標題: 主動式資訊隱藏與應用之研究
A Study on Active Information Hiding and Applications
作者: 羅楠焜
Nan-Kun Lo
蔡文祥
Wen-Hsiang Tsai
資訊科學與工程研究所
關鍵字: 主動式資訊隱藏;主動式媒介;數位浮水印;影片驗證;秘密傳輸;Active information hiding;Active agent;Digital watermarking;Video authentication;Covert communication
公開日期: 2003
摘要: 隨著電腦科技的進步與網際網路的蓬勃發展,越來越多的資料利用網 路傳輸,本論文利用資訊隱藏和數位浮水印技術在個人電腦與手機的操作平台上作秘密通訊、驗證與版權保護之研究與應用。在秘密通訊方面,我們將秘密訊息分別隱藏在MPEG 視訊檔案與遮蔽影像中,再透過網頁與手機上之無線網路系統安全地將其傳送。在版權保護方面,我們在MPEG 視訊檔案中隱藏一種不同於以往的版權資訊,當MPEG 視訊檔案在網頁上被下載時,會主動地將可視的版權資訊表現出來。對於MPEG 視訊檔案與利用手機所拍攝的影像內容是否遭到竄改,我們也提出了兩個方法可以在網頁上讓MPEG 視訊檔案主動地自我驗證以及在手機上對影像做驗證。相關的實驗結果證明了所提方法的可行性。
With the advance of computer technologies and the popularity of the Internet, more and more data can be transmitted speedily and conveniently on public networks. In this study, several methods for three data hiding applications, namely, covert communication, authentication, and copyright protection, on two application platforms, namely, personal computers and cellular phones, are proposed. In order to transmit large-volume secret messages on the web page more securely, an active covert communication method for MPEG videos is proposed. Because contents of web pages are getting richer, authors need to protect their ownership of MPEG videos on web pages. Two active watermarking methods for copyright protection of this purpose are proposed. Due to the prevalence of hacker activities, receivers cannot be sure that MPEG videos received from the public network are genuine, so an active authentication method is also proposed to verify the integrity and the fidelity of them. Furthermore, with the prevalence of using cellular phones, mobile computing technologies of cellular phones are getting more powerful. They can be used to take images and transmit them through wireless networks provided by telecommunication companies. In order to transmit secret messages via cellular phones, two covert communication methods using cover images are proposed. Moreover, for the purpose of using cellular phones to transmit captured images and ensuring the validity of them, an authentication method based on data hiding techniques is also proposed. Good experimental results show the feasibility of the proposed methods.
URI: http://140.113.39.130/cdrfb3/record/nctu/#GT009123550
http://hdl.handle.net/11536/53057
Appears in Collections:Thesis


Files in This Item:

  1. 355001.pdf