跳到主要內容

臺灣博碩士論文加值系統

(44.200.122.214) 您好!臺灣時間:2024/10/07 23:35
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林陽彬
研究生(外文):Yang-Bin Lin
論文名稱:適用於影像與行動商務之機密分享偽裝技術之研究
論文名稱(外文):A Study on Secret Sharing SteganographicSchemes for Images and M-Commerce
指導教授:王宗銘王宗銘引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:61
中文關鍵詞:偽裝機密分享行動商務漸進式欺騙者識別簽章
外文關鍵詞:Steganographysecret sharingm-commerceprogressivecheater identificationsignature
相關次數:
  • 被引用被引用:0
  • 點閱點閱:219
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
資訊隱藏是一種用來保護在不安全網路中傳送機密資料的技術。所謂的資訊隱藏就是將機密資料嵌入到掩護影像中進而得到偽裝影像,使得非法的使用者無法從偽裝影像中察覺察出機密資料的存在,因此,機密資料就可以安全地經由不安全的網路傳送給接收者。

在本論文中,根據機密分享機制,我們提出三個偽裝的技術。在2005年,Fan和Kuo針對行動商務提出一個偽裝技術,在他們的方法中,傳輸者一次只能地傳送一個訊息m給通訊的另一方;然而,若要傳送r個訊息,傳送者必須傳送r次,則必須花費許多的傳輸時間,因此,我們提出一個更有效率的技術去改進Fan 和Kuo技術在傳輸上的負擔。另外,我們的技術仍然保有原本技術的優點,如降低計算的複雜度、以及抵抗主動和被動的攻擊等。

接著,我們考慮如果機密資料是一張尺寸較大的機密影像。由於無法將此影像直接藏入到一張掩護影像中,所以必須將此影像切割成許多部份,並根據一個特定的順序,將這些資料嵌入到多張掩護影像中,合法的接收著若要從偽裝影像中正確地取出機密資料,則必須要事先知道特定的萃取順序,我們提出一個新的影像偽裝技術,該技術可以將一張尺寸大的機密影像嵌入到多張掩護影像中,除了不用考慮特定萃取資料之順序,還可以以漸進的方式得到機密影像,利用我們的技術,收到k張偽裝影像後,可以先建構出一張影像的整體輪廓,當收到愈多張偽裝影像時,則得到之影像會愈來愈清晰。

最後,我們提出一個兼具偽裝與鑑別騙子的影像分享技術,我們的方法具有以下的特性:在一個區塊中,我們可以藏入機密影像的t個像素,第二:我們可以從t張偽裝影像,重建出機密影像,第三:利用資料簽章演算法來鑑別騙子,如果第i張偽裝影像被偽造,則取出來的簽章和原本的簽章就會不一樣,即表示第i個參與者為騙子。
Information hiding is one of the schemes which can be used to protect the secret transmitted over the insecure network. It can embed secret data into the adaptive cover-images and then generates the stego-images so that illegal users cannot easily perceive the existence of then secret data from the stego-images. Thus, the secrets can be securely delivered to the receivers over the insecure networks.

In this study, we propose three steganographic schemes based on secret sharing mechanism. In 2005, Fan and Kuo proposed a steganography scheme for m-commerce. In their scheme, a transmitter can only deliver one message m to another communication side at one time. However, if there are r messages to be delivered, a transmitter has to deliver r times such that it will result in a lot of transmission time. Therefore, we propose an efficient scheme to improve the transmitted overhead of the previous scheme. In addition, our scheme still maintains the advantages of Fan and Kuo’s scheme including efficiently reducing computing complexity and resisting active and passive attacks.

Next, we consider if the secret is a large image. Since this image cannot be directly embedded into one cover-image, it has to be divided into several parts and then embed them into several cover-images in a specific order. The legal receiver has to know the extracted order first and then can extract the whole secret image correctly. We propose a new image steganographic scheme for embedding a large and secret image into multiple cover-images without considering the extracted order and then providing progressive extraction. Instead of extracting the entire secret data bit-by-bit, our scheme can roughly extract the secret image while receiving k stego-images. When more stego-images are received, the extracted image becomes clear.

Finally, we propose an image sharing scheme with steganography and cheater identification. Our scheme has the following characteristics. The embedded capacity is high that t pixels of secret image can be embedded into each block. Second, the secret image can be reconstructed from t stego-images. Third, digital signature algorithm is applied to identify cheaters. If ith stego-image has been tampered or faked, the extracted signatures will not be the same as the original signatures. In other words, ith participant is a cheater.
Contents

誌謝…………………………………………………………………………………i
中文摘要………………………………………………………………………….iii
Abstract…………………………………………………………………………v
Contents………………………………………………………………………vii
List of Figures…………………………………………………………………ix
List of Tables……………………………………………………………………x
1. Introduction………………………………………………………………1
1.1 Research Motivation…………………………………………………1
1.2 Thesis Organization……………………………………………………3
2. An Efficient Steganography Scheme for M-Commerce…………………5
2.1 Preliminary……………………………………………………………5
2.2 Secret Sharing…………………………………………………………6
2.3 Review of Fan and Kuo’s Steganography Scheme……………………7
2.3.1 Secret Sharing Procedure………………………………………8
2.3.2 Embedding and Transmission Procedure………………………8
2.3.3 Resuming Procedure…………………………………………9
2.4 Proposed Scheme……………………………………………………9
2.4.1 Secret Sharing Procedure……………………………………10
2.4.2 Embedding and Transmission Procedure……………………10
2.4.3 Resuming Procedure…………………………………………11
2.5 Performance Analysis…………………………………………………11
3. Hiding a Large Secret Images into Multiple Images with Progressive Extraction………………………………………………………………13
3.1 Preliminary……………………………………………………………13
3.2 Proposed Scheme……………………………………………………17
3.2.1 Embedding Procedure………………………………………17
3.2.2 Extracting Procedure…………………………………………20
3.2.3 An Example…………………………………………………21
3.3 Experimental Results…………………………………………………24
4. An Image Sharing Scheme with Steganography and Cheater Identification………………………………………………………………32
4.1 Preliminary……………………………………………………………32
4.2 Least Significant Bit Substitution……………………………………33
4.3 Review of Yang et al.’s Scheme………………………………………34
4.3.1 Embedding Procedure………………………………………35
4.3.2 Recovering Procedure………………………………………37
4.4 Proposed Scheme……………………………………………………39
4.4.1 Embedding Procedure………………………………………39
4.4.2 Recovering Procedure………………………………………41
4.5 Experimental Results…………………………………………………44
5. Conclusions and Future Works…………………………………………50
5.1 Conclusions…………………………………………………………50
5.2 Future Works………………………………………………………51
Bibliography……………………………………………………………………53
Index……………………………………………………………………………60
Bibliography
[1] G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313-317, June 1979.
[2] N. Bourbakis and C. Alexopoulos, “Picture data encryption using scan patterns,”Pattern Recognition, vol. 25, no. 6, pp. 567-581, 1992.
[3] N. Bourbakis and A. Dollas,“SCAN-based compression-encryption-hiding for video on demand,” IEEE MultiMedia, vol. 10, pp. 79-87, September 2003.
[4] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,”Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
[5] C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol. 141, no. 1-2, pp. 123-138, March 2002.
[6] C. C. Chang, M. S. Hwang, and C. S. Chen, “A new encryption algorithm for image cryptosystems,” Journal of Systems and Software, vol. 58, no. 2, pp. 83-91, 2001.
[7] C. C. Chang, T. K. Shih, and I. C. Lin, “Guessing by neighbors: An efficient reconstruction method for transmitting image progressively,” Visual Computer, vol. 19, no. 5, pp. 342-353, August 2003.
[8] S. K. Chen and J. C. Lin, “Fault-tolerant and progressive transmission of images,”Pattern Recognition, vol. 38, no. 12, pp. 2466-2471, December 2005.
[9] T. S. Chen, C. C. Chang, and M. S. Hwang, “A virtual image cryptosystem based on vector quantization,” IEEE Transactions on Image Processing, vol. 7, no. 10,
pp. 1485-1488, 1997.
[10] H. Cheng and Xiaobo Li, “Partial encryption of compressed images and videos,”IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439-2451, 2000.
[11] Y. H. Chu and S. Chang, “Dynamical cryptography based on synchronised chaotic systems,” IEE Electronics Letters, vol. 35, no. 12, pp. 974-975, 1999.
[12] K. L. Chung and S. Y. Tseng, “New progressive image transmission based on quadtree and shading approach with resolution control,” Pattern Recognition Letters,
vol. 22, no. 14, pp. 1545-1555, December 2001.
[13] K. Fan and W. Kou, “Steganography scheme for m-commerce,” Electronics Letters, vol. 41, no. 3, pp. 117-119, 2005.
[14] J. B. Feng, H. C. Wu, C. S. Tsai, and Y. P. Chu, “A new multi-secret images sharing scheme using Largrange''s interpolation,” Journal of Systems and Software, vol. 76,
no. 3, pp. 327-339, June 2005.
[15] M. S. Fu and O. C. Au, “Data hiding watermarking for halftone images,” IEEE Transactions on Image Processing, vol. 11, no. 4, pp. 477-484, April 2002.
[16] F. Hartung and F. Ramme, “Digital rights management and watermarking of multimedia content for m-commerce applications,” IEEE Communications Magazine,
vol. 38, no. 11, pp. 78-84, 2000.
[17] H. J. Highland, “Data encryption: a non-mathematical approach,” Computers and Security, vol. 16, no. 5, pp. 369-386, 1997.
[18] M. T. Hogan, F. Balado, G. C. M. Silvestre, and N. J. Hurley, “Secure and robust steganography using side information at the encoder,” IEE Proceedings on Informa-
tion Security, vol. 153, no. 3, pp. 87-95, September 2006.
[19] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, June 1999.
[20] K. L. Huang, C. C. Chang, and I. C. Lin, “A lossless compression-based progressive image transmission scheme,” Imaging Science Journal, vol. 52, no. 4, pp. 212-224,
2004.
[21] K. L. Hung and C. C. Chang, “A novel progressive image transmission technique for chinese calligraphy,” International Journal of Computer Processing of Oriental
Languages, vol. 14, no. 4, pp. 293-307, 2001.
[22] H. Inoue, A. Miyazaki, and T. Katsura, “Wavelet-based watermarking for tamper proofing of still images,” in IEEE International Conference on Image Processing,
vol. 2, pp. 88-91, September 2000.
[23] S. Katzenbeisser and F. A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Hardcover edition, February 2000.
[24] H. Y. Kim and A. Afif, “A secure authentication watermarking for halftone and binary images,” International Journal of Imaging Systems and Technology, vol. 14, no. 4, pp. 147-152, December 2004.
[25] C. J. Kuo, “Novel image encryption technique and its application in progressive transmission,” Journal of Electronic Imaging, vol. 2, no. 4, pp. 345-351, 1993.
[26] C. C. Lin and W. H. Tsai, “Secret image sharing with capability of share data reduction,” Optical Engineering, vol. 42, no. 8, pp. 2340-2345, August 2003.
[27] C. C. Lin and W. H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, no. 3, pp. 405-414, November
2004.
[28] P. L. Lin, C. K. Hsieh, and P. W. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, vol. 38,
no. 11, pp. 2519-2529, December 2005.
[29] D. C. Lou and C. H. Sung, “A steganography scheme for secure communication based on the Chaos and Euler theorem,” IEEE Transactions on Multimedia, vol. 6,
no. 3, pp. 501-509, 2004.
[30] C. S. Lu and H. Y. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, October 2001.
[31] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, March
2006.
[32] S. C. Pei and J. M. Guo, “High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter,” IEEE Transactions on
Image Processing, vol. 15, no. 6, pp. 1665-1679, June 2006.
[33] S. C. Pei, J. M. Guo, and H. Lee, “Novel robust watermarking technique in dithering halfton images,” IEEE Signal Processing Letters, vol. 12, no. 4, pp. 333-336, April 2005.
[34] J. A. Senn, “The emergence of m-commerce,” Computer, vol. 33, no. 12, pp. 148-150, 2000.
[35] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612-613, November 1979.
[36] G. J. Simmons, “The prisoners'' problem and the subliminal channel,” in CRYPTO''83, pp. 51-67, 1983.
[37] C. C. Thien and J. C. Lin, “Secret image sharing,” Computers and Graphics, vol. 26, no. 1, pp. 765-770, October 2002.
[38] C. C. Thien and J. C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 3,
no. 12, pp. 1161-1169, December 2003.
[39] C. C. Thien and J. C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition,
vol. 36, no. 12, pp. 2875-2881, December 2003.
[40] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896,
August 2003.
[41] C. L. Tsai, H. F. Chiang, K. C. Fan, and C. D. Chung, “Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mecha-
nism,” Pattern Recognition, vol. 38, no. 11, pp. 1993-2006, 2005.
[42] C. S. Tsai, C. C. Chang, and T. S. Chen, “Sharing multiple secrets in digital images,”Journal of Systems and Software, vol. 64, no. 2, pp. 163-170, November 2002.
[43] Y. Y. Tsai and C. M. Wang, “A novel data hiding scheme for color images using a bsp tree,” Journal of Systems and Software, vol. 80, no. 3, pp. 429-437, March 2007.
[44] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A secure data hiding scheme for binary images,” IEEE Transactions on Communications, vol. 50, no. 8, pp. 1227-1231,
August 2002.
[45] S. Walton, “Image authentication for slippery new age,” Dr. Dobbs Journal, vol. 20, no. 4, pp. 18-26, 1995.
[46] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,” Journal of Systems and
Software, In Press, Corrected Proof, 2007.
[47] R. Z. Wang and Y. S. Chen, “High-payload image steganography using two-way block matching,” IEEE Signal Processing Letters, vol. 13, no. 3, pp. 161-164, March
2006.
[48] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.
[49] R. Z. Wang, C. P. Lin, and J. C. Lin, “Hiding data in images by optimal moderately-significant-bit replacement,” IEE Electronics Letters, vol. 36, no. 25, pp. 2069-2070, 2000.
[50] R. Z. Wang and C. H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, no. 6, pp. 551-555, April 2006.
[51] R. Z. Wang and Y. D. Tsai, “An image-hiding method with high hiding capacity based on best-block matching and k-means clustering,” Pattern Recognition, vol. 40,
no. 2, pp. 398-409, February 2007.
[52] S. J. Wang, “Steganography of capacity required using modulo operator for embedding secret image,” Applied Mathematics and Computation, vol. 164, no. 1, pp. 99-116, May 2005.
[53] D. C. Wu and W. H. Tsai, “Spatial-domain image hiding using image differencing,”IEE Proceedings on Vision, Image and Signal Processing, vol. 147, no. 1, pp. 29-37, 2000.
[54] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S Hwang, “Image steganographic scheme based on pixel-value differencing and lsb replacement methods,” IEE Proceedings on Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611-615, October 2005.
[55] Y. S. Wu, C. C. Thien, and J. C. Lin, “Sharing and hiding secret images with size constraint,” Pattern Recognition, vol. 37, no. 7, pp. 1377-1385, July 2004.
[56] C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80,
no. 7, pp. 1070-1076, July 2007.
[57] L. Yu, X. Niu, and S. Sun, “Print-and-scan model and the watermarking countermeasure,” Image and Vision Computing, vol. 23, no. 9, pp. 807-814, 2005.
[58] X. Zhang and S. Wang, “Steganography using multiple-base notational system and human vision sensitivity,” IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70,
2005.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top