跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.141) 您好!臺灣時間:2025/10/09 10:13
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳勤廣
研究生(外文):Chen, Chin Kuang
論文名稱:以希爾加密法及微晶片影像實作影像藏密演算法
論文名稱(外文):A Novel Steganography Using Hill Cipher and Microarray Images
指導教授:陳朝欽陳朝欽引用關係
指導教授(外文):Chen, Chaur Chin
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊系統與應用研究所
學門:電算機學門
學類:系統設計學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:英文
論文頁數:25
中文關鍵詞:隱寫術微晶片影像希爾加密法
外文關鍵詞:SteganographyMicroarray imagesHill cipher
相關次數:
  • 被引用被引用:1
  • 點閱點閱:228
  • 評分評分:
  • 下載下載:12
  • 收藏至我的研究室書目清單書目收藏:0
隨著網路技術的迅速發展,網路成為可以傳輸任何資訊和溝通的媒介,在透過這些媒介進行資料傳輸的過程中,許多具有重要內容的訊息可能會被有心人士擷取,所以在資料儲存、傳輸中,資訊安全成為重要的議題之一。探討資訊安全最主要的目的,就是如何去避免像是信用卡帳號密碼等個人的資訊,在透過網路進行溝通時被攻擊、竊取。影像藏密演算法,可以將重要的訊息藏匿在媒體當中,是一種可以實踐資訊安全內涵的資訊影藏技術。在此篇論文當中,使用微晶片影像、希爾加密法,以及最低有效位元替換來實作影像藏密演算法。因為微晶片影像特性,我們實作四個位元的最低有效位元替換來藏匿秘密訊息。此外,我們所提出的方法不會受到秘密訊息檔案格式的限制。
With the rapid development of technology, Internet has become possible to communicate and transmit any type of data across networks. Security of data or information has become a critical issue in data storage and transmission to prevent attacks from accessing personal information and other types of data such as credit card numbers. Steganography refers to the technique of hiding information in digital media in order to conceal the existence of the information. In this thesis, we use microarray image, Hill cipher algorithm and least significant bits substitution to implement steganography. Because of the advantage of the microarray images, we can perform the four bits LSB replacement method easily to embed the secret message. Moreover, our proposed system is not limited to files format of secret message.
Chapter 1 Introduction 1
Chapter 2 Background Review 4
2.1 Microarray Image Templates 4
2.2 Hill Cipher 6
2.2.1 Hill Matrix 6
2.2.2 Encryption and Decryption 7
2.3 Least Significant Bit (LSB) Algorithm 8
2.4 Other Related Works 9
Chapter 3 Proposed Data Hiding Method 10
3.1 Motivation 11
3.2 Proposed Method 11
3.2.1 Embedding Algorithm 11
3.2.2 Extracting Algorithm 14
Chapter 4 Experimental Results 15
4.1 Cover Images Selected 15
4.2 The Difference of Two Images 16
4.3 Experimental Results 17
4.4 Discussion 19
Chapter 5 Conclusion and Future Work 20
Appendix 21
References 24

[Aliz2000] A.A. Alizadeh et al., “Distinct types of diffuse large B-cell lymphoma identified by gene expression profiling,” Nature, Vol. 403, 503-511, 2000.
[Alon1999] U. Alon et al., “Broad Patterns of Gene Expression Revealed by Clustering Analysis of Tumor and Normal Colon Tissues Probed by Oligonucleotide Arrays,” Proceedings of the National Academy of Sciences of the United States of America, Vol. 96, No. 12, 6475- 6750, 1999.
[Cham2014] B.S. Champakamala, D. Padmini, and D.K. Radhika. “Least Significant Bit algorithm for image steganography,” International Journal of Advanced Computer Technology, Vol. 3, No. 4, 34-38, 2014.
[Chan2004] C.K. Chan and L.M. Cheng, “Hiding Data in Images By Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 469-474, 2004.
[Chen2006] C.C. Chen, C.Y. Kao, C.F. Chang, H.T. Chu, and C.N. Chen, “Simple Software for Microarray Image Analysis,” IEEE Proceedings of Computer and Robot Vision , Pid163-, Quebec city, Canada, June 7-9, 2006.
[Chen2014] C.C. Chen and W.J. Lai, “High-Capacity Steganography Using MRF-Synthesized Cover Images,” Annual Conference on Engineering and Information Technology, 237-242, Chiyoda, Japan, March 28-30, 2014.
[Kana2015] K. Kanagi, “Steganography Based on Color Images Using Advanced Encryption Standard (AES)”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, June, 2015.
[Liu2008] C.L. Liu and S.R. Liao, “High-Performance JPEG Steganography Using Complementary Embedding Strategy,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008.
[Mork2005] T. Morkel, J.H.P. Eloff, and M. S. Olivier. “An overview of image steganography,” Information Security, 1-11, Pretoria, South Africa, 2005.
[Stin2006] D.R. Stinson, “Cryptography Theory and Practice,” 3rd. ed., Chapman & Hall/CRC, 2006.
[Tsen2014] C.T. Tseng, “Steganography Based on Color Images”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, March, 2014.
[Youn2008] M.A.B. Younes, and A. Jantan. “A New Steganography Approach for Images Encryption Exchange by Using the Least Significant Bit Insertion,” International Journal of Computer Science and Network Security, Vol. 8, No. 6, 247-257, 2008.
[Ziel2014] E. Zielińska, W. Mazurczyk, and K. Szczypiorski. “Trends in steganography,” Communications of the ACM, Vol.57, No. 3, 86-95, 2014.
[Web01] http://en.wikipedia.org/wiki/Steganography, last access on 5/27/2016.
[Web02] http://en.wikipedia.org/wiki/Hill_cipher, last access on 5/27/2016.
[Web03] http://en.wikipedia.org/wiki/Least_significant_bit, last access on 5/27/2016.
[Web04] http://www.cs.nthu.edu.tw/∼cchen/Textdata/falls.txt, last access on 5/27/2016.
[Web05] http://www.cs.nthu.edu.tw/∼cchen/IMQA2016, last access on 5/27/2016.
[Web06] https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio, last access on 5/27/2016.
[Web07] http://wiki.tesnexus.com/index.php?title=File:Ascii-codes-table.png, last access on 5/27/2016.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top