(3.236.231.61) 您好!臺灣時間:2021/05/11 16:02
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:蘇威誌
研究生(外文):Wei-Chi Su
論文名稱:一個用於聊天室應用以同音字為基礎的中文文字隱藏技術
論文名稱(外文):A Homophonic-Based Chinese Text Steganography for Chatting Application
指導教授:王任瓚王任瓚引用關係
指導教授(外文):Ran-Zan Wang
學位類別:碩士
校院名稱:元智大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:37
中文關鍵詞:中文同音字文字資訊隱藏隱藏術資訊偽裝即時通訊聊天室
外文關鍵詞:Chinese homophonetext information hiddensteganographyInformation camouflageinstant messagingchat room
相關次數:
  • 被引用被引用:0
  • 點閱點閱:154
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:2
  • 收藏至我的研究室書目清單書目收藏:0
文字隱藏是將重要訊息資料隱藏至一段遮蔽文字中,得到偽裝文字,藉由偽裝文字外觀的自然性,使一般使用者無法直接察覺到秘密訊息的存在,達到安全傳送隱藏訊息的技術。在聊天室的應用上,本論文提出一個基於中文同音字為基礎的文字隱藏技術,利用聊天室允許傳送錯誤文字的特性,特別是中文同音錯別字(Homophone Errors),根據常用的中文同音字設計一個編碼簿,作為文字隱藏編碼的根據。實驗結果顯示,本研究所提的方法可以有效的在聊天文字中嵌入秘密訊息,所傳送的偽裝訊息,也不易被察覺。在聊天室等應用上,所提方法可提供一個即時且安全的秘密通訊工具。

Hidden text message data is important to a shelter to hide the text, the text has been disguised, camouflaged by the natural appearance of the text, so that users can not directly detect the existence of secret messages, hidden messages sent to security technology. In the chat room applications, this paper presents a homophone for the Chinese-based text hiding technique based on the use of text chat rooms allow the transmission error characteristics, especially the Chinese homophone spelling (Homophone Errors), used according to design a Chinese homophone codebook, as hidden text encoding basis. The results show that this study provides an effective way to embed a secret in the chat text messages, sent messages of camouflage, not readily detectable. In the chat room application, the proposed method can provide a confidential and secure real-time communication tools.

目錄
摘要 I
ABSTRACT II
第一章 簡介 1
1.1研究動機 1
1.2研究目的 3
1.3論文架構 5
第二章 相關技術 6
2.1文字隱藏的簡介 6
2.2文字隱藏相關技術 7
2.3以聊天室為基礎的秘密通訊研究 12
第三章 以同音中文字為基礎的中文文字隱藏方法 16
3.1所提方法主要的流程 16
3.2秘密訊息嵌入程序 19
3.3秘密訊息擷取程序 22
3.4字典設計 22
第四章 實驗結果 28
第五章 結論 33
5.1結論 33
參考文獻 34



[1]F. A. P. Petitcolas, R. J.Anderson, and M. G. Kuhn, “Information hiding – a survey,” Proceedings of the IEEE, 1999, Vol. 87, No. 7, pp. 1062–1078.
[2]R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques,” Proceedings of the International Conference on Image Processing, Vol. 3, No.7-10, pp. 1019 – 1022, October 2001.
[3]G. Do‥err and J.L. Dugelay, “A Guide Tour of Video Watermarking,” Signal Processing: Image Communication, Vol. 18, No. 4, pp. 263–282, 2003.
[4]G. Do‥err and J.L. Dugelay, “Security Pitfalls of Frame by – Frame Approaches to Video Watermarking,” IEEE Transactions on Signal Processing, Supplement on Secure Media, Vol. 52, No. 10, pp. 2955–2964, 2004.
[5]K.Gopalan, “Audio steganography using bit modification,” IEEE International Conference on Acoustics, Vol. 1, No. 6–10, 2003.
[6]M.H. Shirali-Shahreza and M. Shirali-Shahreza, “Text Steganography in Chat,”
IEEE/IFIP International Conference in Central Asia on Internet, No. 26–28, pp. 1–5, 2007.
[7]M. Liu, Y. Guo, L. Zhou, “Text Steganography Based on Online Chat,” Signal Processing: Intelligent Information Hiding and Multimedia, No. 12–14, pp. 807–810, 2009.
[8]Z.H. Wang, C.C. Chang, T.D. Kieu, M.C. Li, “Emoticon-based Text Steganography in Chat,” Asia-Pacific Conference on Computational Intelligence and Industrial Applications, Vol. 2, No. 28–29, pp. 457–460, 2010.
[9]M. Niimi, S. Minewaki, H. Noda and E. Kawaguchi, “A Framework of Text-based Steganography Using SD-Form Semantics Model,” Pacific Rim Workshop on Digital Steganography 2003, Kyushu Institute of Technology, Kitakyushu, Japan, July 3–4, 2003.
[10]M.H. Shirali-Shahreza and M. Shirali-Shahreza, “Text Steganography in SMS,” International Conference on Convergence Information Technology, No. 21–23, pp. 2260–2265, 2007.
[11]M.H. Shirali-Shahreza and M. Shirali-Shahreza, “A New Synonym Text Steganography,” Signal Processing: Intelligent Information Hiding and Multimedia, No. 15–17, pp. 1524–1526, 2008.
[12]M.H. Shirali-Shahreza and M. Shirali-Shahreza, “Text Steganography by Changing Words Spelling,” International Conference on Advanced Communication Technology, Vol. 3, No. 17–20, pp. 1912–1913, 2008.
[13]H.Z. Muhammad, S.M.S.A.A. Rahman and A. Shakil, “Synonym Based Malay Linguistic Text Steganography,” CITISIA, No. 25–26, pp. 423–427, July 2009.
[14]L. Yuling, S. Xingming, G. Can, W. Hong, “An efficient linguistic steganography for Chinese text,” IEEE International Conference on Multimedia and Expo, No. 2–5, pp. 2094–2097, 2007.
[15]X. Zheng, L. Huang, Z. Chen, Z. Yu, and W. Yang, “Hiding Information by Context-Based Synonym Substitution,” Lecture Notes in Computer Science Information Hiding, Vol. 5703, pp. 162–169, 2009.
[16]S. Changder, N.C. Debnath and D. Ghosh, “Hindi text steganography – An approach to information hiding,” Journal of Computational Methods in Sciences and Engineering, Vol. 10, No.1–2S1, pp. 85–96, 2010.
[17]J. Brassil, S. H. Low and N. F. Maxemchuk, "Copyright Protection for the Electronic Distribution of Text Documents", Proceedings of the IEEE, Vol. 87, No. 7, July 1999.
[18]Y. Kim, K. Moon and I. Oh, “A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics,” Proceedings of the Seventh International Conference on Document Analysis and Recognition, No. 3–6, pp. 775–779, Aug 2003.
[19]S.H. Low, N.F.Maxemchuk, J.T. Brassil and L.O’Gorman, “Document marking and identification using both line and word shifting,” Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 2–6, pp. 853–860, April 1995.
[20]D. Huang and H. Yan, “Inter-word Distance Changes Represented by Sine Waves for Watermarking Text Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, No. 12, pp. 1237 – 1245, 2001.
[21]K. Bennett, “Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text,” Purdue University, CERIAS Tech. Report 2004-13, 2004.
[22]M. Topkara, U. Topkara, M.J. Atallah, “Information Hiding Through Errors: A Confusing Approach,” Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2007.
[23]C.L. Liu, K.W. Tien, M.H. Lai, Y.H. Chuang, S.H. Wu, “Phonological and logographic influences on errors in written Chinese words,” Proceedings of the Seventh Workshop on Asian Language Resources, 2009.
[24]C.L. Liu, K.W Tien, M.H Lai, Y.H. Chuang, “Shih-Hung Wu, Capturing errors in written Chinese words,” Proceedings of the Forty Seventh Annual Meeting of the Association for Computational Linguistics, August 2009.
[25]謝天蔚, “中文教學中拼音輸入錯誤分析,” Chinese Character Teaching and Computer Technology. Publication supported by a grant from the U.S. Department of Education, 2005
[26]C. Dexter, “The Silent World of Nicholas Quinn,” 2000.
[27]H. Wang, X. Sun, Y. Liu, Y. Liu. “Natural Language Watermarking using Chinese Syntactic Transformations,” Information Technology Journal, pp. 904–910, 2008.
[28]“注音與國字對照表,” http://www.geocities.ws/picmemory/phonic_word.txt.
[29]教育部, “常用國字標準字體表,” 1988 http://140.111.34.54/files/site_content/M0001/87news/page2-1.htm?open
[30]國語推行委員會, “八十七年常用語詞調查報告書,” National Languages Committee, Taiwan, 1998.
[31]中文期刊部統一用字表, “容易弄錯的詞語,” http://mandarin.nccu.edu.tw/data/cuniw.pdf.
[32]R. jabri, B. Ibrahim and H.A. Zoubi, “Information Hiding: A Generic Approach,” Journal of Computer Science, Vol. 5, No. 12, pp. 930–936, 2001.
[33]Y.L Chiang, L.P. Chang, W.T. Hsieh, and W.C. Chen “Natural Language Watermarking Using Semantic Substitution for Chinese Text,” in Proc. IWDW, No. 333, pp.129–140, 2003.
[34]S. Singh, “The Code Book,” 1999.
[35]J.R. Krenn, “Steganography and Steganalysis,” 2004.
[36]陳勇志, 吳世弘, 盧家慶, 谷圳, "中文混淆字集應用於別字偵錯模板自動產生", 第二十一屆自然語言與語音處理研討會, 2009年9月.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔