text-based information hiding algorithm has a broad application prospect. Therefore, the design of an algorithm with better concealment, higher embedding rate and better robustness has become an urgent problem for researchers to solve. In this paper, we mainly do the following work: 1) the security analysis of the hidden algorithm based on invisible characters is carried out, and a simple detection method is given. This method can effectively detect the secret information in the current invisible character hiding algorithm, and find some new characters that can be used in the invisible character hiding algorithm in the latest Unicode standard, so as to increase the embedding rate of the algorithm and avoid the current detection algorithm for common invisible characters. 2) A text information hiding algorithm based on new invisible characters and hash functions is proposed. The algorithm makes effective use of invisible characters and hash functions. Before the embedding process, the algorithm segment and odd-even code the secret information, and the secret information will be embedded in blocks. The algorithm has a good performance in security and embedding rate. 3) the concepts of odd collision and even collision are defined by using the hash collision phenomenon in hash function, and the embedding capacity of a collided text segment is transferred to the next segment (instead of wasting this capacity), which enhances the embedding rate and security of the algorithm.
【學(xué)位授予單位】:安徽大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP309
【相似文獻】
相關(guān)期刊論文 前10條
1 吳建軍;周倫鋼;;信息隱藏算法研究及實現(xiàn)[J];華北水利水電學(xué)院學(xué)報;2006年01期
2 張永紅;;一種基于混沌序列的多幅圖像隱藏算法[J];計算機工程與應(yīng)用;2008年17期
3 張彤;;兩幅圖像相互隱藏算法[J];中國西部科技;2009年22期
4 張偉,陳蕓,鄒漢斌,周霆;基于倒排文件的布爾規(guī)則隱藏算法[J];計算機工程;2005年14期
5 高鐵杠;顧巧論;;一種大容量的圖像可逆信息隱藏算法[J];光電子.激光;2008年05期
6 張永紅;周煥芹;高輝;;基于廣義混沌序列的多幅圖像隱藏算法[J];渭南師范學(xué)院學(xué)報;2009年02期
7 黃力;;基于相同圖像的抗攻擊信息隱藏算法研究[J];微電子學(xué)與計算機;2010年04期
8 奚吉;梁瑞宇;;可逆信息隱藏算法綜述[J];信息化研究;2011年03期
9 周煥芹;張永紅;;一種基于混沌序列的多幅圖像隱藏算法[J];渭南師范學(xué)院學(xué)報;2007年05期
10 李敏強;郭寶龍;魏巍;;內(nèi)容指導(dǎo)的自適應(yīng)時域錯誤隱藏算法[J];計算機工程與應(yīng)用;2009年34期
相關(guān)會議論文 前10條
1 劉翠香;孫洪祥;溫巧燕;廖鑫;;基于二次V系統(tǒng)的圖像信息隱藏算法[A];中國通信學(xué)會第六屆學(xué)術(shù)年會論文集(上)[C];2009年
2 楊峽;陳亮;;自適應(yīng)容量估計的神經(jīng)網(wǎng)絡(luò)圖像隱藏算法[A];第一屆建立和諧人機環(huán)境聯(lián)合學(xué)術(shù)會議(HHME2005)論文集[C];2005年
3 田鵬義;周輝;許定根;;基于壓縮感知的圖像隱藏算法研究[A];虛擬運營與云計算——第十八屆全國青年通信學(xué)術(shù)年會論文集(下冊)[C];2013年
4 蔡洪亮;李波;盧昱;楊明;;信息隱藏技術(shù)綜述[A];2006通信理論與技術(shù)新進展——第十一屆全國青年通信學(xué)術(shù)會議論文集[C];2006年
5 白晶晶;陳孝威;;基于小波域的大容量信息隱藏算法[A];第三屆和諧人機環(huán)境聯(lián)合學(xué)術(shù)會議(HHME2007)論文集[C];2007年
6 李立宗;高鐵杠;畢磊;陳超;;基于雙混沌序列的大容量信息隱藏算法優(yōu)化研究[A];中國儀器儀表學(xué)會第九屆青年學(xué)術(shù)會議論文集[C];2007年
7 劉程遠(yuǎn);王小銘;;基于自適應(yīng)融合系數(shù)矩陣的圖像隱藏算法[A];第十二屆全國圖象圖形學(xué)學(xué)術(shù)會議論文集[C];2005年
8 謝建全;黃大足;謝R,
本文編號:2508658
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/2508658.html