資源描述:
《信息安全中的信息隱藏理論和方法研究(I)》由會(huì)員上傳分享,免費(fèi)在線閱讀,更多相關(guān)內(nèi)容在學(xué)術(shù)論文-天天文庫。
1、大連理工大學(xué)博士學(xué)位論文信息安全中的信息隱藏理論和方法研究姓名:孔祥維申請(qǐng)學(xué)位級(jí)別:博士專業(yè):管理科學(xué)與工程指導(dǎo)教師:楊德禮20030301AbstractThedigitalinformationrevolutionhasbroughtprofoundchangesintooursocietyandlife.TheprevalenceofdigitalmediaandIntemethasgeneratedgreatchallengesaswellasopportunitiesforinnovation.Digitalproductscopyrightprotecti
2、on,informationcontentsecurityandsecuritycommunicationmakeinformationhidingthatisanewscienceandartofinformationsecurityfield.Asalleffectivetechniqueusedforconvertcommunicationandcopyrightprotection,informationhidinghasdrawnalotofattentionoverthepastfeWyearsinthefieldofinformationsecurity
3、.Thisthesisdiscussestheissuesregardingmultimediainformationhidingtheoryandmethodformultimediacopyrightprotectionandsecuritycommunication.Italsoaddressescopyrightprotectionsystemofdigitalproducts,digitalwatermarkingsystem,steganographyevaluationandsteganalysis.Basedonthestudyofdigitalpro
4、ductsdistributionchannelintheIntemetaswellasallparticipants’rightandbenefits,thepaperanalysesthefunctionsofintellectualpropertyprotectiondepartments,suchasmanagement,copyrightorganization,supervisionanddigitalwatermarking.Adigitalproductscopyrightprotectionsystemmodelbasedondigitalwater
5、markinghasbeenproposedasthefinalresultofthispart.【ntherobustdigitalwatermarkingsystemspart.a(chǎn)robustwatermarkingembeddingmechanismandawatermarkingdetectorbasedonminimumerrorratearepresented.Basedontherobustwatermarkingmodel,ambustandblindwatermarkingschemeforprintandSCanimagesandarobustan
6、dblindwatermarkingschemeforimageobjectareproposed.Inthenlirdpart.theessencesofsteganographyanddisadvangesofcommonvisualperceptionevaluation,suchasPSNRandWPSNRarestudied.Basedonanalysislocalerrorthatisintroducedbyembeddinginformation,combiningHVS,threeobjectiveperceptionevaluationmethodf
7、orsteganographyperformanceareproposed,whicharebasedonHumanVisualSystemsandlocalstatisticerrordistributionrespectively.Inthesteganalysispart,asteganographysecuritystatisticattackmodelandmethodsforsomesteganographymethodsarepresented.Accordingtothepresentedsteganalysismodel,asteg