研究生: |
蔡孟芬 Tsai, Meng-Fen |
---|---|
論文名稱: |
訊息位元洗牌之LSB取代法用於藏密學 Steganography by LSB Replacement Using Message Bit Shuffling |
指導教授: |
陳朝欽
Chen, Chaur-Chin |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2010 |
畢業學年度: | 98 |
語文別: | 英文 |
論文頁數: | 22 |
中文關鍵詞: | 藏密學 、循環群 、原根 、最低有效位元 |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
This thesis proposes and implements a steganographic method which encrypts the secret message before hiding data to improve the security. The secret message encryption is a sequence of bits obtained from shuffling the bits of the secret message according to the concept of a multiplicative abelian group. We first select a prime number p and convert a secret message into a bit sequence S[i], 1□ S[i]<p, according to ASCII representation of each character, then we choose an integer primitive root g, 1<g<p, such that {gk mod p, for 1□k<p} is the same as {1, 2,…, p-1}, then shuffle the bit sequence S into B such that B[i] = gS[i] mod p. We then replace the k least significant bits of each pixel on a user selected cover-image with B. The extraction of the secret message is based on solving a discrete logarithm problem which is regarded as a difficult problem when p is large. Experiments with different cover images, secret messages, and the prime number p are provided.
[Ande1998] R.J. Anderson and F.A.P. Petitcolas, "On the limits of steganography",
IEEE Journal of Selected Areas in Communications, vol. 16, no. 4,
474–481, 1998.
[Baba2008] N. Babaguch and X. Yu, "A fast and effective method to detect multiple
least significant bits steganography", Proceedings of the ACM
Symposium on Applied Computing, 1443-1447, 2008.
[Bend1996] W. Bender, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM
System Journal, vol. 35, no. 3-4, 313–336, 1996.
[Chan2004] C.K. Chan and L.M. Cheng, "Hiding data in images by simple LSB substitution", Pattern Recognition Letters, vol. 37, no. 3, 469–474, 2004.
[Frid2001] J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in grayscale and color images", ACM Workshop on Multimedia and Security, 27–30, 2001.
[Gord1993] D.M. Gordon, "Discrete logarithms in GF(p) using the number field sieve", SIAM J. Discrete Math, vol. 6, no. 1, 124-139, 1993.
[John1998] N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE Computer Magazine, vol. 31, no. 2, 26-34, 1998.
[Kim2008] K. J. Kim, K. H. Jung, and K. Y. Yoo, "A High Capacity Data Hiding
Method Using PVD and LSB", Proceedings of International
Conference on Computer Science and Software Engineering, vol. 3,
876–879, 2008.
[Miel2006] J. Mielikainen, "LSB matching revisited", IEEE Signal Processing Letters, vol. 13, no. 5, 285-287, 2006.
[Peti1999] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding-A Survey", Proceedings of the IEEE, vol. 87, no. 7, 1062-1078, 1999.
[Rive1978] R.L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, vol. 21, no. 2, 120-126, 1978.
[Sabe2007] A. Sabeti, S. Samavi, and M. Mahdavi, "Steganalysis of Pixel-Value
Differencing Steganographic Method", IEEE Pacific Rim
Communications, Computers and Signal Processing, 292-295, 2007.
[Stin2006] D.R. Stinson, Cryptography: Theory and Practice, Chapman & Hall/CRC (2006).
[Trap2006] W. Trappe and L.C. Washington, Introduction to Cryptography with Coding Theory, Pearson International Edition (2006).
[Wang2000] R.Z. Wang, C.F. Lin, and J.C. Lin, "Hiding data in images by optimal moderately significant-bit replacement", IEE Electronics Letters, vol. 36, no. 25, 2069-2070, 2000.
[Wang2001] R.Z. Wang, C.F. Lin, and J.C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm", Pattern Recognition, vol. 34, no. 3, 671-683, 2001.
[Wu2003] D.C. Wu and W.H. Tsai, "A steganographic method for images by pixel-value differencing", Pattern Recognition Letters, vol. 24, no. 9-10, 1613-1626, 2003.
[web01] http://en.wikipedia.org/wiki/Steganography, last access on May 27, 2010.
[web02] http://edition.cnn.com/2010/WORLD/asiapcf/04/30/taiwan.china.us/inde
x.html, last access on May 27, 2010.