Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/9355
標題: 查表替換資料隱藏方法應用於脫氧核醣核酸序列與影像
Data Hiding Based on Table Lookup Substitution Method in DNA Sequences and Images
作者: 林恆毅
Lin, Heng-Yi
關鍵字: 資料隱藏;data hiding
出版社: 電機工程學系所
引用: [1] L. Kencl and M. Loebl, "DNA-inspired information concealing: A survey," Computer Science Review, vol. 4, pp. 251-262, 2010. [2] A. D. Ker, "Steganalysis of lsb matching in grayscale images," IEEE Signal Process. Lett., vol. 12, pp. 441-444, 2005. [3] C.-K. Chan and L. M. Cheng, "Hiding data in images by simple lsb substitution," Pattern Recognition, vol. 37, pp. 469-474, 2004. [4] H.-C. Wu, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, "Image steganographic scheme based on pixel-value differencing and lsb replacement methods," IEE Proceedings-Vision, Image and Signal Processing, vol. 152, pp. 611-615, 2005. [5] J. Mielikainen, "Lsb matching revisited," IEEE Signal Process. Lett., vol. 13, pp. 285-287, 2006. [6] X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett., vol. 10, pp. 781-783, 2006. [7] Y.-Y. Tsai and C.-M. Wang, "A novel data hiding scheme for color images using a bsp tree," Journal of systems and software, vol. 80, pp. 429-437, 2007. [8] R. Agrawal and R. Srikant, "Privacy-preserving data mining," ACM Sigmod Record, vol. 29, pp. 439-450, 2000. [9] G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, "Distortionless data hiding based on integer wavelet transform," Electronics Letters, vol. 38, pp. 1646-1648, 2002. [10] N. F. Johnson, Z. Duric, S. Jajodia, and N. Memon, "Information hiding: Steganography and watermarking—attacks and countermeasures," Journal of Electronic Imaging, vol. 10, pp. 825-826, 2001. [11] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding – a survey," Proc. IEEE, vol. 87, pp. 1062-1078, 1999. [12] C. Kiho, Y. Hwan Sik, and K. Nam Soo, "Robust data hiding for mclt based acoustic data transmission," IEEE Signal Process. Lett., vol. 17, pp. 679-682, 2010. [13] O. T. C. Chen and W. Wen-Chih, "Highly robust, secure, and perceptual-quality echo hiding scheme," Audio, Speech, and Language Processing, IEEE Transactions on, vol. 16, pp. 629-638, 2008. [14] E. Esen and A. A. Alatan, "Robust video data hiding using forbidden zone data hiding and selective embedding," IEEE Trans. Circuits Syst. Video Technol., vol. 21, pp. 1130-1138, 2011. [15] M. Xiaojing, L. Zhitang, T. Hao, and Z. Bochao, "A data hiding algorithm for h.264/avc video streams without intra-frame distortion drift," IEEE Trans. Circuits Syst. Video Technol., vol. 20, pp. 1320-1330, 2010. [16] J.-S. Taur, H.-Y. Lin, H.-L. Lee, and C.-W. Tao, "Data hiding in DNA sequences based on table lookup substitution," Int. J. Innovative Comput. Inform. Control, vol. 8, pp. 6585-6598, 2012. [17] H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, "Data hiding methods based upon DNA sequences," Inform. Sci., vol. 180, pp. 2196-2208, 2010. [18] C. T. Clelland, V. Risca, and C. Bancroft, "Hiding messages in DNA microdots," Nature, vol. 399, pp. 533-534, 1999. [19] A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, "Cryptography with DNA binary strands," Biosystems, vol. 57, pp. 13-22, 2000. [20] B. Shimanovsky, J. Feng, and M. Potkonjak, "Hiding data in DNA," in Revised Papers from the 5th Int. Workshop on Information Hiding, 2003, pp. 373-386. [21] C. C. Chang, T. C. Lu, Y. F. Chang, and R. C. T. Lee, "Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium," Int. J. Innovative Comput. Inform. Control, vol. 3, pp. 1145-1160, 2007. [22] C.-F. Lee and H.-L. Chen, "A novel data hiding scheme based on modulus function," Journal of Systems and Software, vol. 83, pp. 832-843, 2010. [23] C.-S. Chan and C.-Y. Chan, "Reversible data hiding in two steganographic images using matrix coding," Int. J. Innovative Comput. Inform. Control, vol. 6, pp. 2089-2102, 2010. [24] P. Tsai, "Data hiding for index-based images using overlapping codeword clustering and run length concept," Int. J. Innovative Comput. Inform. Control, vol. 6, pp. 2701-2713, 2010. [25] D.-C. Lou, C.-H. Hu, and C.-C. Chiu, "Steganalysis of histogram modification reversible data hiding scheme by histogram feature coding," Int. J. Innovative Comput. Inform. Control, vol. 7, pp. 6571-6583, 2011. [26] Z. Zhao, K.-Y. Chau, and Z.-M. Lu, "High capacity data hiding in reversible secret sharing," Int. J. Innovative Comput. Inform. Control, vol. 7, pp. 6411-6421, 2011. [27] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing embedded data," U.S. Patent 6278791, 2001. [28] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, pp. 354-362, 2006. [29] M. Fallahpour and M. H. Sedaaghi, "High capacity lossless data hiding based on histogram modification," IEICE Electronics Express, vol. 4, pp. 205-210, 2007. [30] W. Zhang, X. Hu, X. Li, and N. Yu, "Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression," IEEE Trans. Image Process., vol. 22, pp. 2775-2785, 2013. [31] NCBI. (2013). Ncbi database. Available: http://www.ncbi.nlm.nih.gov/ [32] EMBL-EBI. (2013). European bioinformatics institute. Available: http://www.ebi.ac.uk/
摘要: 
將隱密的資料隱藏在去氧核醣核酸序列中的研究在近幾年中已成為一個常見的研究主題,與其他常用的影像、視訊、音訊等媒體相比,去氧核醣核酸序列具有一些先天的優勢。在這篇論文中,我們提出一個查表替換方法,此方法提供了一種可大幅加強改進原有基於互補規則替換法的演算法。根據此改進演算法,接下來我們更討論推演出此查表替換方法的一般化形式,完善查表替換的基礎理論方法。基於此一般化形式,我們得以推演出數種不同形式的衍生方法,可以針對不同的需求更進一步改善方法的容量或安全性。同時,此一般化形式的出現,讓查表替換資料隱藏方法將不再侷限於去氧核醣核酸序列,而能夠廣泛應用於數位資料之中。為證明其可行性,我們將查表替換方法應用於影像之中並取得成功。在此論文中,我們分別提出了基於最低有效位元方法的不可逆查表替換方法與基於直方圖搬移的可逆查表替換方法。最後,我們也提供了一些效能的比較與實驗的結果。

Hiding secret messages in DNA sequences has become a popular research in recent years. In this thesis, we propose an improved algorithm named the Table Lookup Substitution Method (TLSM) to enhance the performance of an existing data hiding method called the substitution method. Moreover, a general form of the TLSM is proposed, which includes the original method as a special case and completes the theory of substitution methods. Based on this general form, we design several mutated methods that can further improve the performance of capacity and security. After that, we successfully hide messages in images with the principle of TLSM, which shows that the TLSM can be widely used in other digital media. We develop four irreversible hiding methods based on LSB scheme and four reversible hiding methods based on histogram shifting. Experimental results of the TLSM in DNA and images are illustrated and compared then.
URI: http://hdl.handle.net/11455/9355
其他識別: U0005-1408201313105400
Appears in Collections:電機工程學系所

Show full item record
 
TAIR Related Article

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.