Please use this identifier to cite or link to this item:
http://hdl.handle.net/11455/24225
標題: | 文字類型檔案的資訊隱藏技術之研究 A Study of Data Hiding Scheme for Text Files |
作者: | 許鈵昆 Hsu, Ping-Kun |
關鍵字: | data hiding;資訊隱藏;word document;HTML file;multi-channel system;voting phase;word檔;HTML檔;多管道浮水印藏入系統;投票機制 | 出版社: | 資訊管理學系所 | 引用: | [1] C.C. Chang, C.C. Wu, and I.C. Lin, “A Data Hiding Method for Text Documents Using Multiple-Base Encoding,” Communications in Computer and Information Science, Germany: SpringerLink, vol. 66, pp. 101-109, 2010. [2] C. Chen, S.Z. Wang, and X.P. Zhang, “Information Hiding in Text Using Typesetting Tools with Stego-Encoding,” Proceedings of the First International Conference on Innovative Computing, Information and Control, Beijing, China, August 30-September 1, vol. 1, pp. 459-462, 2006. [3] M.A. Qadir and I. Ahmad, “Digital Text Watermarking: Secure Content Delivery and Data Hiding in Digital Documents,” IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 11, pp. 18-21, 2006. [4] T.Y. Liu and W.H. Tsai, “A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 24-30, 2007. [5] X.M Sun, G. Lou, and H.J. Huang, “Component-based Digital Watermarking of Chinese Texts,” Proceedings of the Third International Conference on Information Security, Shanghai, China, November 14-15, vol. 85, pp. 76-81, 2004. [6] Y.W. Kim, K.A. Moon, and I.S. Oh, “A Text Watermarking Algorithm Based on Word Classification and Inter-word Space Statistics,” Proceedings of the Seventh International Conference on Document Analysis and Recognition, Edinburgh, Scotland, August 3-6, pp. 775-779, 2003. [7] Z.H. Wang, C.C. Chang, C.C Lin, and M.C Li, “A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation,” Systems and Software, vol. 82, no. 8, pp. 1362-1369, 2009. [8] I.S. Lee and W.H. Tsai, “A New Approach to Covert Communication via PDF Files,” Signal Processing, vol. 90, no. 2, pp. 557-565, 2010. [9] S.P. Zhong, X.Q. Cheng, and T.R. Chen, “Data Hiding in a Kind of PDF Texts for Secret Communication,” International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007. [10] H.J. Huang, S.H. Zhong, and X.M. Sun, “An Algorithm of Webpage Information Hiding Based on Attributes Permutation,” Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 15-17, pp. 257-260, 2008. [11] H.J. Huang, X.M. Sun, Z.S. Li, and G. Sun, “Detection of Hidden Information in Webpage,” Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, Haikou, China, August 24-27, vol. 4, pp. 317-321, 2007. [12] I.S. Lee and W.H. Tsai, “Secret Communication through Web Pages Using Special Space Codes in HTML Files,” International Journal of Applied Science and Engineering, vol. 6, no. 2, pp. 141-149, 2008. [13] S. Dey, H. Al-Qaheri, and Sugata Sanyal, “Embedding Secret Data in HTML Web Page,” Image Processing & Communications Challenges, pp. 474-481, 2009. [14] X.G. Sui and H. Luo, “A New Steganography Method Based on Hypertext,” Proceedings of Asia-Pacific Radio Science Conference, Qingdao, China, August 24-27, pp. 181-184, 2004. [15] Y.J. Yang and Y.M. Yang, “An Efficient Webpage Information Hiding Method Based on Tag Attributes,” Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, Yantai, China, August 10-12, pp. 1181-1184, 2010. [16] I.S. Lee and W.H. Tsai, “Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes,” International Journal of Network Security, vol. 10, no. 1, pp. 1-10, 2010. [17] Y.W. Kim, K.A. Moon, and I.S. Oh, “A Text Watermarking Algorithm Based on Word Classification and Inter-word Space Statistics,” Proceedings of the Seventh International Conference on Document Analysis and Recognition, Edinburgh, Scotland , August 3-6, pp. 775-779, 2003. [18] Automatic Information Processing Lab, “Digital Watermarking,” http://debut.cis.nctu.edu.tw/Demo/Watermarking/watermarking_new.htm, available on June 20, 2011. [19] X.P. Zhang and S.Z. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70, 2005. | 摘要: | 資訊隱藏是近年來相當熱門的研究議題。不同於密碼學中將機密資訊以密文的方式在雙方之間傳送,資訊隱藏利用將機密資訊隱藏於有意義的掩護檔案裡傳送的方式,用以確保機密資訊不被惡意攻擊者發覺從而進行竊聽或截取。然而,當前的資訊隱藏以影像作為掩護檔案為主要研究方向,不同檔案類型的研究則不多。為了讓不同類型之檔案也可作為掩護之用,目前已有針對word檔與HTML檔的隱藏技術,但其隱藏量則稍嫌不足,且其修改原始掩護檔案之次數也較多。為此,本研究提出了word檔與HTML檔的資訊隱藏方法。根據實驗結果顯示,所提出的方法可以降低修改掩護檔案的次數,並且提高隱藏量。 除了確保機密資訊的安全性之外,檔案的版權歸屬也是相當重要的研究範疇。隨著資訊技術的發達,任何人皆可輕易地複製或擷取部分有意義之檔案作為己用。當前的版權保護以在影像中加入含有擁有者資訊的浮水印為主,並且應避免檔案遭到竄改或破壞後,造成浮水印失真而變得難以識別。不同於影像有多餘的資訊用以藏入浮水印,若欲將浮水印藏入HTML檔案則需提出符合HTML特性的浮水印隱藏方法。為此,本研究提出一種針對HTML檔案的多管道浮水印藏入系統,透過投票機制,即使有些微資訊遺失也能正確擷取出浮水印。 Data hiding scheme has been a popular research issue nowadays. Being different in cryptography, data hiding scheme embeds secret data in meaningful files and transmits between senders and receivers. However, most studies of data hiding focus on image; other files have less research. For the aim of using various files as cover files, several studies which employ word documents and HTML files had been proposed. Nevertheless, these schemes have less capacity and the time of modifying spaces could be decreased. In this study, data hiding scheme on word documents and on HTML files are proposed, respectively. According to experiment results, the proposed schemes are better than other schemes in capacity, and the time of modifying is less as well. It will be appropriate for data hiding on word documents and HTML files. In addition to data hiding, we also present a novel watermarking scheme for HTML files in this study. The proposed scheme hides watermark simultaneously with some hiding schemes, that is, multi-channel system, in the cause of the purpose of watermark. Furthermore, a voting phase will execute as we extract the watermark. It can assure that the extracted watermark is more similar to original one. |
URI: | http://hdl.handle.net/11455/24225 | 其他識別: | U0005-2007201117340500 |
Appears in Collections: | 資訊管理學系 |
Show full item record
TAIR Related Article
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.