研究生: |
賴威儒 Lai, Wei-Ju |
---|---|
論文名稱: |
使用MRF紋理合成方法的高容量藏密系統 A High-Capacity Steganographic System Using MRF-Based Texture Synthesis |
指導教授: | 陳朝欽 |
口試委員: |
陳朝欽
張隆紋 黃仲陵 |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2013 |
畢業學年度: | 101 |
語文別: | 英文 |
論文頁數: | 24 |
中文關鍵詞: | 藏密 、紋理合成 、MRF |
相關次數: | 點閱:64 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
藏密學是一門關於資訊隱藏的理論。主要的目的在於避免訊息在傳遞過程中遭受竊取或破壞。這篇論文提出了一個具有高容量的藏密系統,我們採用基於MRF 模型的紋理合成演算法 [Chen2003] ,合成
出符合使用者需求大小的載體影像。一般情況下,隱藏訊息的長度受
限於載體影像的大小,而我們採用紋理合成的方法來解決這個問題。
此外,為了增加藏密的安全性,在訊息被嵌入至載體影像之前,我們
會先對其進行加密的動作,而我們所採用的加密方法是基於數論中原
根的特性。當𝑝 是一個質數,而𝑔 是 𝑝 的其中一個原根時,
{𝑔𝑥 mod 𝑝, for 1 ≤ x ≤ 𝑝 − 1} = {1,2, … , 𝑝 − 1}。我們利用這種一對一的對應關係將訊息中的字元重新排列,以達到加密的效果。最後,我們將密文中每個8-bit 的character 拆成2 個4-bit 的word,並使用LSB取代法將他們嵌入載體影像的2 個pixel 中。因此對於一張M × N的影像,它的藏密空間有(M × N)/2 個 character,相當於整個影像大小的一半。
Steganography is a theory of information hiding. It prevents secret message from being stolen and destroyed during communication. This thesis proposes a high-capacity steganographic system for data hiding. We adopt a texture synthesis algorithm based on Markov Random Field (MRF) model [Chen2003] to synthesize cover images with user-selected size. Generally, the length of a secret message to be
hidden is limited by the size of the cover image; we solved this problem by using the texture synthesis algorithm. In addition, to enhance the security, we encrypt the secret
message before embedding it into a cover image. The encryption method is based on the property of primitive root mentioned in Number Theory. When 𝑝 is a prime number, and 𝑔 is a primitive root of 𝑝 , {𝑔𝑥 mod 𝑝, for 1 ≤ x ≤ 𝑝 − 1} =
{1,2, … , 𝑝 − 1}. The relationship of one-to-one correspondence could be used to rearrange characters in message and destroy the structure between them. Finally, each
character is partitioned into two 4-bit words, and then embedded into two pixels of the selected cover image by LSB replacement method. The embedding capacity of an M × N image is (M × N)/2 characters.
[Chen2003] C.C. Chen and C.C. Chen, “Texture Synthesis: A Review and Experiments,” Journal of Information Science and Engineering, Vol. 19, No. 2, 371-380, 2003.
[Cros1983] G.R. Cross and A.K. Jain, “Markov Random Field Texture Models,” IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 5, No.1, 25-39, 1983.
[John1998] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, 26-34, 1998.
[Prov2003] N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol.1, No. 3, 354-362, 2006.
[Chan2003] C.K. Chan and L.M. Chen, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol.37, 469-474, 2003.
[Cox 2008] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann, 2nd edition, 2008.
[Stal2003] W. Stallings, Cryptography and Network Security: Principles and Practice, Pearson International Edition, 3rd edition, 2003.
[Stin2006] D.R. Stinson, Cryptography: Theory and Practice, Chapman & Hall/CRC, 3rd edition, 2006.
[Sayo2000] K. Sayood, Introduction to Data Compression, Morgan Kaufmann, 2nd edition, 2000.
[Madi2008] M.A. Medina Jr., “How Many Grey Levels Are Required to Represent a Grey Intensity Image Using Histogram Equalization? ,” M.S. Thesis, National Tsing Hua University, Hsinchu, Taiwan, Jun 2008.
[Chan2011] F.J. Chang and C.C. Chen, “A Steganographic Method Using MRF-Synthesized Textures as Cover Images,” The 4th International Workshop on Image Media Quality and Its Applications, 58-62, 2011.
[West2001] A. Westfeld, “F5—A Steganographic Algorithm : High Capacity Despite Better Steganalysis, ” The 4th International Workshop on Information Hiding, Springer-Verlag, 289-302, 2001.
[Liu2008] C.L. Liu and S.R. Liao, ”High-Performance JPEG Steganography using complementary embedding strategy ,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008.
[Prov2001] N. Provos, “Defending Against Statistical Steganalysis,” Proceedings of the 10th USENIX Security Symposium, 323-335, 2001.
[Web01] http://en.wikipedia.org/wiki/Steganography, last access on March 31, 2013.
[Web02] http://en.wikipedia.org/wiki/Primitive_root_modulo_n,
last access on March 31, 2013.
[Web03] http://image.cse.nsysu.edu.tw/index1.html, last access on March 31, 2013.
[Web04] http://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio, last access on March 31, 2013.
[Web05] http://www.nytimes.com/2013/01/21/us/politics/obamas-second-inaugural-speech.html?pagewanted=all&_r=0, last access on March 31, 2013.
[Web06] http://zooid.org/~paul/crypto/jsteg/, last access on March 31, 2013