跳到主要內容

臺灣博碩士論文加值系統

(44.200.86.95) 您好!臺灣時間:2024/05/25 16:52
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:許鈵昆
研究生(外文):Ping-Kun Hsu
論文名稱:文字類型檔案的資訊隱藏技術之研究
論文名稱(外文):A Study of Data Hiding Scheme for Text Files
指導教授:林詠章林詠章引用關係
口試委員:詹昭文黃國峰黃慧鳳
口試日期:2011-06-28
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊管理學系所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:44
中文關鍵詞:資訊隱藏word檔HTML檔多管道浮水印藏入系統投票機制
外文關鍵詞:data hidingword documentHTML filemulti-channel systemvoting phase
相關次數:
  • 被引用被引用:0
  • 點閱點閱:224
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
資訊隱藏是近年來相當熱門的研究議題。不同於密碼學中將機密資訊以密文的方式在雙方之間傳送,資訊隱藏利用將機密資訊隱藏於有意義的掩護檔案裡傳送的方式,用以確保機密資訊不被惡意攻擊者發覺從而進行竊聽或截取。然而,當前的資訊隱藏以影像作為掩護檔案為主要研究方向,不同檔案類型的研究則不多。為了讓不同類型之檔案也可作為掩護之用,目前已有針對word檔與HTML檔的隱藏技術,但其隱藏量則稍嫌不足,且其修改原始掩護檔案之次數也較多。為此,本研究提出了word檔與HTML檔的資訊隱藏方法。根據實驗結果顯示,所提出的方法可以降低修改掩護檔案的次數,並且提高隱藏量。
除了確保機密資訊的安全性之外,檔案的版權歸屬也是相當重要的研究範疇。隨著資訊技術的發達,任何人皆可輕易地複製或擷取部分有意義之檔案作為己用。當前的版權保護以在影像中加入含有擁有者資訊的浮水印為主,並且應避免檔案遭到竄改或破壞後,造成浮水印失真而變得難以識別。不同於影像有多餘的資訊用以藏入浮水印,若欲將浮水印藏入HTML檔案則需提出符合HTML特性的浮水印隱藏方法。為此,本研究提出一種針對HTML檔案的多管道浮水印藏入系統,透過投票機制,即使有些微資訊遺失也能正確擷取出浮水印。


Data hiding scheme has been a popular research issue nowadays. Being different in cryptography, data hiding scheme embeds secret data in meaningful files and transmits between senders and receivers. However, most studies of data hiding focus on image; other files have less research. For the aim of using various files as cover files, several studies which employ word documents and HTML files had been proposed. Nevertheless, these schemes have less capacity and the time of modifying spaces could be decreased. In this study, data hiding scheme on word documents and on HTML files are proposed, respectively. According to experiment results, the proposed schemes are better than other schemes in capacity, and the time of modifying is less as well. It will be appropriate for data hiding on word documents and HTML files.
In addition to data hiding, we also present a novel watermarking scheme for HTML files in this study. The proposed scheme hides watermark simultaneously with some hiding schemes, that is, multi-channel system, in the cause of the purpose of watermark. Furthermore, a voting phase will execute as we extract the watermark. It can assure that the extracted watermark is more similar to original one.


摘 要 i
Abstract ii
Contents iii
List of Tables v
List of Figures vi
Chapter 1. Introduction 1
Chapter 2. A Data Hiding Scheme for Word Documents Using Multiple-base Notational System 5
2.1. Preliminary 5
2.2. Related Works 5
2.2.1. Chen et al.’s Scheme 5
2.2.2. Multiple-base Notational System 6
2.3. The Proposed Scheme 7
2.4. Experiment Result and Analysis 9
2.5. Summary 11
Chapter 3. Data Hiding for HTML Files Using Character Coding Table and Index Coding Table 12
3.1. Preliminary 12
3.2. Related Works 12
3.3. The Proposed Scheme 18
3.4. Experiment Result and Analysis 21
3.5. Summary 24
Chapter 4. A Novel Watermarking for HTML Files Based on Multi-channel System 26
4.1. Preliminary 26
4.2. Related Works 26
4.2.1. Case of Tag Letter 26
4.2.2. Quotation Marks 27
4.2.3 Attribute Permutation with Case of Name String 28
4.2.4. Space beside Equal Sign 29
4.3. The Propose Scheme 32
4.4. Experiment Result and Analysis 37
4.5. Summary 39
Chapter 5. 40
Conclusions and Future Works 40
References 42


[1]C.C. Chang, C.C. Wu, and I.C. Lin, “A Data Hiding Method for Text Documents Using Multiple-Base Encoding,” Communications in Computer and Information Science, Germany: SpringerLink, vol. 66, pp. 101-109, 2010.
[2]C. Chen, S.Z. Wang, and X.P. Zhang, “Information Hiding in Text Using Typesetting Tools with Stego-Encoding,” Proceedings of the First International Conference on Innovative Computing, Information and Control, Beijing, China, August 30-September 1, vol. 1, pp. 459-462, 2006.
[3]M.A. Qadir and I. Ahmad, “Digital Text Watermarking: Secure Content Delivery and Data Hiding in Digital Documents,” IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 11, pp. 18-21, 2006.
[4]T.Y. Liu and W.H. Tsai, “A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 24-30, 2007.
[5]X.M Sun, G. Lou, and H.J. Huang, “Component-based Digital Watermarking of Chinese Texts,” Proceedings of the Third International Conference on Information Security, Shanghai, China, November 14-15, vol. 85, pp. 76-81, 2004.
[6]Y.W. Kim, K.A. Moon, and I.S. Oh, “A Text Watermarking Algorithm Based on Word Classification and Inter-word Space Statistics,” Proceedings of the Seventh International Conference on Document Analysis and Recognition, Edinburgh, Scotland, August 3-6, pp. 775-779, 2003.
[7]Z.H. Wang, C.C. Chang, C.C Lin, and M.C Li, “A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation,” Systems and Software, vol. 82, no. 8, pp. 1362-1369, 2009.
[8]I.S. Lee and W.H. Tsai, “A New Approach to Covert Communication via PDF Files,” Signal Processing, vol. 90, no. 2, pp. 557-565, 2010.
[9]S.P. Zhong, X.Q. Cheng, and T.R. Chen, “Data Hiding in a Kind of PDF Texts for Secret Communication,” International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007.
[10]H.J. Huang, S.H. Zhong, and X.M. Sun, “An Algorithm of Webpage Information Hiding Based on Attributes Permutation,” Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 15-17, pp. 257-260, 2008.
[11]H.J. Huang, X.M. Sun, Z.S. Li, and G. Sun, “Detection of Hidden Information in Webpage,” Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, Haikou, China, August 24-27, vol. 4, pp. 317-321, 2007.
[12]I.S. Lee and W.H. Tsai, “Secret Communication through Web Pages Using Special Space Codes in HTML Files,” International Journal of Applied Science and Engineering, vol. 6, no. 2, pp. 141-149, 2008.
[13]S. Dey, H. Al-Qaheri, and Sugata Sanyal, “Embedding Secret Data in HTML Web Page,” Image Processing & Communications Challenges, pp. 474-481, 2009.
[14]X.G. Sui and H. Luo, “A New Steganography Method Based on Hypertext,” Proceedings of Asia-Pacific Radio Science Conference, Qingdao, China, August 24-27, pp. 181-184, 2004.
[15]Y.J. Yang and Y.M. Yang, “An Efficient Webpage Information Hiding Method Based on Tag Attributes,” Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, Yantai, China, August 10-12, pp. 1181-1184, 2010.
[16]I.S. Lee and W.H. Tsai, “Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes,” International Journal of Network Security, vol. 10, no. 1, pp. 1-10, 2010.
[17]Y.W. Kim, K.A. Moon, and I.S. Oh, “A Text Watermarking Algorithm Based on Word Classification and Inter-word Space Statistics,” Proceedings of the Seventh International Conference on Document Analysis and Recognition, Edinburgh, Scotland , August 3-6, pp. 775-779, 2003.
[18]Automatic Information Processing Lab, “Digital Watermarking,” http://debut.cis.nctu.edu.tw/Demo/Watermarking/watermarking_new.htm, available on June 20, 2011.
[19]X.P. Zhang and S.Z. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70, 2005.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top