博碩士論文 87325044 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:48 、訪客IP:52.15.223.239
姓名 陳裕元(Yu-Yuan Chen)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 在網路上提供單色影像傳輸的認證及所有權驗證之協定
(A Framework of Self-Modifying Authentication and Ownership Verification for 2-Color Images)
相關論文
★ 無線行動隨建即連網路的媒介存取: 一個具動態頻道分配的 MAC 協定★ 在高維Tori/Meshes蟲洞繞徑網路上具負載平衡之多點群播
★ 在個人通訊系統下銷售員移動模型之位置追蹤方法★ 在Linux環境下設計及實作具位置知覺的無線行動隨建即用網路之繞徑協定
★ 以動態方法解決在無線行動隨建即連網路環境下之廣播風暴問題★ 一個適用於熱門視訊服務之遞迴頻率分割廣播策略
★ 在雙階層無線ATM網路下細胞部署與路徑預留的策略★ 使用Java語言製作一個行動資料系統
★ 在數位影像上資料隱藏技術之探討★ 在Linux環境下設計及實作一個隨意行動無線網路的繞徑最佳化協定
★ 在無線隨意行動網路下設計多重路徑之具有服務品質的繞徑協定★ 在 Linux 環境下設計並實作具蜂巢式無線基地台之 IEEE 802.11 區域網路
★ 數位影像上高資料隱藏率的方法探討★ 一個適用於熱門視訊廣播的無隙縫階梯式資料排程與頻道配置策略
★ 無線隨意網路上的一個隨選式具服務品質及鍊結狀態之多重路徑繞徑協定★ 環形藍芽網路:一個藍芽通訊網路的新拓樸及其繞徑協定
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 近年來隨著電腦科學的進步,各種傳統的資料如影像、音樂和書本也漸漸的數位化。網路技術的開發,也使得這些數位化產品能夠很輕易的利用網路來傳送。由於網路的開放性,也就衍生出了網路安全與數位資料著作權相關的問題。資訊隱藏(Information Hiding)是一門古老的科學。其中包含了兩大議題:資料隱藏(data hiding)和浮水印(Watermarking)。資料隱藏是將重要的資料嵌入在不受人注意的寄主媒介中,藉此分散敵人的注意力;浮水印則是將產品資訊隱藏在數位化的產品中,來達到著作權宣告的目的。本篇論文主要是針對數位影像來實作資料隱藏,而其中我們更著重在單色影像。因為單色影像的每一個像素皆是用一個位元來表示。相對於彩色影像而言,在單色影像上的任何修改,將會很容易的被發現。因此,如何在單色影像上作資料隱藏也是一個重要的議題。基於以上的問題,我們提出了一個針對單色影像傳輸之 認證與所有權驗證的協定。傳統的認證機制,是利用將認證碼(authenticator)附加在傳送的檔案後面;而我們的協定則是將認證碼嵌入到影像中來達到認證的目的,這就是所謂的自我修改的性質。另外,因為重要資料與認證碼分別嵌入不同的影像區塊中,所以我們的協定又有認證碼與重要資料互相保護(mutually protect)的特性。
摘要(英) With the widespread of networking and communication mechanisms, security-related and copyright-related issues are becoming more important. In this thesis, we propose a framework that can be used for authentication and ownership verification in a 2-color/black-and-white image (such as fax and xerox). This problem poses higher challenge than that on a color image because changing any bit in a 2-color image can be easily detectable. The framework has an interesting self-modifying property in that the authenticator is in fact ’’embedded’’ in the original image itself, instead of being an extra message appended to the original image. Further, being strongly tied together and randomly scrambled with each other, the authenticator and the image can mutually protect each other and are both highly tamperproof. We also show how to use this framework for data hiding, ownership verification, and integrality verification. Analysis on the level of tamperproofness based on particular implementation of the framework and demonstration of experimental results are presented.
關鍵字(中) ★ 網路安全
★ 訊息摘要
★ 智能特質
★ 資訊隱藏
★ 編碼理論
★ 單色影像處理
★ 認證
★ 隱藏學
關鍵字(英) ★ Intellectual Property
★ Information Hiding
★ Coding Theorem
★ Binary Image Processing
★ Authentication
★ Message Digest
★ Network Security
★ Steganography
論文目次 Abstract ...................................................i
Contents ..................................................ii List of Figures ..........................................iii
1 Introduction .............................................1
2 A Review of Steganography Schemes ........................3
3 The Framework ............................................5
3.1 Version 1: Image Partition in Clear ..................6
3.2 Version 2: Image Partition in Secret .................9
4 An Implementation of the Framework and Its Vulnerability Analyses ..................................................12
4.1 An Implementation of the Framework ..................12
4.2 Vulnerability Analysis ..............................14
4.3 Implementation Results ..............................16
5 Conclusions .............................................20
參考文獻 [1] R. J. Anderson. Stretching the Limits of Steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 39—48, 1996.
[2] R. J. Anderson and F. A. P. Petitcolas. On the Limits of Steganography. IEEE J. on Selected Areas in Communications, 16(4):474—481, May 1998.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for Data Hiding. IBM System, 35(3—4), February 1996.
[4] Y. Y. Chen, H. K. Pan, and Y. C. Tseng. A Secure Data Hiding Scheme for Tow-Color Images. In Proceedings of International Symposium on Computers and Communications, Antibes-Juan les Pins, France, July 2000.
[5] E. Franz et al. Computer-Based Steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 7—21, 1996.
[6] D. Gruhl and W. Bender. Information Hiding to Foil the Casual Counterfeiter. In Pro-ceedings of the Workshop on Information Hiding, IH’98, Portland, Oregon, USA, April
1998.
[7] D. Kohn. The Codebreakers: The Story of Secret Writing. Scribner, New York, 1996.
[8] M. Kutter, F. Jordan, and F. Bossen. Digital Signature of Color Images using Amplitude Modulation. Electronic Imaging, 7(2):326—332, April 1998.
[9] C. H. Lee and Y. K. Lee. An Adaptive Digital ImageWatermarking Technique for Copy-right Protection. In Proceedings of the Ninth National Conference on Information Secu-rity, pages 1—7, Taichung, Taiwan, R.O.C., May 1999.
[10] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Information Hiding — A Survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062—
1078, july 1999.
[11] B. Schneier. Applied Cryptography — Protocols, Algorithms, and Source Code in C.Wi-ley, New York, 1995.
[12] G. J. Simmons. The Prisoners’ Problem and the Subliminal Channel. In CRYPTO’83, pages 51—67, 1983.
[13] G. J. Simmons. Results Concerning the Bandwidth of Subliminal Channels. IEEE J. on Selected Areas in Communications, 16(4):463—473, May 1998.
[14] G. J. Simmons. The History of Subliminal Channels. IEEE J. on Selected Areas in Communications, 16(4):452—462, May 1998.
[15] W. Stallings. Cryptography and Network Security. Prentice Hall, New Jersey, 1999.
[16] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A Digital Watermark. In IEEE Int. Conf. Image Processing, volume 2, pages 86—90, 1994.
[17] R. Z. Wang, C. F. Lin, and J. C. Lin. Image Hiding by LSB Substitution and Genetic Algorithm. In Proceedings of International Symposium on Multimedia Information Pro-cessing,
Chung-Li, Taiwan, R.O.C, December 1998.
[18] P. Wayner. Should encryption be regulated. Byte, May 1993.
[19] P. W. Wong. A Public key Watermark for Image Verification and Authentication. In Proceedings of International Conference on Image Processing, Chicago, Illinois, USA, October 1998.
[20] P. W. Wong. A Watermark for Image Integrity and Ownership Verification. In Proceedings of IS&T PIC Conference, Portland, Oregon, USA, May 1998.
[21] M. Y. Wu and J. H. Lee. A Novel Data Embedding Method for Two-Color Facsimile Im-ages. In Proceedings of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan, R.O.C, December 1998.
指導教授 曾煜棋(Yu-Chee Tseng) 審核日期 2000-6-19
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明