新型文本信息隐藏算法研究
[Abstract]:Information hiding is a science and art of embedding secret information into harmless carrier data by confusing means. It requires that the distortion caused by the embedding process to the carrier is imperceptible. Information hiding is not only an ancient technology, but also a young subject. It was widely used by the army to achieve secure communication during the ancient Greek and Roman wars, but then gradually marginalized. It was not until the development of Internet technology that information hiding was really concerned and widely studied. Encryption technology used to be considered sufficient to protect the security of people's communications. Encryption technology only prevents unauthorized people from reading the information, but the encrypted random code data exposes the importance of the information itself, but it is more likely to cause targeted surveillance and attack by interceptors. Different from cryptography, the purpose of information hiding is to hide the fact that secret information exists, so as to avoid attracting the attention of interceptors. However, information hiding is not used to replace encryption technology, through the combination of the two can often achieve more secure protection. Text, image, video, audio, network protocol data unit and so on are often used as information hiding carriers. Image, video and other multimedia data are rich in related research results because of their large redundant space and insensitive to modification, while text is limited to embedding, poor system robustness and immature development of natural language processing technology, and less attention has been paid to the research of text information hiding and detection algorithms. Although the use of text as the carrier of information is limited, but in the open Internet environment, the application of text is more extensive, and the attacker's attention is not on the text, so the research on text-based information hiding algorithm has a broad application prospect. Therefore, the design of an algorithm with better concealment, higher embedding rate and better robustness has become an urgent problem for researchers to solve. In this paper, we mainly do the following work: 1) the security analysis of the hidden algorithm based on invisible characters is carried out, and a simple detection method is given. This method can effectively detect the secret information in the current invisible character hiding algorithm, and find some new characters that can be used in the invisible character hiding algorithm in the latest Unicode standard, so as to increase the embedding rate of the algorithm and avoid the current detection algorithm for common invisible characters. 2) A text information hiding algorithm based on new invisible characters and hash functions is proposed. The algorithm makes effective use of invisible characters and hash functions. Before the embedding process, the algorithm segment and odd-even code the secret information, and the secret information will be embedded in blocks. The algorithm has a good performance in security and embedding rate. 3) the concepts of odd collision and even collision are defined by using the hash collision phenomenon in hash function, and the embedding capacity of a collided text segment is transferred to the next segment (instead of wasting this capacity), which enhances the embedding rate and security of the algorithm.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
【相似文献】
相关期刊论文 前10条
1 吴建军;周伦钢;;信息隐藏算法研究及实现[J];华北水利水电学院学报;2006年01期
2 张永红;;一种基于混沌序列的多幅图像隐藏算法[J];计算机工程与应用;2008年17期
3 张彤;;两幅图像相互隐藏算法[J];中国西部科技;2009年22期
4 张伟,陈芸,邹汉斌,周霆;基于倒排文件的布尔规则隐藏算法[J];计算机工程;2005年14期
5 高铁杠;顾巧论;;一种大容量的图像可逆信息隐藏算法[J];光电子.激光;2008年05期
6 张永红;周焕芹;高辉;;基于广义混沌序列的多幅图像隐藏算法[J];渭南师范学院学报;2009年02期
7 黄力;;基于相同图像的抗攻击信息隐藏算法研究[J];微电子学与计算机;2010年04期
8 奚吉;梁瑞宇;;可逆信息隐藏算法综述[J];信息化研究;2011年03期
9 周焕芹;张永红;;一种基于混沌序列的多幅图像隐藏算法[J];渭南师范学院学报;2007年05期
10 李敏强;郭宝龙;魏巍;;内容指导的自适应时域错误隐藏算法[J];计算机工程与应用;2009年34期
相关会议论文 前10条
1 刘翠香;孙洪祥;温巧燕;廖鑫;;基于二次V系统的图像信息隐藏算法[A];中国通信学会第六届学术年会论文集(上)[C];2009年
2 杨峡;陈亮;;自适应容量估计的神经网络图像隐藏算法[A];第一届建立和谐人机环境联合学术会议(HHME2005)论文集[C];2005年
3 田鹏义;周辉;许定根;;基于压缩感知的图像隐藏算法研究[A];虚拟运营与云计算——第十八届全国青年通信学术年会论文集(下册)[C];2013年
4 蔡洪亮;李波;卢昱;杨明;;信息隐藏技术综述[A];2006通信理论与技术新进展——第十一届全国青年通信学术会议论文集[C];2006年
5 白晶晶;陈孝威;;基于小波域的大容量信息隐藏算法[A];第三届和谐人机环境联合学术会议(HHME2007)论文集[C];2007年
6 李立宗;高铁杠;毕磊;陈超;;基于双混沌序列的大容量信息隐藏算法优化研究[A];中国仪器仪表学会第九届青年学术会议论文集[C];2007年
7 刘程远;王小铭;;基于自适应融合系数矩阵的图像隐藏算法[A];第十二届全国图象图形学学术会议论文集[C];2005年
8 谢建全;黄大足;谢R,
本文编号:2508658
本文链接:https://www.wllwen.com/shoufeilunwen/xixikjs/2508658.html