English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78345/78345 (100%)
Visitors : 32305952      Online Users : 1077
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8466

    Title: 在網路上提供單色影像傳輸的認證及所有權驗證之協定;A Framework of Self-Modifying Authentication and Ownership Verification for 2-Color Images
    Authors: 陳裕元;Yu-Yuan Chen
    Contributors: 資訊工程研究所
    Keywords: 網路安全;訊息摘要;智能特質;資訊隱藏;編碼理論;單色影像處理;認證;隱藏學;Intellectual Property;Information Hiding;Coding Theorem;Binary Image Processing;Authentication;Message Digest;Network Security;Steganography
    Date: 2000-06-19
    Issue Date: 2009-09-22 11:27:43 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 近年來隨著電腦科學的進步,各種傳統的資料如影像、音樂和書本也漸漸的數位化。網路技術的開發,也使得這些數位化產品能夠很輕易的利用網路來傳送。由於網路的開放性,也就衍生出了網路安全與數位資料著作權相關的問題。資訊隱藏(Information Hiding)是一門古老的科學。其中包含了兩大議題:資料隱藏(data hiding)和浮水印(Watermarking)。資料隱藏是將重要的資料嵌入在不受人注意的寄主媒介中,藉此分散敵人的注意力;浮水印則是將產品資訊隱藏在數位化的產品中,來達到著作權宣告的目的。本篇論文主要是針對數位影像來實作資料隱藏,而其中我們更著重在單色影像。因為單色影像的每一個像素皆是用一個位元來表示。相對於彩色影像而言,在單色影像上的任何修改,將會很容易的被發現。因此,如何在單色影像上作資料隱藏也是一個重要的議題。基於以上的問題,我們提出了一個針對單色影像傳輸之 認證與所有權驗證的協定。傳統的認證機制,是利用將認證碼(authenticator)附加在傳送的檔案後面;而我們的協定則是將認證碼嵌入到影像中來達到認證的目的,這就是所謂的自我修改的性質。另外,因為重要資料與認證碼分別嵌入不同的影像區塊中,所以我們的協定又有認證碼與重要資料互相保護(mutually protect)的特性。 With the widespread of networking and communication mechanisms, security-related and copyright-related issues are becoming more important. In this thesis, we propose a framework that can be used for authentication and ownership verification in a 2-color/black-and-white image (such as fax and xerox). This problem poses higher challenge than that on a color image because changing any bit in a 2-color image can be easily detectable. The framework has an interesting self-modifying property in that the authenticator is in fact 'embedded' in the original image itself, instead of being an extra message appended to the original image. Further, being strongly tied together and randomly scrambled with each other, the authenticator and the image can mutually protect each other and are both highly tamperproof. We also show how to use this framework for data hiding, ownership verification, and integrality verification. Analysis on the level of tamperproofness based on particular implementation of the framework and demonstration of experimental results are presented.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明