研究生: |
陳奕凱 Chen, Yi-Kai |
---|---|
論文名稱: |
使用Beaufort加密和MRF生成之紋理為載體影像之藏密法 A Steganographic Method Using Beaufort Cipher and MRF-Synthesized Cover Images |
指導教授: |
陳朝欽
Chen, Chaur-Chin |
口試委員: |
張隆紋
Chang, Long-Wen 黃仲陵 Huang, Chung-Lin |
學位類別: |
碩士 Master |
系所名稱: |
|
論文出版年: | 2017 |
畢業學年度: | 105 |
語文別: | 英文 |
論文頁數: | 21 |
中文關鍵詞: | 藏密法 、紋理為載體影像 |
外文關鍵詞: | Beaufort Cipher, MRF-Synthesized |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
藏密學是在媒體中隱藏一個秘密信息,並將其提取到目的地。本文提出了一種用於信息隱藏的簡單安全的大容量藏密學算法。我們採用MRF模型的紋理合成演算法,合成符合使用者的載體影像。而我們的載體影像包含四個灰度值:32,96,160和224,其二進制表示分別為00100000,01100000,101000000,11100000。另一方面,我們首先通過Beaufort加密一個秘密消息,並將密碼文本轉換成一個比特序列,將四個比特記錄為一個字。最後,我們通過使用4個有效位元替換來形成隱藏圖像,逐個加密成像素。秘密信息的提取是一個相反的過程。
Steganography is the hiding of a secret message within an ordinary cover media and the extraction of it at its destination. This thesis presents a simple and secure high-capacity steganographic algorithm for information hiding. Our Markov Random Field (MRF) synthesized texture image as a cover image consists of four gray values: 32, 96, 160, and 224 whose 8-bit binary representations are 00100000, 01100000, 10100000, 11100000, respectively. On the other hand, we encrypt a secret message by Beaufort cipher first and convert the cipher text into a bit sequence with four bits recorded as one word. Finally, we embed the cipher text word by word into pixels by using the least 4 significant bits replacement to form a stegoimage. The extraction of secret messages is essentially a reverse procedure.
[Bend1996] W. Bender et al., “Techniques for Data Hiding,” IBM Systems J., 35(3), 313-336, 1996.
[Chan2001] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques,” IEEE Int‟l Conference on Image Processing, Vol. 3, 1019-1022, 2001.
[Chan2004] C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, No. 3, 469-474, 2004.
[Chan2002] C.C. Chang and T.S. Chen, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, Vol. 141, No. 1-2, 123-138, 2002.
[Chen2003] C.C. Chen and C.C. Chen, „‟Texture Synthesis: A Review and Experiments,” Journal of Information Science and Engineering, Vol. 19, No. 2, 371-380, 2003.
[Chen2014] C.C. Chen and W.J. Lai, ‟ High-Capacity Steganography Using MRF-Synthesized Cover Images,” Annual Conference on Engineering and Information Technology (ACEAIT), 237-242, 2014.
[Chang2011] F.J. Cheng and C.C. Chen. ‟ A Steganographic Method Using MRF-Synthesized Textures as Cover Images,” The Fourth International Workshop on Image Media Quality and Its Applications, 58-62, 2011.
[Cox2008] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann publisher, 429-495, 2008.
[Cros1983] G.R. Cross and A.K. Jain, “Markov Random Field Texture Models,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 5, No. 1, 25-39, 1983.
[Dumi2003] S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” Int‟l Workshop on Information Hiding, Berlin, 355-372, 2003.
[Gul2009] G. Gul and F. Kurugollu, “A novel universal steganalyser design: LogSv,” IEEE Int‟l Conference on Image Processing, 4249-4252, 2009.
[John1998] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, 26-34, 1998.
[Ni2006] Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, No. 3, 354-362, 2006.
[Tian2003] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 13, No. 8, 890-896, 2003.
[Web01] https://en.wikipedia.org/wiki/Beaufort_cipher, last access on May 20, 2017.
[Web02] https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher, last access on May 20, 2017.
[Web03] https://en.wikipedia.org/wiki/Beauty_and_the_Beast, last access on May 20, 2017.