簡易檢索 / 詳目顯示

研究生: 陳勤廣
Chen, Chin Kuang
論文名稱: 以希爾加密法及微晶片影像實作影像藏密演算法
A Novel Steganography Using Hill Cipher and Microarray Images
指導教授: 陳朝欽
Chen, Chaur Chin
口試委員: 黃仲陵
Huang, Chung Lin
張隆紋
Chang, Long Wen
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 25
中文關鍵詞: 隱寫術微晶片影像希爾加密法
外文關鍵詞: Steganography, Microarray images, Hill cipher
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著網路技術的迅速發展,網路成為可以傳輸任何資訊和溝通的媒介,在透過這些媒介進行資料傳輸的過程中,許多具有重要內容的訊息可能會被有心人士擷取,所以在資料儲存、傳輸中,資訊安全成為重要的議題之一。探討資訊安全最主要的目的,就是如何去避免像是信用卡帳號密碼等個人的資訊,在透過網路進行溝通時被攻擊、竊取。影像藏密演算法,可以將重要的訊息藏匿在媒體當中,是一種可以實踐資訊安全內涵的資訊影藏技術。在此篇論文當中,使用微晶片影像、希爾加密法,以及最低有效位元替換來實作影像藏密演算法。因為微晶片影像特性,我們實作四個位元的最低有效位元替換來藏匿秘密訊息。此外,我們所提出的方法不會受到秘密訊息檔案格式的限制。


    With the rapid development of technology, Internet has become possible to communicate and transmit any type of data across networks. Security of data or information has become a critical issue in data storage and transmission to prevent attacks from accessing personal information and other types of data such as credit card numbers. Steganography refers to the technique of hiding information in digital media in order to conceal the existence of the information. In this thesis, we use microarray image, Hill cipher algorithm and least significant bits substitution to implement steganography. Because of the advantage of the microarray images, we can perform the four bits LSB replacement method easily to embed the secret message. Moreover, our proposed system is not limited to files format of secret message.

    Chapter 1 Introduction 1 Chapter 2 Background Review 4 2.1 Microarray Image Templates 4 2.2 Hill Cipher 6 2.2.1 Hill Matrix 6 2.2.2 Encryption and Decryption 7 2.3 Least Significant Bit (LSB) Algorithm 8 2.4 Other Related Works 9 Chapter 3 Proposed Data Hiding Method 10 3.1 Motivation 11 3.2 Proposed Method 11 3.2.1 Embedding Algorithm 11 3.2.2 Extracting Algorithm 14 Chapter 4 Experimental Results 15 4.1 Cover Images Selected 15 4.2 The Difference of Two Images 16 4.3 Experimental Results 17 4.4 Discussion 19 Chapter 5 Conclusion and Future Work 20 Appendix 21 References 24

    [Aliz2000] A.A. Alizadeh et al., “Distinct types of diffuse large B-cell lymphoma identified by gene expression profiling,” Nature, Vol. 403, 503-511, 2000.
    [Alon1999] U. Alon et al., “Broad Patterns of Gene Expression Revealed by Clustering Analysis of Tumor and Normal Colon Tissues Probed by Oligonucleotide Arrays,” Proceedings of the National Academy of Sciences of the United States of America, Vol. 96, No. 12, 6475- 6750, 1999.
    [Cham2014] B.S. Champakamala, D. Padmini, and D.K. Radhika. “Least Significant Bit algorithm for image steganography,” International Journal of Advanced Computer Technology, Vol. 3, No. 4, 34-38, 2014.
    [Chan2004] C.K. Chan and L.M. Cheng, “Hiding Data in Images By Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 469-474, 2004.
    [Chen2006] C.C. Chen, C.Y. Kao, C.F. Chang, H.T. Chu, and C.N. Chen, “Simple Software for Microarray Image Analysis,” IEEE Proceedings of Computer and Robot Vision , Pid163-, Quebec city, Canada, June 7-9, 2006.
    [Chen2014] C.C. Chen and W.J. Lai, “High-Capacity Steganography Using MRF-Synthesized Cover Images,” Annual Conference on Engineering and Information Technology, 237-242, Chiyoda, Japan, March 28-30, 2014.
    [Kana2015] K. Kanagi, “Steganography Based on Color Images Using Advanced Encryption Standard (AES)”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, June, 2015.
    [Liu2008] C.L. Liu and S.R. Liao, “High-Performance JPEG Steganography Using Complementary Embedding Strategy,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008.
    [Mork2005] T. Morkel, J.H.P. Eloff, and M. S. Olivier. “An overview of image steganography,” Information Security, 1-11, Pretoria, South Africa, 2005.
    [Stin2006] D.R. Stinson, “Cryptography Theory and Practice,” 3rd. ed., Chapman & Hall/CRC, 2006.
    [Tsen2014] C.T. Tseng, “Steganography Based on Color Images”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, March, 2014.
    [Youn2008] M.A.B. Younes, and A. Jantan. “A New Steganography Approach for Images Encryption Exchange by Using the Least Significant Bit Insertion,” International Journal of Computer Science and Network Security, Vol. 8, No. 6, 247-257, 2008.
    [Ziel2014] E. Zielińska, W. Mazurczyk, and K. Szczypiorski. “Trends in steganography,” Communications of the ACM, Vol.57, No. 3, 86-95, 2014.
    [Web01] http://en.wikipedia.org/wiki/Steganography, last access on 5/27/2016.
    [Web02] http://en.wikipedia.org/wiki/Hill_cipher, last access on 5/27/2016.
    [Web03] http://en.wikipedia.org/wiki/Least_significant_bit, last access on 5/27/2016.
    [Web04] http://www.cs.nthu.edu.tw/∼cchen/Textdata/falls.txt, last access on 5/27/2016.
    [Web05] http://www.cs.nthu.edu.tw/∼cchen/IMQA2016, last access on 5/27/2016.
    [Web06] https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio, last access on 5/27/2016.
    [Web07] http://wiki.tesnexus.com/index.php?title=File:Ascii-codes-table.png, last access on 5/27/2016.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE