Please use this identifier to cite or link to this item:
標題: 查表替換資料隱藏方法應用於脫氧核醣核酸序列與影像
Data Hiding Based on Table Lookup Substitution Method in DNA Sequences and Images
作者: 林恆毅
Lin, Heng-Yi
關鍵字: 資料隱藏;data hiding
出版社: 電機工程學系所
引用: [1] L. Kencl and M. Loebl, "DNA-inspired information concealing: A survey," Computer Science Review, vol. 4, pp. 251-262, 2010. [2] A. D. Ker, "Steganalysis of lsb matching in grayscale images," IEEE Signal Process. Lett., vol. 12, pp. 441-444, 2005. [3] C.-K. Chan and L. M. Cheng, "Hiding data in images by simple lsb substitution," Pattern Recognition, vol. 37, pp. 469-474, 2004. [4] H.-C. Wu, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, "Image steganographic scheme based on pixel-value differencing and lsb replacement methods," IEE Proceedings-Vision, Image and Signal Processing, vol. 152, pp. 611-615, 2005. [5] J. Mielikainen, "Lsb matching revisited," IEEE Signal Process. Lett., vol. 13, pp. 285-287, 2006. [6] X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett., vol. 10, pp. 781-783, 2006. [7] Y.-Y. Tsai and C.-M. Wang, "A novel data hiding scheme for color images using a bsp tree," Journal of systems and software, vol. 80, pp. 429-437, 2007. [8] R. Agrawal and R. Srikant, "Privacy-preserving data mining," ACM Sigmod Record, vol. 29, pp. 439-450, 2000. [9] G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, "Distortionless data hiding based on integer wavelet transform," Electronics Letters, vol. 38, pp. 1646-1648, 2002. [10] N. F. Johnson, Z. Duric, S. Jajodia, and N. Memon, "Information hiding: Steganography and watermarking—attacks and countermeasures," Journal of Electronic Imaging, vol. 10, pp. 825-826, 2001. [11] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding – a survey," Proc. IEEE, vol. 87, pp. 1062-1078, 1999. [12] C. Kiho, Y. Hwan Sik, and K. Nam Soo, "Robust data hiding for mclt based acoustic data transmission," IEEE Signal Process. Lett., vol. 17, pp. 679-682, 2010. [13] O. T. C. Chen and W. Wen-Chih, "Highly robust, secure, and perceptual-quality echo hiding scheme," Audio, Speech, and Language Processing, IEEE Transactions on, vol. 16, pp. 629-638, 2008. [14] E. Esen and A. A. Alatan, "Robust video data hiding using forbidden zone data hiding and selective embedding," IEEE Trans. Circuits Syst. Video Technol., vol. 21, pp. 1130-1138, 2011. [15] M. Xiaojing, L. Zhitang, T. Hao, and Z. Bochao, "A data hiding algorithm for h.264/avc video streams without intra-frame distortion drift," IEEE Trans. Circuits Syst. Video Technol., vol. 20, pp. 1320-1330, 2010. [16] J.-S. Taur, H.-Y. Lin, H.-L. Lee, and C.-W. Tao, "Data hiding in DNA sequences based on table lookup substitution," Int. J. Innovative Comput. Inform. Control, vol. 8, pp. 6585-6598, 2012. [17] H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, "Data hiding methods based upon DNA sequences," Inform. Sci., vol. 180, pp. 2196-2208, 2010. [18] C. T. Clelland, V. Risca, and C. Bancroft, "Hiding messages in DNA microdots," Nature, vol. 399, pp. 533-534, 1999. [19] A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, "Cryptography with DNA binary strands," Biosystems, vol. 57, pp. 13-22, 2000. [20] B. Shimanovsky, J. Feng, and M. Potkonjak, "Hiding data in DNA," in Revised Papers from the 5th Int. Workshop on Information Hiding, 2003, pp. 373-386. [21] C. C. Chang, T. C. Lu, Y. F. Chang, and R. C. T. Lee, "Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium," Int. J. Innovative Comput. Inform. Control, vol. 3, pp. 1145-1160, 2007. [22] C.-F. Lee and H.-L. Chen, "A novel data hiding scheme based on modulus function," Journal of Systems and Software, vol. 83, pp. 832-843, 2010. [23] C.-S. Chan and C.-Y. Chan, "Reversible data hiding in two steganographic images using matrix coding," Int. J. Innovative Comput. Inform. Control, vol. 6, pp. 2089-2102, 2010. [24] P. Tsai, "Data hiding for index-based images using overlapping codeword clustering and run length concept," Int. J. Innovative Comput. Inform. Control, vol. 6, pp. 2701-2713, 2010. [25] D.-C. Lou, C.-H. Hu, and C.-C. Chiu, "Steganalysis of histogram modification reversible data hiding scheme by histogram feature coding," Int. J. Innovative Comput. Inform. Control, vol. 7, pp. 6571-6583, 2011. [26] Z. Zhao, K.-Y. Chau, and Z.-M. Lu, "High capacity data hiding in reversible secret sharing," Int. J. Innovative Comput. Inform. Control, vol. 7, pp. 6411-6421, 2011. [27] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing embedded data," U.S. Patent 6278791, 2001. [28] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, pp. 354-362, 2006. [29] M. Fallahpour and M. H. Sedaaghi, "High capacity lossless data hiding based on histogram modification," IEICE Electronics Express, vol. 4, pp. 205-210, 2007. [30] W. Zhang, X. Hu, X. Li, and N. Yu, "Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression," IEEE Trans. Image Process., vol. 22, pp. 2775-2785, 2013. [31] NCBI. (2013). Ncbi database. Available: [32] EMBL-EBI. (2013). European bioinformatics institute. Available:

Hiding secret messages in DNA sequences has become a popular research in recent years. In this thesis, we propose an improved algorithm named the Table Lookup Substitution Method (TLSM) to enhance the performance of an existing data hiding method called the substitution method. Moreover, a general form of the TLSM is proposed, which includes the original method as a special case and completes the theory of substitution methods. Based on this general form, we design several mutated methods that can further improve the performance of capacity and security. After that, we successfully hide messages in images with the principle of TLSM, which shows that the TLSM can be widely used in other digital media. We develop four irreversible hiding methods based on LSB scheme and four reversible hiding methods based on histogram shifting. Experimental results of the TLSM in DNA and images are illustrated and compared then.
其他識別: U0005-1408201313105400
Appears in Collections:電機工程學系所

Show full item record
TAIR Related Article

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.