研究生: |
陳勤廣 Chen, Chin Kuang |
---|---|
論文名稱: |
以希爾加密法及微晶片影像實作影像藏密演算法 A Novel Steganography Using Hill Cipher and Microarray Images |
指導教授: |
陳朝欽
Chen, Chaur Chin |
口試委員: |
黃仲陵
Huang, Chung Lin 張隆紋 Chang, Long Wen |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 英文 |
論文頁數: | 25 |
中文關鍵詞: | 隱寫術 、微晶片影像 、希爾加密法 |
外文關鍵詞: | Steganography, Microarray images, Hill cipher |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網路技術的迅速發展,網路成為可以傳輸任何資訊和溝通的媒介,在透過這些媒介進行資料傳輸的過程中,許多具有重要內容的訊息可能會被有心人士擷取,所以在資料儲存、傳輸中,資訊安全成為重要的議題之一。探討資訊安全最主要的目的,就是如何去避免像是信用卡帳號密碼等個人的資訊,在透過網路進行溝通時被攻擊、竊取。影像藏密演算法,可以將重要的訊息藏匿在媒體當中,是一種可以實踐資訊安全內涵的資訊影藏技術。在此篇論文當中,使用微晶片影像、希爾加密法,以及最低有效位元替換來實作影像藏密演算法。因為微晶片影像特性,我們實作四個位元的最低有效位元替換來藏匿秘密訊息。此外,我們所提出的方法不會受到秘密訊息檔案格式的限制。
With the rapid development of technology, Internet has become possible to communicate and transmit any type of data across networks. Security of data or information has become a critical issue in data storage and transmission to prevent attacks from accessing personal information and other types of data such as credit card numbers. Steganography refers to the technique of hiding information in digital media in order to conceal the existence of the information. In this thesis, we use microarray image, Hill cipher algorithm and least significant bits substitution to implement steganography. Because of the advantage of the microarray images, we can perform the four bits LSB replacement method easily to embed the secret message. Moreover, our proposed system is not limited to files format of secret message.
[Aliz2000] A.A. Alizadeh et al., “Distinct types of diffuse large B-cell lymphoma identified by gene expression profiling,” Nature, Vol. 403, 503-511, 2000.
[Alon1999] U. Alon et al., “Broad Patterns of Gene Expression Revealed by Clustering Analysis of Tumor and Normal Colon Tissues Probed by Oligonucleotide Arrays,” Proceedings of the National Academy of Sciences of the United States of America, Vol. 96, No. 12, 6475- 6750, 1999.
[Cham2014] B.S. Champakamala, D. Padmini, and D.K. Radhika. “Least Significant Bit algorithm for image steganography,” International Journal of Advanced Computer Technology, Vol. 3, No. 4, 34-38, 2014.
[Chan2004] C.K. Chan and L.M. Cheng, “Hiding Data in Images By Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 469-474, 2004.
[Chen2006] C.C. Chen, C.Y. Kao, C.F. Chang, H.T. Chu, and C.N. Chen, “Simple Software for Microarray Image Analysis,” IEEE Proceedings of Computer and Robot Vision , Pid163-, Quebec city, Canada, June 7-9, 2006.
[Chen2014] C.C. Chen and W.J. Lai, “High-Capacity Steganography Using MRF-Synthesized Cover Images,” Annual Conference on Engineering and Information Technology, 237-242, Chiyoda, Japan, March 28-30, 2014.
[Kana2015] K. Kanagi, “Steganography Based on Color Images Using Advanced Encryption Standard (AES)”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, June, 2015.
[Liu2008] C.L. Liu and S.R. Liao, “High-Performance JPEG Steganography Using Complementary Embedding Strategy,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008.
[Mork2005] T. Morkel, J.H.P. Eloff, and M. S. Olivier. “An overview of image steganography,” Information Security, 1-11, Pretoria, South Africa, 2005.
[Stin2006] D.R. Stinson, “Cryptography Theory and Practice,” 3rd. ed., Chapman & Hall/CRC, 2006.
[Tsen2014] C.T. Tseng, “Steganography Based on Color Images”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, March, 2014.
[Youn2008] M.A.B. Younes, and A. Jantan. “A New Steganography Approach for Images Encryption Exchange by Using the Least Significant Bit Insertion,” International Journal of Computer Science and Network Security, Vol. 8, No. 6, 247-257, 2008.
[Ziel2014] E. Zielińska, W. Mazurczyk, and K. Szczypiorski. “Trends in steganography,” Communications of the ACM, Vol.57, No. 3, 86-95, 2014.
[Web01] http://en.wikipedia.org/wiki/Steganography, last access on 5/27/2016.
[Web02] http://en.wikipedia.org/wiki/Hill_cipher, last access on 5/27/2016.
[Web03] http://en.wikipedia.org/wiki/Least_significant_bit, last access on 5/27/2016.
[Web04] http://www.cs.nthu.edu.tw/∼cchen/Textdata/falls.txt, last access on 5/27/2016.
[Web05] http://www.cs.nthu.edu.tw/∼cchen/IMQA2016, last access on 5/27/2016.
[Web06] https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio, last access on 5/27/2016.
[Web07] http://wiki.tesnexus.com/index.php?title=File:Ascii-codes-table.png, last access on 5/27/2016.