簡易檢索 / 詳目顯示

研究生: 陳奕凱
Chen, Yi-Kai
論文名稱: 使用Beaufort加密和MRF生成之紋理為載體影像之藏密法
A Steganographic Method Using Beaufort Cipher and MRF-Synthesized Cover Images
指導教授: 陳朝欽
Chen, Chaur-Chin
口試委員: 張隆紋
Chang, Long-Wen
黃仲陵
Huang, Chung-Lin
學位類別: 碩士
Master
系所名稱:
論文出版年: 2017
畢業學年度: 105
語文別: 英文
論文頁數: 21
中文關鍵詞: 藏密法紋理為載體影像
外文關鍵詞: Beaufort Cipher, MRF-Synthesized
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 藏密學是在媒體中隱藏一個秘密信息,並將其提取到目的地。本文提出了一種用於信息隱藏的簡單安全的大容量藏密學算法。我們採用MRF模型的紋理合成演算法,合成符合使用者的載體影像。而我們的載體影像包含四個灰度值:32,96,160和224,其二進制表示分別為00100000,01100000,101000000,11100000。另一方面,我們首先通過Beaufort加密一個秘密消息,並將密碼文本轉換成一個比特序列,將四個比特記錄為一個字。最後,我們通過使用4個有效位元替換來形成隱藏圖像,逐個加密成像素。秘密信息的提取是一個相反的過程。


    Steganography is the hiding of a secret message within an ordinary cover media and the extraction of it at its destination. This thesis presents a simple and secure high-capacity steganographic algorithm for information hiding. Our Markov Random Field (MRF) synthesized texture image as a cover image consists of four gray values: 32, 96, 160, and 224 whose 8-bit binary representations are 00100000, 01100000, 10100000, 11100000, respectively. On the other hand, we encrypt a secret message by Beaufort cipher first and convert the cipher text into a bit sequence with four bits recorded as one word. Finally, we embed the cipher text word by word into pixels by using the least 4 significant bits replacement to form a stegoimage. The extraction of secret messages is essentially a reverse procedure.

    Chapter 1 Introduction 1 Chapter 2 Background Review 4 2.1 Texture synthesis based on Markov Random Field 4 2.2 Beaufort encryption 7 2.3 Least Significant Bit (LSB) substitution 8 2.4 Reversible data hiding 9 Chapter 3 Proposed Method 12 3.1 Motivation 12 3.2 Illustration of Embedding a Short Sequence 13 Chapter 4 Experimental Results 15 Chapter 5 Conclusion 19 References 20

    [Bend1996] W. Bender et al., “Techniques for Data Hiding,” IBM Systems J., 35(3), 313-336, 1996.
    [Chan2001] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques,” IEEE Int‟l Conference on Image Processing, Vol. 3, 1019-1022, 2001.
    [Chan2004] C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, No. 3, 469-474, 2004.
    [Chan2002] C.C. Chang and T.S. Chen, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, Vol. 141, No. 1-2, 123-138, 2002.
    [Chen2003] C.C. Chen and C.C. Chen, „‟Texture Synthesis: A Review and Experiments,” Journal of Information Science and Engineering, Vol. 19, No. 2, 371-380, 2003.
    [Chen2014] C.C. Chen and W.J. Lai, ‟ High-Capacity Steganography Using MRF-Synthesized Cover Images,” Annual Conference on Engineering and Information Technology (ACEAIT), 237-242, 2014.
    [Chang2011] F.J. Cheng and C.C. Chen. ‟ A Steganographic Method Using MRF-Synthesized Textures as Cover Images,” The Fourth International Workshop on Image Media Quality and Its Applications, 58-62, 2011.
    [Cox2008] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann publisher, 429-495, 2008.
    [Cros1983] G.R. Cross and A.K. Jain, “Markov Random Field Texture Models,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 5, No. 1, 25-39, 1983.
    [Dumi2003] S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” Int‟l Workshop on Information Hiding, Berlin, 355-372, 2003.
    [Gul2009] G. Gul and F. Kurugollu, “A novel universal steganalyser design: LogSv,” IEEE Int‟l Conference on Image Processing, 4249-4252, 2009.
    [John1998] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, 26-34, 1998.
    [Ni2006] Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, No. 3, 354-362, 2006.
    [Tian2003] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 13, No. 8, 890-896, 2003.
    [Web01] https://en.wikipedia.org/wiki/Beaufort_cipher, last access on May 20, 2017.
    [Web02] https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher, last access on May 20, 2017.
    [Web03] https://en.wikipedia.org/wiki/Beauty_and_the_Beast, last access on May 20, 2017.

    QR CODE