Research of Coverless Information Hiding Method Based on Emo

发布时间:2021-03-24 22:27
  自人类社会进入21世纪以来,人们对互联网的使用日益增加。随着互联网渗透到我们生活的方方面面,互联网上的信息量呈爆炸式增长。由此产生的信息安全问题已成为当代社会的热点问题之一。在4G网络广泛使用之后,人们经常使用一些应用程序,包括社交,食品,金融,旅行,住宿,医疗,教育和娱乐等方面,使用的同时泄漏大量个人信息。一旦这些个人信息被非法的网站和机构收集,将被用于电信欺诈,这极大地威胁了社会稳定。在5G技术飞速发展的今天,信息安全问题不仅与个人息息相关,而且还关系到企业,社会和国家的发展。从历史上看,人们提出了许多措施来维护信息安全。最典型的方法是加密。在早期的古典密码学中,人们利用诗词和字画来隐藏信息。在现代密码学中,人们开始依靠电子计算机和现代数学理论。在近代,研究者提出了公钥加密算法,使密码学成为一个成熟的理论体系。密码学在过去的信息对抗中发挥了关键作用,但是密码学也有明显的缺陷。因此,在现代信息安全问题中,信息隐藏技术得到了越来越广泛的使用。传统的信息隐藏技术是根据一定的规则将秘密信息隐藏到载体中,并利用载体的冗余特性来达到隐藏信息的目的。就信息安全性和传输过程的鲁棒性而言,信息隐藏技... 

【文章来源】:华中师范大学湖北省 211工程院校 教育部直属院校

【文章页数】:75 页

【学位级别】:硕士

【文章目录】:
Abstract
摘要
Acknowledgements
1 Introduction
    1.1 Research background
    1.2 Research challenges
    1.3 Objectives and contributions
    1.4 Thesis structure
    1.5 Summary
2 Literature Review
    2.1 Classic information hiding methods
        2.1.1 Least Significant Bits(LSB)
        2.1.2 The method of Discrete Cosine Transform(DCT)
        2.1.3 The method of Discrete Wavelet Transform(DWT)
        2.1.4 Bag-of-Words model(BOW)
        2.1.5 Information hiding technology based on GAN
    2.2 Steganography method based on social network
    2.3 The method in this thesis
    2.4 Summary
3 Coverless Information Hiding Algorithm Based on Emoji Image Set
    3.1 The characteristics and coding methods of emoji
        3.1.1 The characteristics of emoji
        3.1.2 Unicode and encoding rules
    3.2 Research on logistics chaotic sequence theory
        3.2.1 Logistic chaotic sequence
        3.2.2 The characteristics of chaotic
    3.3 The design of the information hiding system
        3.3.1 Get emoji image set
        3.3.2 Preprocessing of secret information
        3.3.3 Generation of chaotic sequences
        3.3.4 Establish mapping relationship with emoji image
        3.3.5 Extract secret information from the received information
    3.4 Instant communication hiding method based on combination of text and ex-pression image
        3.4.1 System framework
        3.4.2 Chinese text to generate anchor tags
        3.4.3 Expression of the number and capacity of expression image
    3.5 An application scenario based on social network environment
        3.5.1 The specific idea of the scenario
        3.5.2 Application method of information hiding technology in the scenario
    3.6 Summary
4 Performance Testing
    4.1 Functional test of the system
        4.1.1 Information hiding based on emoji with sorted bits
        4.1.2 Information hiding based on the mix of text and emoji
        4.1.3 Simple simulation of application scenarios
    4.2 Performance testing of the system
        4.2.1 Security
        4.2.2 Capacity
        4.2.3 Robustness
    4.3 Summary
5 Conclusion and Future Work
References


【参考文献】:
期刊论文
[1]基于图像Bag-of-Words模型的无载体信息隐藏[J]. 周志立,曹燚,孙星明.  应用科学学报. 2016(05)
[2]基于网络聊天环境的秘密信息隐蔽通信研究[J]. 王东,熊世桓.  内蒙古师范大学学报(自然科学汉文版). 2014(05)
[3]一种基于文本和表情符号的信息隐藏算法[J]. 周苑,周岩.  河南工程学院学报(自然科学版). 2013(02)



本文编号:3098509

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/shengwushengchang/3098509.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户5ff26***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com