Abstract
Abstract
Thenetworkcomputertechnologyandthemultimediatechnologyofbooming
developmentforthemoreextensivespreadinformationprovidedmoreconveniences.InthedevelopmentoftheconvenientforUStOuseandtransferofinformationandthesafetyoftheproposedagreatchallenge.Andinformationhidingtechnologyitselfisthenetworkinformationsafetyofanimportanttechnology,ithasmanyscholarsathomeandabroadhasbecomethefocusofresearch.Wespeakofinformationhidingisthesecretinformationhidinginthepublicinformationofthecarrier,andthroughthepubliccarriertransmissionandtosecrethiddentransferofinformation.Thispaperfirstintroducedtheinformationhidingtechnologydevelopmenthistoryand,todayhowinformationtechnologyisdevelopment,andforthepurposeofinformationhidingtechnologyresearchandsignificanceofthedeepinthispaper.Makethereaderunderstandinformationhidingishowtohappen.Anddetailedinformationhidingtechnologyintroducedallaspectsofthecase,includingitsprinciple,model,classification,characteristics,ofinformationhidingtechnologyassessment,informationhidingtechnologyapplication,Inthelastofinformationhidingtechnologyandthetwoalgorithmsisintroduced,whichmakestheinformationhidingtechnologyitselfhasthefurtherinformation.TowhichtheairspaceafteralgorithmLSBalgorithmareanalyzed,andtheitsinMatlab,thesimulationexperimentoncharacters,includingembeddedandextractionofembeddedandextractionoftheimage.Thispaperalsointroducessomeofinformationhidingagainsttestingmethodsomedetectiontechnologyindetail,includinginformationhidingtechnologytwokindsofthemostcommonattackagainstalgorithmandcardalgorithmRSpartyattackalgorithm.Finally,basedonthecharacteristicsoftheLSBalegiveninthispaperLSBalgorithmfortheII