簡易檢索 / 詳目顯示

研究生: 蔡坤祐
Tsai, Kun-Yu
論文名稱: 基於互斥或加密實作彩色影像加密演算法
Steganography in Color Images With Exclusive-or Encryption
指導教授: 陳朝欽
Chen, Chaur-Chin
口試委員: 張隆紋
黃仲陵
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2020
畢業學年度: 108
語文別: 英文
論文頁數: 24
中文關鍵詞: 隱寫術互斥或加密資料安全資料加密資料隱藏
外文關鍵詞: Steganography, Exclusive-or Encryption, Information security, Data hiding, Data encryption
相關次數: 點閱:4下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著網路時代的來臨與進步,越來越多人利用網路去傳輸他們的資料或檔案,然而,忽略去保護資料的安全變成人們常犯的錯誤,這種疏忽給了有心人士去竊取你的檔案、重要資料,造成受害者蒙受重大損失。因此,資訊安全成為現今人們最重要的課題之一,越來越多人從事關於資訊安全的相關研究。在本篇論文中,我們嘗試將訊息先轉成二進制碼,然後透過互斥或進行加密,最後再利用最低有效位元演算法將加密過後的訊息藏匿到圖片中。實驗證實在絕大多數的情況下,人眼無法輕易分辨哪些圖片是有暗藏傳送者真正想傳送的訊息,且因為訊息在先前已用互斥或加密過,即便資料被有心人士盜取,他們也會因為沒有密鑰而無法將加密過後的訊息進行解密,從而達到保障資訊安全的目標。此外,我們所提出的方法並不會因為不同的檔案格式而受到限制。


    With the advent and advancement of the Internet age, more and more people use the Internet to transmit their data or files. However, ignoring data security has become a common mistake. This negligence gives chances to hackers or intruders to steal their data or private information and makes the victims suffer from heavy losses. Therefore, information security has become one of the top issues today, more and more people are engaged in related research on information security. In this thesis, we try to convert the secret message into binary code, then encrypt it by adopting the exclusive-or cipher, and finally, we use the least significant bit algorithm to embed the ciphertext into the cover image. Experiments have confirmed that in most cases, the human visual systems cannot easily distinguish which images have been hidden the messages the sender really wants to send. Because the messages have been encrypted previously, even if they are stolen by hackers or intruders, it will also make them impossible to decrypt because they do not have the key, thereby achieving the goal of protecting information security. In addition, our proposed method can work for various file formats such as plain text, word, portable file format and etc.

    Chapter 1 Introduction--------------------------1 Chapter 2 Background Review---------------------4 2.1 Exclusive-or Cipher---------------------4 2.1.1 Exclusive-or Operation------------5 2.1.2 Encryption and Decryption---------6 2.2 Least Significant Bit (LSB) Algorithm---7 2.3 Other Related Works---------------------8 Chapter 3 Proposed Method-----------------------9 3.1 Motivation------------------------------9 3.2 Proposed Embedding Algorithm------------10 3.3 Proposed Extracting Algorithm-----------12 Chapter 4 Experiment----------------------------14 4.1 Cover Images----------------------------14 4.2 Quality Measure-------------------------16 4.2.1 Mean Square Error-----------------16 4.2.2 Peak Signal-to-Noise Ratio--------17 4.3 Results and Discussion------------------17 Chapter 5 Conclusion----------------------------22 References--------------------------------------23

    Neil F. Johnson and S. Jajodia. “Exploring steganography: Seeing the unseen”, IEEE, Feb. 1998, Vol. 31 No. 2, Pages 26-34.
    E. Zielińska, W. Mazurczyk and K. Szczypiorski.“Trends in steganography”, Communications of the ACM, March 2014, Vol. 57 No. 3, Pages 86-95.
    M.A.B. Younes, and A. Jantan.“A New Steganography Approach for Images Encryption Exchange by Using the Least Significant Bit Insertion”, International Journal of Computer Science and Network Security, Vol. 8, No. 6, Pages 247-257, 2008.
    R. Sridevi , A. Damodaram and Svl. Narasimham.“Efficient Method of Audio Steganography by Modified LSB Algorithm and Strong Encryption Key with Enhanced Security”, Journal of Theoretical and Applied Information Technology, Pages 768-771, 2009.
    C.K. Chan and L.M. Cheng, “Hiding Data in Images By Simple LSB Substitution”, Pattern Recognition, Vol. 37, No. 3, 469-474, 2004.
    C.C. Chang, J.Y. Hsiao and C.S. Chan.“Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy”, Pattern Recognition, Vol. 36, No. 7, 1583-1595, 2004.
    Z. Ni, Y.Q. Shi, N. Ansari, W. Su.“Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy”, IEEE, Vol. 16, No. 3, 354-362, 2006.
    C.C. Chen and W.J. Lai, “High-Capacity Steganography Using MRF-Synthesized Cover Images,” Annual Conference on Engineering and Information Technology, 237-242, Chiyoda, Japan, March 28-30, 2014.
    C.K. Chen, “A Novel Steganography Using Hill Cipher and Microarray Images”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, May, 2016.
    A.K. Jain, “Fundamentals of digital image processing. Engle Cliffs”, NJ:Prentice Hall, New Jersey, 1989.
    https://commons.wikimedia.org/wiki/File:Ascii-codes-table.png
    https://en.wikipedia.org/wiki/Bit_numbering#Least_significant_bit

    QR CODE