欢迎来到天天文库
浏览记录
ID:36435212
大小:4.41 MB
页数:115页
时间:2019-05-10
《信息安全中的信息隐藏理论和方法研究》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、大连理工大学博士学位论文信息安全中的信息隐藏理论和方法研究姓名:孔祥维申请学位级别:博士专业:管理科学与工程指导教师:杨德礼20030301AbstractThedigitalinformationrevolutionhasbroughtprofoundchangesintooursocietyandlife.TheprevalenceofdigitalmediaandIntemethasgeneratedgreatchallengesaswellasopportunitiesforinnovation.Digitalproductscopyright
2、protection,informationcontentsecurityandsecuritycommunicationmakeinformationhidingthatisanewscienceandartofinformationsecurityfield.Asalleffectivetechniqueusedforconvertcommunicationandcopyrightprotection,informationhidinghasdrawnalotofattentionoverthepastfeWyearsinthefieldofinf
3、ormationsecurity.Thisthesisdiscussestheissuesregardingmultimediainformationhidingtheoryandmethodformultimediacopyrightprotectionandsecuritycommunication.Italsoaddressescopyrightprotectionsystemofdigitalproducts,digitalwatermarkingsystem,steganographyevaluationandsteganalysis.Bas
4、edonthestudyofdigitalproductsdistributionchannelintheIntemetaswellasallparticipants’rightandbenefits,thepaperanalysesthefunctionsofintellectualpropertyprotectiondepartments,suchasmanagement,copyrightorganization,supervisionanddigitalwatermarking.Adigitalproductscopyrightprotecti
5、onsystemmodelbasedondigitalwatermarkinghasbeenproposedasthefinalresultofthispart.【ntherobustdigitalwatermarkingsystemspart.arobustwatermarkingembeddingmechanismandawatermarkingdetectorbasedonminimumerrorratearepresented.Basedontherobustwatermarkingmodel,ambustandblindwatermarkin
6、gschemeforprintandSCanimagesandarobustandblindwatermarkingschemeforimageobjectareproposed.Inthenlirdpart.theessencesofsteganographyanddisadvangesofcommonvisualperceptionevaluation,suchasPSNRandWPSNRarestudied.Basedonanalysislocalerrorthatisintroducedbyembeddinginformation,combin
7、ingHVS,threeobjectiveperceptionevaluationmethodforsteganographyperformanceareproposed,whicharebasedonHumanVisualSystemsandlocalstatisticerrordistributionrespectively.Inthesteganalysispart,asteganographysecuritystatisticattackmodelandmethodsforsomesteganographymethodsarepresented
8、.Accordingtothepresentedsteganalysismodel,asteg
此文档下载收益归作者所有