||In this thesis, a novel method is presented to hide secure data for secrete communications by incorporating cryptography and data hiding technologies. In our approach, original data is encrypted by using the order of a magic matrix with secrete keys. There are two fundamental operations, including substitution and permutation, in traditional encryption process. According to the selected host image and magic matrix, mapping table for substation and permutation sequence are generated instead of the fixed permutation rule and substitution table used in traditional encryption algorithms. There are three secrete keys, host image selection key and magic matrix selection key pair, for use in encryption and decryption processes for data transmission. Finally, secure data obtained from previous processes are hided into LSB bit plane of the host image to construct a stego-image.|
The proposed system consists of two main modules, which are secure data hiding and data extraction modules. In data hiding module, eight steps are performed for data encryption and hiding. They are host image obtaining, magic matrix key obtaining, host mask generation, magic mask generation, mapping table generation, secure mask generation, secure data stream generation, and hiding process. As to the data extraction module, the first five steps are the same as those in the data hiding module excepting steps 6~8 which are secure data stream extraction, secure data stream decoding, and hiding data extraction.
Experiments were conducted on various binary images and gray images. The average Hamming distance, i.e., error bit rate, is about 50% between original data and error binary data extracted by any of the secrete keys which is error or the corresponding secure data is lost. The phenomenon reveals that any attacker can not extract correct data when any of the secrete keys is lost. In addition, the information extracted by the attacker using error key will be the same as that obtained by random guess. Experimental results demonstrate the validity and efficiency of our proposed method. Moreover, the advantages of image complexity and variability property are both considered in designing the robust secure data hiding algorithm.
|| C.C. Chang, M. Lin, and Y. Hu, “A fast and secure image hiding scheme based on LSB substation,” Int. Journal of Pattern Recognition. And Artif. Intell. Vol.16 No. 4, pp.399-416, 2002.|
 C.K. Chan and L. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition ,Vol.37, pp.469-474, 2004.
 C.L. Tsai, H. Chiang, K. Fan, and C. Chung, “Reversible data hiding and lossless reconstruction of binary images using pairwise logical computation mechanism,” Pattern Recognition, Vol. 38, pp. 1993-2006, 2005.
 R.Z. Wang, C. Lin, and J. Lin, ”Image hiding by optimal LSB substitution and genetic algorithm,”Pattern Recognition,Vol.34, pp.671-683,2001
 W.J. Wang and C. Chu, A key-based image watermarking system by using significant data coding, Master. dissertation, Elect. Eng. Dept., Univ. of Central, Taiwan, 2003.
 W. Stallings, Cryptography and Network Security: Principles and Practice, William Prentice Hall ,1999.
 Y.C. Tseng, Y. Chen, and H. Pan, “A Secure Data Hiding Scheme for Binary Images,” IEEE Trans. on Communications, Vol. 50, No. 8, pp.1227-31,2002.
 Y.C. Tseng and H. Pan, “Data Hiding in 2-Color Images,” IEEE Trans. on Computers, Vol1. 51,No. 7, ppt. 873-880,2002
 Z. Ni, Y. Shi, N. Ansari and W. Su,”Reversible Data Hiding, ” IEEE
Transaction on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp.354-362,2006.
 仲田紀夫著,吳鏘煌譯, 在萬里長城算數學:中國:方程式與魔方陣的國度, 稻田出版有限公司, 台灣, 2002.
 李國賢, 趣味數學.魔方陣, 林鬱文化, 台灣, 2003.
 呂純慈,陸哲明,張真誠, Multimedia Security Technology, 全華圖書股份有限公司, 台灣, 2007
 謬紹綱, 數位影像處理－活用Matlab ,全華科技圖書股份有限公司,台灣,2004