研究生: |
黃佩琳 Huang, Pei Lin |
---|---|
論文名稱: |
以線性反饋移位暫存器實作生物影像藏密演算法 Steganography Using Biometric Images and Linear Feedback Shift Register (LFSR) |
指導教授: |
陳朝欽
Chen, Chuar Chin |
口試委員: |
蘇豐文
Soo, Von Wen 陳煥宗 Chen, Hwann Tzong |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 英文 |
論文頁數: | 19 |
中文關鍵詞: | 隱寫術 、資料藏密 、生物影像 、線性反饋移位暫存器 |
外文關鍵詞: | Steganography, Data Hiding, Biometric Images, Linear Feedback Shift Register(LFSR) |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隱寫術及密碼學這兩項技術皆是用來保護資訊在傳輸過程中不容易被他人擷取,若將此兩項技術結合,則能大幅提升訊息的安全性。
在本篇論文中,我們提出一個以最低有效位(LSB)為基底的隱寫術,為了增強演算法的安全性,我們使用線性反饋移位暫存器(LFSR)去產生亂數序列,並將此序列與秘密訊息做異或運算(XOR),最後再將加密完的文章嵌入在生物影像當中;在藏密量方面,取決於祕密訊息的大小,我們的演算法最多支援到四個最低有效位的取代,在此實驗中,我們使用峰值信噪比(PSNR)、藏密量以及執行時間證明此方法的有效性。結果顯示此方法的運算時間很短並維持高的峰值信噪比。
Steganography and cryptography are techniques that try to protect message from being captured during data transmission. Algorithms which combined steganography and cryptography can provide a higher security.
In this thesis, we propose a least significant bit (LSB) based steganography. In order to enhance the security, we use linear feedback shift register (LFSR) to generate random sequences to do exclusive-or (XOR) operations with the secret message and then embed the ciphered message into biometric images. In the capacity aspect, our algorithm can support up to four least significant bits (4LSB) replacement according to the size of message. The effectiveness of the proposed method is estimated by peak signal-to-noise ratio (PSNR), embedding rate and execution time. The results show that high PSNR values with short execution time is feasible.
[Goel2013] S. Goel, A. Rana, and M. Kaur. "A Review of Comparison Techniques of Image Steganography." Global Journal of Computer Science and Technology, Vol. 13, No. 4, 9-14, 2013.
[Karu1996] K. Karu, and A.K. Jain. "Fingerprint classification." Pattern Recognition, Vol. 29, No. 3, 284-404, 1996.
[Li2011] B. Li, J. He, J. Huang, Y.Q. Shi. "A survey on image steganography and steganalysis." Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, 142-172, 2011.
[Moha2015] C. Mohapatra, and M. Pandey. "A Review on current Methods and application of Digital image Steganography." International Journal of Multidisciplinary Approach & Studies, Vol. 2, No. 2, 163-178, 2015.
[Prov2003] N. Provos, and P. Honeyman. "Hide and seek: An introduction to steganography." Security & Privacy, IEEE, Vol. 1, No. 3, 32-44, 2003.
[Qaza2014] K. Qazanfari, and R. Safabakhsh. "A new steganography method which preserves histogram: Generalization of LSB++." Information Sciences 277, 90-101, 2014.
[Wali2010] E. Walia, P. Jain, and Navdeep. "An analysis of LSB & DCT based steganography." Global Journal of Computer Science and Technology, Vol. 10, No. 1, 4-8, 2010.
[West2001] A. Westfeld. "F5—A Steganographic Algorithm : High Capacity Despite Better Steganalysis." The International Workshop on Information Hiding, Springer-Verlag, 289-302, 2001.
[Ziel2014] E. Zielińska, W. Mazurczyk, and K. Szczypiorski. "Trends in steganography." Communications of the ACM, Vol. 57, No.3, 86-95, 2014.
[Web01] https://en.wikipedia.org/wiki/JPEG, last access on May 13, 2016.
[Web02] https://en.wikipedia.org/wiki/Linear_feedback_shift_register, last access on May 13, 2016.
[Web03] http://homepages.cae.wisc.edu/~ece553/handouts/LFSR-notes.PDF, last access on May 13, 2016.
[Web04] http://www.cs.nthu.edu.tw/~cchen/Rindex28/R28.html, last access on May 13, 2016.
[Web05] http://www.cs.nthu.edu.tw/~cchen/FaceNTHU/face40.html, last access on May 13, 2016.
[Web06] http://www2.sdfi.edu.cn/netclass/jiaoan/englit/download/Harry%20Potter%20and%20the%20Sorcerer's%20Stone.pdf, last access on May 13, 2016.