Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19672
標題: 植基於調整亂數之資訊隱藏技術
An Information Hiding Technique Based on Adjusting Random Numbers
作者: 曹憲中
Tsao, Hsien-Chung
關鍵字: Information hiding
資訊隱藏
Data hiding
Steganography
Sudoku
資料隱藏
隱匿學
藏密學
隱藏學
數獨
出版社: 資訊科學與工程學系所
引用: [1] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, Issue 3, pp. 469-474, Mar. 2004. [2] C. C. Chang, Y. C. Chou, and T. D. Kieu, “An Information Hiding Scheme Using Sudoku,” Proceedings of The Third International Conference on Innovative Computing, Information and Control, Dalian, China, pp. 17-21, June 2008. [3] C. C. Chang, P. Y. Lin, Z. H. Wang and M. C. Li, “A Sudoku-based Secret Image Sharing Scheme with Reversibility,” Journal of Communications, Vol 5, No. 1, pp. 5-12, Jan 2010. [4] R. M. Chao, H. C. Wu, C. C. Lee and Y. P. Chu, “A Novel Image Data Hiding Scheme with Diamond Encoding,” EURASIP Journal on Information Security, Vol. 2009, 9 pages, 2009. [5] T. S. Chen, C. C. Chang and M. S. Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, pp. 1485-1488, Oct. 1998. [6] J. W. Cooley and J. W. Tukey, “An Algorithm for the Machine Calculation of Complex Fourier Series,” Mathematics of Computation, Vol. 19, No. 90, pp. 297-301, Apr. 1965. [7] B. Felgenhauer and F. Jarvis, “Sudoku enumeration problems,” Frazer Jarvis''s home page, http://www.afjarvis.staff.shef.ac.uk/sudoku/, Sept. 2006. [8] J. Fridrich, M. Goljan and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images,” IEEE MultiMedia, pp. 22-28, Oct. 2001. [9] J. Fridrich, M. Goljan and R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images,” Proc. of the ACM Workshop on Multimedia and Security, pp. 27-30, Oct. 2001. [10] F. HARTUNG and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings of the IEEE, Vol. 87, No. 7, July 1999. [11] W. Hong, T. S. Chen and C. W. Shiu, “A Minimal Euclidean Distance Searching Technique for Sudoku Steganography,” Proceedings of International Symposium on Information Science and Engineering, Vol. 1, pp. 515-518, Dec. 2008. [12] W. Hong, T. S. Chen and C. W. Shiu, “Reversible data hiding for high quality images using modification of prediction errors,” The Journal of Systems and Software, Vol. 82, Issue 11, pp. 1833-1842, Nov. 2009. [13] W. Hong, T. S. Chen and C. W. Shiu, “Steganography Using Sudoku Revisited,” Proceedings of 2008 International Symposium on Intelligent Information Technology Application, Vol. 2, pp. 935-939, Dec. 2008. [14] T. D. Kieu, Z. H. Wang, C. C. Chang and M. C. Li, “A Sudoku Based Wet Paper Hiding Scheme,” International Journal of Smart Home, Vol. 3, No. 2, pp. 1-12, Apr. 2009. [15] Y. Linde, A. Buzo and R. M. Gray, “An Algorithm for Vector Quantization Design,” IEEE Transactions on Communications, Vol. 28, pp. 84-95, Jan. 1980. [16] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, May 2006. [17] Z. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, Mar. 2006. [18] R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne, “A Digital Watermark,” Proceedings of 1st IEEE International Conference on Image Processing, Vol. 2, pp. 86-90, Nov. 1994. [19] D. M. Thodi and J. J. Rodríguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Transactions on Image Processing, Vol. 16, No. 3, pp. 721-730, Mar. 2007. [20] J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890-896, Aug. 2003. [21] Wikipedia, Sudoku, http://en.wikipedia.org/wiki/Sudoku, Nov. 2009. [22] X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, Vol. 10, No. 11, pp. 1-3, Nov. 2006. [23] 婁德權,“古法新煉的資訊安全技術:藏密學”,資通安全分析專論,T95007,2006年08月。 [24] 呂慈純、陸哲明、張真誠,“多媒體安全技術”,全華圖書股份有限公司,初版一刷,2007年10月。 [25] 張真誠、黃國峰、陳同孝,“電子影像技術 ELECTRONIC IMAGING TECHNIQUES”,旗標出版股份有限公司,初版,2003年3月。 [26] 賴溪松、韓亮、張真誠,“近代密碼學及其應用”,旗標出版股份有限公司,初版,2006年9月。
摘要: 在資訊安全議題的研究上,資訊隱藏一直是許多學者主要的研究方向。如何在多媒體裡,盡可能的藏進更多的機密資訊,而不會對多媒體品質造成明顯的破壞是一個很重要的議題。在本篇論文中,我們提出了一個使用調整亂數來產生參考矩陣的方法,與使用數獨和鑽石編碼所產生參考矩陣的方法相比,可以有效的提高安全性與藏入機密資訊影像的影像品質;在安全性的方面上,使用我們所提出的方法所產生的參考矩陣與使用數獨產生的參考矩陣相比,多了大約4.05e+180種組合數,並且可以有效的抵抗RS分析法;在藏入相同機密訊息影像的影像品質上,也比使用數獨和鑽石編碼做為參考矩陣的方法要高。
Data hiding is an important research topic in information security. Many researcher aim to increase the capacity of the secret data without decreasing too much the quality of the stego image. In this thesis, we present a novel information hiding scheme based on adjusting random numbers. The proposed method is inspired from Chang et al.''s method and is more secure than Chang et al.''s method, Hong et al.''s method and Chao et al.''s method. Based on experimental results, the visual quality of stego images is also better than Chang et al.''s method, Hong et al.''s method and Chao et al.''s method.
URI: http://hdl.handle.net/11455/19672
其他識別: U0005-0607201017142700
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-0607201017142700
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.