Dissertation > Excellent graduate degree dissertation topics show

The Design and Implementation of an Intelligence Transfer System Based on Information Hiding

Author: LiShangZeng
Tutor: YangYueXiang
School: National University of Defense Science and Technology
Course: Computer technology
Keywords: Information Hiding information security intelligence transfer integer wavelets transform wavetets transform
CLC: TP311.52
Type: Master's thesis
Year: 2007
Downloads: 63
Quote: 1
Read: Download Dissertation

Abstract


With the constantly in-depth advance in and application of information technology, information security has been paid more and more attention to by each country in the world. Presently, it is advancing towards two directions. One’s core is modern cryptology, which protects the information by encrypting its content. The other’s core is Information Hiding, which hide the content of information. Therefore, Information Hiding has caused a wide attention among military apartments across the world, for its better hiding performance over cryptology.The whole thesis is made up of two sections: 1. The study of Information Hiding technologies. In this section, we combined LSB algorithm and wavelets transform domain algorithm, then proposed a high-capability information hiding algorithm based on integer wavelets transform. Compared with LSB algorithm by experiments, this one reached higher PSNR value. 2. The design and implementation of an intelligence transfer system based on information hiding technologies. This thesis detailed the requirements of this system, designed the framework and solved all key issues of specific modules.This system gained a high transmision ratio and rate during the three experiments in campus network, and has been proved to be valuable for improving security and timeliness of intelligence transfer applications.

Related Dissertations

  1. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  2. Study on Strategy of Our National Confidential E-government Nets’ Information Security Construction,D630
  3. Research on the Application of Image Information Hiding Technique,TP309.7
  4. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  5. Study on Information Security of C Company,F270.7
  6. Study on Information Management Security and Countermeasures of A Power Supply Company,F426.61
  7. Research on Information Hiding Based on Images,TP309.7
  8. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  9. Digital Information Resources System Security Risk Assessment,G353.1
  10. The Study of Image Watermark Base on Discrete Wavelet Transformation,TP309.7
  11. Design and Implementation of the online bidding system for information security,TP393.08
  12. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  13. Research and Implementation of Information Security Strategy in Electric Enterprises,TP393.08
  14. Reliability and Security Study of the Digital Substation System,TM732
  15. Memory Integrality Verify Oriented Cache Design,TP332
  16. Optical Image Encryption Algorithms Based on Fractional Mellin Transform,TP309.7
  17. Research of the Rational Secret Sharing Technology,TN918.1
  18. Text CPS technology combined with a sense of community radio and personal digital medical implement,TP399-C8
  19. Rootkit technology in the Third-Party Information Security System Research,TP309
  20. Based on real-time voice communications Information Hiding Technology,TP309
  21. Telecom companies Information Security Risk Management Research Project,F626

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer software > Program design,software engineering > Software Engineering > Software Development
© 2012 www.DissertationTopic.Net  Mobile