簡易檢索 / 詳目顯示

研究生: 吳宗樺
論文名稱: 基於循環群之高容量資訊隱藏法
High-embedding capacity method for digit-by-digit embedding in images based on cyclic group
指導教授: 張隆紋
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2005
畢業學年度: 93
語文別: 英文
論文頁數: 24
中文關鍵詞: 循環群最低有效位元模指數最佳化
外文關鍵詞: cyclic group, LSB, modulus operation, optimal procedure
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在資訊隱藏或資訊嵌入的技術中, LSB 的方法在這個領域中是最廣為人知的,LSB 通常假設隱藏的資訊都是以2為基底來嵌入,然而當所需隱藏的資訊並不是2的基底時,就必須做基底轉換的額外動作,同時也造成了隱藏空間的浪費,
    而且目前其他所提出來改進LSB的方法,僅是改善嵌入資訊後的影像品質,但取出資訊的方法依舊等同於LSB,這對於一個廣為人知的嵌入技術來說並不安全。

    □□]此本篇論文發展出一個新的資訊隱藏技術,可以適用於不同隱藏資料的數字基底,解決了可能浪費隱藏空間的問題,同時,我們跳脫了LSB的技術架構,
    也就是說取出資料了方法不再如同LSB,而是必須用我們發展的演算法取出資料,但所花費的計算時間接近於LSB,且隱藏後的影像品質甚至優於其他LSB相關的方法。


    There are many of research have been proposed for embedding information into cover images. The LSB approach is a well known method to most of people in the field. It usually assumes that the base of the numerical data being hidden is a whole power of 2. When the base of the number is not a power of 2 , a base transform must be used to convert it.
    The study presents a novel and simple method for high-hiding capacity. The concept is based on the concept of cyclic group. Unlike the other method to improve the quality of stego-image, but the approach of extract secret data is still the same with LSB. Our method escape the frame of LSB, that means the approach to extract secret data is not the same with LSB but the quality of stego-image is even better than other optimal LSB methods

    Chapter 1 Introduction.............................1 Chapter 2 Related Work.............................3 Chapter 3 The Proposed Method......................6 Chapter 4 Experimental Result.....................14 Chapter 5 Conclusion..............................23 Reference.........................................24

    [1] B. Schneier, Applied Cryptography, second ed., Wiley, New York, 1996.
    [2] National Bureau of Standards, Data Encryption Standard, FIPS Publication 46, US Department of Commerce, 1977.
    [3] R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM 21 (2) (1978) 120–126.
    [4] N. Provos, P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security Privacy Mag. 1 (3) (2003) 32–44.
    [5] J.K. Jan, Y.M. Tseng, On the security of image encryption method, Inform Process. Lett 60 (1996) 261-265.
    [6] N. Bourbakis, C. Alexopoulos, Picture data encryption using scan patterns, Pattern Recognition 25 (6) (1992) 567-581.
    [7] H.J. Highland, Data encryption: a non-mathematical approach, Comput. Security 16 (1997) 369-386.
    [8] M.Y. Rhee, Cryptography and Secure Communication, McGraw-Hill Book Co, Singpore, 1994.
    [9] W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Systems J 35 (3&4) (1996) 313-336.
    [10] R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3)(2001) 671–683.
    [11] A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , Chih-Ching Thien, Ja-Chen Lin

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE