| 研究生: |
潘祥光 Hsiang-Kuang Pan |
|---|---|
| 論文名稱: |
在數位影像上資料隱藏技術之探討 A Secure and Invisibile Data Hiding Scheme for Two-Color Images |
| 指導教授: |
曾煜棋
Yu-Chee Tseng |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 畢業學年度: | 88 |
| 語文別: | 中文 |
| 論文頁數: | 50 |
| 中文關鍵詞: | 傳真 、資料隱藏 、密碼學 、安全 |
| 外文關鍵詞: | facsimile, data hiding, cryptography, security |
| 相關次數: | 點閱:14 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來隨著電腦科學的進步,各種傳統的資料如影像、音樂和書本也漸漸的數位化。網路技術的開發,也使得這些數位化產品能夠很輕易的利用網路來傳送。由於網路的開放性,也就衍生出了網路安全與數位資料著作權相關的問題。
資訊隱藏(Information Hiding)是一門古老的科學。其中包含了兩大議題:資料隱藏(data hiding)和浮水印(Watermarking)。資料隱藏是將重要的資料嵌入在不受人注意的寄主媒介中,藉此分散敵人的注意力;浮水印則是將產品資訊隱藏在數位化的產品中,來達到著作權宣告的目的。
本篇論文主要是針對數位影像來實作資料隱藏,而其中我們更著重在單色影像。因為單色影像的每一個像素皆是用一個位元來表示。相對於彩色影像而言,在單色影像上的任何修改,將會很容易的被發現。因此,如何在單色影像上作資料隱藏也是一個重要的問題。
基於以上的問題,我們提出了二個針對單色影像上資料隱藏的方法,一個的特性是隱藏率高,而另一個則是隱藏後影像的品質相當好,不過這兩種方法和以前的方法比較,皆能隱藏較多的資料、維持一定的影像品質和提供較高的安全性。
[1] R. J. Anderson. Stretching the Limits of Steganography. In Information Hiding,
Springer Lecture Notes in Computer Science, volume 1174, pages 39{48, 1996.
[2] R. J. Anderson and F. A. P. Petitcolas. On the Limits of Steganography. IEEE
J. on Selected Areas in Communications, 16(4):474{481, May 1998.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for Data Hiding. IBM
System, 35(3{4), February 1996.
[4] E. Franz et al. Computer-Based Steganography. In Information Hiding, Springer
Lecture Notes in Computer Science, volume 1174, pages 7{21, 1996.
[5] R. L. Graham, D. E. Knuth, and O. Patashnik. Concrete Mathematics (2nd ed.).
Addison-Wesley, 1994.
[6] D. Gruhl and W. Bender. Information Hiding to Foil the Casual Counterfeiter.
In Proceedings of the Workshop on Information Hiding, IH''98, Portland, Oregon,
USA, April 1998.
[7] D. Kohn. The Codebreakers: The Story of Secret Writing. Scribner, New York,
1996.
[8] M. Kutter, F. Jordan, and F. Bossen. Digital Signature of Color Images using
Amplitude Modulation. Electronic Imaging, 7(2):326{332, April 1998.
[9] G. J. Simmons. The Prisoners'' Problem and the Subliminal Channel. In
CRYPTO''83, pages 51{67.
[10] G. J. Simmons. Results Concerning the Bandwidth of Subliminal Channels. IEEE
J. on Selected Areas in Communications, 16(4):463{473, May 1998.
[11] G. J. Simmons. The History of Subliminal Channels. IEEE J. on Selected Areas
in Communications, 16(4):452{462, May 1998.
[12] W. Stallings. Cryptography and Network Security. Prentice Hall, New Jersey,
1999.
[13] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A Digital Watermark. In
IEEE Int. Conf. Image Processing, volume 2, pages 86{90, 1994.
[14] R. Z. Wang, C. F. Lin, and J. C. Lin. Image Hiding by LSB Substitution and
Genetic Algorithm. In Proceedings of International Symposium on Multimedia
Information Processing, Chung-Li, Taiwan, R.O.C, December 1998.
[15] P. Wayner. Should encryption be regulated. Byte, May 1993.
[16] P. W. Wong. A Public key Watermark for Image Verication and Authentication.
In Proceedings of International Conference on Image Processing, Chicago, Illinois,
USA, October 1998.
[17] P. W. Wong. A Watermark for Image Integrity and Ownership Verication. In
Proceedings of IS&T PIC Conference, Portland, Oregon, USA, May 1998.
[18] M. Y. Wu and J. H. Lee. A Novel Data Embedding Method for Two-Color Facsim-
ile Images. In Proceedings of International Symposium on Multimedia Information
Processing, Chung-Li, Taiwan, R.O.C, December 1998.