簡易檢索 / 詳目顯示

研究生: 蔡孟芬
Tsai, Meng-Fen
論文名稱: 訊息位元洗牌之LSB取代法用於藏密學
Steganography by LSB Replacement Using Message Bit Shuffling
指導教授: 陳朝欽
Chen, Chaur-Chin
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2010
畢業學年度: 98
語文別: 英文
論文頁數: 22
中文關鍵詞: 藏密學循環群原根最低有效位元
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • This thesis proposes and implements a steganographic method which encrypts the secret message before hiding data to improve the security. The secret message encryption is a sequence of bits obtained from shuffling the bits of the secret message according to the concept of a multiplicative abelian group. We first select a prime number p and convert a secret message into a bit sequence S[i], 1□ S[i]<p, according to ASCII representation of each character, then we choose an integer primitive root g, 1<g<p, such that {gk mod p, for 1□k<p} is the same as {1, 2,…, p-1}, then shuffle the bit sequence S into B such that B[i] = gS[i] mod p. We then replace the k least significant bits of each pixel on a user selected cover-image with B. The extraction of the secret message is based on solving a discrete logarithm problem which is regarded as a difficult problem when p is large. Experiments with different cover images, secret messages, and the prime number p are provided.


    Chapter 1 Introduction 1 Chapter 2 Review of LSB Algorithms 4 2.1 The least-significant-bit method 4 2.2 The simple LSB substitution method 5 2.2.1 Methodology 5 2.2.2 Analysis 6 2.3 LSB Matching Revisited 7 2.2.1 Methodology 8 2.2.2 Analysis 9 Chapter 3 Proposed Data Hiding Method 10 3.1 Motivation 10 3.2 Proposed method 11 3.2.1 Embedding algorithm 11 3.2.2 Extracting algorithm 13 3.2.3 Analysis 13 Chapter 4 Experimental Results 15 Chapter 5 Conclusion and Future Work 20 References 21

    [Ande1998] R.J. Anderson and F.A.P. Petitcolas, "On the limits of steganography",
    IEEE Journal of Selected Areas in Communications, vol. 16, no. 4,
    474–481, 1998.
    [Baba2008] N. Babaguch and X. Yu, "A fast and effective method to detect multiple
    least significant bits steganography", Proceedings of the ACM
    Symposium on Applied Computing, 1443-1447, 2008.
    [Bend1996] W. Bender, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM
    System Journal, vol. 35, no. 3-4, 313–336, 1996.
    [Chan2004] C.K. Chan and L.M. Cheng, "Hiding data in images by simple LSB substitution", Pattern Recognition Letters, vol. 37, no. 3, 469–474, 2004.
    [Frid2001] J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in grayscale and color images", ACM Workshop on Multimedia and Security, 27–30, 2001.
    [Gord1993] D.M. Gordon, "Discrete logarithms in GF(p) using the number field sieve", SIAM J. Discrete Math, vol. 6, no. 1, 124-139, 1993.
    [John1998] N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE Computer Magazine, vol. 31, no. 2, 26-34, 1998.
    [Kim2008] K. J. Kim, K. H. Jung, and K. Y. Yoo, "A High Capacity Data Hiding
    Method Using PVD and LSB", Proceedings of International
    Conference on Computer Science and Software Engineering, vol. 3,
    876–879, 2008.
    [Miel2006] J. Mielikainen, "LSB matching revisited", IEEE Signal Processing Letters, vol. 13, no. 5, 285-287, 2006.
    [Peti1999] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding-A Survey", Proceedings of the IEEE, vol. 87, no. 7, 1062-1078, 1999.
    [Rive1978] R.L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, vol. 21, no. 2, 120-126, 1978.
    [Sabe2007] A. Sabeti, S. Samavi, and M. Mahdavi, "Steganalysis of Pixel-Value
    Differencing Steganographic Method", IEEE Pacific Rim
    Communications, Computers and Signal Processing, 292-295, 2007.
    [Stin2006] D.R. Stinson, Cryptography: Theory and Practice, Chapman & Hall/CRC (2006).
    [Trap2006] W. Trappe and L.C. Washington, Introduction to Cryptography with Coding Theory, Pearson International Edition (2006).
    [Wang2000] R.Z. Wang, C.F. Lin, and J.C. Lin, "Hiding data in images by optimal moderately significant-bit replacement", IEE Electronics Letters, vol. 36, no. 25, 2069-2070, 2000.
    [Wang2001] R.Z. Wang, C.F. Lin, and J.C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm", Pattern Recognition, vol. 34, no. 3, 671-683, 2001.
    [Wu2003] D.C. Wu and W.H. Tsai, "A steganographic method for images by pixel-value differencing", Pattern Recognition Letters, vol. 24, no. 9-10, 1613-1626, 2003.
    [web01] http://en.wikipedia.org/wiki/Steganography, last access on May 27, 2010.
    [web02] http://edition.cnn.com/2010/WORLD/asiapcf/04/30/taiwan.china.us/inde
    x.html, last access on May 27, 2010.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE