研究生: |
吳宗樺 |
---|---|
論文名稱: |
基於循環群之高容量資訊隱藏法 High-embedding capacity method for digit-by-digit embedding in images based on cyclic group |
指導教授: | 張隆紋 |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2005 |
畢業學年度: | 93 |
語文別: | 英文 |
論文頁數: | 24 |
中文關鍵詞: | 循環群 、最低有效位元 、模指數 、最佳化 |
外文關鍵詞: | cyclic group, LSB, modulus operation, optimal procedure |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在資訊隱藏或資訊嵌入的技術中, LSB 的方法在這個領域中是最廣為人知的,LSB 通常假設隱藏的資訊都是以2為基底來嵌入,然而當所需隱藏的資訊並不是2的基底時,就必須做基底轉換的額外動作,同時也造成了隱藏空間的浪費,
而且目前其他所提出來改進LSB的方法,僅是改善嵌入資訊後的影像品質,但取出資訊的方法依舊等同於LSB,這對於一個廣為人知的嵌入技術來說並不安全。
□□]此本篇論文發展出一個新的資訊隱藏技術,可以適用於不同隱藏資料的數字基底,解決了可能浪費隱藏空間的問題,同時,我們跳脫了LSB的技術架構,
也就是說取出資料了方法不再如同LSB,而是必須用我們發展的演算法取出資料,但所花費的計算時間接近於LSB,且隱藏後的影像品質甚至優於其他LSB相關的方法。
There are many of research have been proposed for embedding information into cover images. The LSB approach is a well known method to most of people in the field. It usually assumes that the base of the numerical data being hidden is a whole power of 2. When the base of the number is not a power of 2 , a base transform must be used to convert it.
The study presents a novel and simple method for high-hiding capacity. The concept is based on the concept of cyclic group. Unlike the other method to improve the quality of stego-image, but the approach of extract secret data is still the same with LSB. Our method escape the frame of LSB, that means the approach to extract secret data is not the same with LSB but the quality of stego-image is even better than other optimal LSB methods
[1] B. Schneier, Applied Cryptography, second ed., Wiley, New York, 1996.
[2] National Bureau of Standards, Data Encryption Standard, FIPS Publication 46, US Department of Commerce, 1977.
[3] R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM 21 (2) (1978) 120–126.
[4] N. Provos, P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security Privacy Mag. 1 (3) (2003) 32–44.
[5] J.K. Jan, Y.M. Tseng, On the security of image encryption method, Inform Process. Lett 60 (1996) 261-265.
[6] N. Bourbakis, C. Alexopoulos, Picture data encryption using scan patterns, Pattern Recognition 25 (6) (1992) 567-581.
[7] H.J. Highland, Data encryption: a non-mathematical approach, Comput. Security 16 (1997) 369-386.
[8] M.Y. Rhee, Cryptography and Secure Communication, McGraw-Hill Book Co, Singpore, 1994.
[9] W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Systems J 35 (3&4) (1996) 313-336.
[10] R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3)(2001) 671–683.
[11] A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , Chih-Ching Thien, Ja-Chen Lin