資源描述:
《信息安全中的信息隱藏理論和方法研究》由會(huì)員上傳分享,免費(fèi)在線閱讀,更多相關(guān)內(nèi)容在學(xué)術(shù)論文-天天文庫。
1、大連理工大學(xué)博士學(xué)位論文信息安全中的信息隱藏理論和方法研究姓名:孔祥維申請學(xué)位級(jí)別:博士專業(yè):管理科學(xué)與工程指導(dǎo)教師:楊德禮20030301AbstractThedigitalinformationrevolutionhasbroughtprofoundchangesintooursocietyandlife.TheprevalenceofdigitalmediaandIntemethasgeneratedgreatchallengesaswellasopportunitiesforinnovation.Digitalproductscopyright
2、protection,informationcontentsecurityandsecuritycommunicationmakeinformationhidingthatisanewscienceandartofinformationsecurityfield.Asalleffectivetechniqueusedforconvertcommunicationandcopyrightprotection,informationhidinghasdrawnalotofattentionoverthepastfeWyearsinthefieldofinf
3、ormationsecurity.Thisthesisdiscussestheissuesregardingmultimediainformationhidingtheoryandmethodformultimediacopyrightprotectionandsecuritycommunication.Italsoaddressescopyrightprotectionsystemofdigitalproducts,digitalwatermarkingsystem,steganographyevaluationandsteganalysis.Bas
4、edonthestudyofdigitalproductsdistributionchannelintheIntemetaswellasallparticipants’rightandbenefits,thepaperanalysesthefunctionsofintellectualpropertyprotectiondepartments,suchasmanagement,copyrightorganization,supervisionanddigitalwatermarking.Adigitalproductscopyrightprotecti
5、onsystemmodelbasedondigitalwatermarkinghasbeenproposedasthefinalresultofthispart.【ntherobustdigitalwatermarkingsystemspart.a(chǎn)robustwatermarkingembeddingmechanismandawatermarkingdetectorbasedonminimumerrorratearepresented.Basedontherobustwatermarkingmodel,ambustandblindwatermarkin
6、gschemeforprintandSCanimagesandarobustandblindwatermarkingschemeforimageobjectareproposed.Inthenlirdpart.theessencesofsteganographyanddisadvangesofcommonvisualperceptionevaluation,suchasPSNRandWPSNRarestudied.Basedonanalysislocalerrorthatisintroducedbyembeddinginformation,combin
7、ingHVS,threeobjectiveperceptionevaluationmethodforsteganographyperformanceareproposed,whicharebasedonHumanVisualSystemsandlocalstatisticerrordistributionrespectively.Inthesteganalysispart,asteganographysecuritystatisticattackmodelandmethodsforsomesteganographymethodsarepresented
8、.Accordingtothepresentedsteganalysismodel,asteg