优秀的毕业设计论文网
计算机 JAVA 电子信息 单片机 机械机电 模具 土木工程 建筑结构 论文
热门搜索词:网络 ASP.NET 汽车 电气 数控 PLC

图片文件中的信息隐藏和还原的设计(VC++)

以下是资料介绍,如需要完整的请充值下载.
1.无需注册登录,支付后按照提示操作即可获取该资料.
2.资料以网页介绍的为准,下载后不会有水印.资料仅供学习参考之用.
  
资料介绍:

图片文件中的信息隐藏和还原的设计摘 要随着信息技术、网络技术、电子商务的迅速发展,网络信息安全将全方位地危及社会的经济、政治和文化等方面。随着计算机硬件的迅速发展,具有并行计算能力的破解技术日益成熟。仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。但对信息隐藏而言,可能的监测者或非法拦截者则难以从公开信息中判断机密信息是否存在,难以截获机密信息。本论文将密码编码学和信息隐藏技术相结合,并通过人眼的视觉冗余来实现对24位位图图片文件的信息隐藏和还原。本系统是基于Windows XP环境下,通过Visual C++6.0开发的。经测试结果表明:通过该最低有效位(LSB)算法,能够实现在一副比如(40×40,4.74KB)的24位位图中隐藏600个字节的信息,并且,图片隐藏信息的能力与它自身的大小成正比。而通信双方只能在输入正确密钥的情况下才能从载体图片中提取出正确的秘密信息;否则得到的将是一堆乱码。从而表明,将密码编码学和信息隐藏相结合使得秘密信息的通信得到了更高的安全的保障。关键词:信息安全;加密算法;信息隐藏;感觉冗余;最低有效位(LSB) think58好,好think58 [版权所有:http://think58.com]

think58.com

[资料来源:http://www.THINK58.com]

copyright think58 [来源:http://www.think58.com]

本文来自think58

[资料来源:http://think58.com]

copyright think58 [资料来源:THINK58.com]

[版权所有:http://think58.com]

The Design of Information Hiding and Recovering in Image FilesAbstractWith the rapid development of information technology, network technology and electronic commerce, network information security will endanger the society such as economic, political and cultural fields, and so on. With the rapid development of computer hardware, nowadays the computers with parallel computing ability can crack information more and more easily. It is not the only option which to increase the key length of encryption algorithm in order to enhance security. On information hiding, it is difficult for the potential monitor or illegally interceptor to judge whether the confidential information exists in the open information or not.This paper combined cryptography and information hiding technology, meanwhile through the seeing redundancy of eyes of mankind to achieve the hiding and recovering of 24 bitmap image files. The system is based on Windows XP and developed through Visual C + +6.0 for development tool. The Experiments recommend that the least-significant-bit(LSB) algorithm, can achieved such a (40 × 40. 4.74KB) 24 bits hidden in bitmap 600 bytes of information, Moreover, the ability of hidden information is proportional to the size of picture. The tow sides of Communication who get the correct key can get the correct secret information from the Photo otherwise, will be the piles of distortion. So we can see that the combination of cryptography and information hiding makes the communication of information much more securely. 本文来自think58

[资料来源:http://THINK58.com]

Key words: Information security Encryption Algorithm Information Hiding Feeling redundancy Least-significant-bit (LSB)目 录论文总页数:19页 [资料来源:THINK58.com]

1 引言11.1 课题背景11.2 信息隐藏技术在国内外的发展及现状11.3 本课题研究的意义21.4 本课题的研究方法22 BMP位图格式简介32.1 BMP简介32.2 BMP文件结构32.2.1 BMP文件组成32.2.2 BMP文件头32.2.3 位图信息头42.2.4 位图数据43 DES算法简介53.1 DES算法流程图53.2 DES解密64 信息隐藏64.1 信息隐藏简介64.2 信息隐藏特点64.3 信息隐藏技术组成74.4 早期的彩色图像信息隐藏方法84.5 LSB算法简介84.6 算法实现思想84.7 主要算法流程图及代码94.7.1 嵌入算法流程94.7.2 提取算法流程105 系统测试125.1 运行结果125.2 测试信息隐藏125.3 测试信息还原14结 论16参考文献17致 谢18声 明19 copyright think58

[来源:http://www.think58.com]

copyright think58 [来源:http://www.think58.com]