A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications
博士 === 國立交通大學 === 資訊科學與工程研究所 === 96 === In this study, data hiding techniques for image files and text documents and their applications are investigated, and totally ten methods are proposed for binary, grayscale, and color images, as well as email, software CP++P program, PDF, and webpage files. Fi...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/88122874718044461777 |
id |
ndltd-TW-096NCTU5394084 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NCTU53940842015-10-13T12:18:06Z http://ndltd.ncl.edu.tw/handle/88122874718044461777 A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications 在影像與文字檔案中進行資料隱藏的技術與應用之研究 I-Shi Lee 李義溪 博士 國立交通大學 資訊科學與工程研究所 96 In this study, data hiding techniques for image files and text documents and their applications are investigated, and totally ten methods are proposed for binary, grayscale, and color images, as well as email, software CP++P program, PDF, and webpage files. First, two methods are proposed respectively for binary and grayscale images based on human vision modeling and dynamic programming to reduce the image distortion and increasing data hiding capacities. Also, a method is proposed for hiding large-volume data in BMP color images, based on the use of color cubes and the idea of color clustering. Then, a method is proposed for hiding secret messages in emails using some special ASCII codes which are invisible in the window of Outlook Express and IE Webmail browsers. Also proposed are two methods for data hiding in software programs. One is used for security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes. And the other is applicable to covert communication with the additional capability of authenticating the hidden secret message. Furthermore, two methods are proposed for data hiding in PDF files which are popular nowadays. One is useful for covert communication and the other for PDF file authentication, both using certain special ASCII codes. Finally, two methods are proposed for data hiding in web pages which are browsed by lots of people in the world. One method is proposed for covert communication and the other for authentication of web pages, both utilizing certain space codes of various coding systems applicable in HTML files. Experimental results show the feasibility and practicality of all the proposed methods. Wen-Hsiang Tsai 蔡 文 祥 2008 學位論文 ; thesis 194 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立交通大學 === 資訊科學與工程研究所 === 96 === In this study, data hiding techniques for image files and text documents and their applications are investigated, and totally ten methods are proposed for binary, grayscale, and color images, as well as email, software CP++P program, PDF, and webpage files. First, two methods are proposed respectively for binary and grayscale images based on human vision modeling and dynamic programming to reduce the image distortion and increasing data hiding capacities. Also, a method is proposed for hiding large-volume data in BMP color images, based on the use of color cubes and the idea of color clustering. Then, a method is proposed for hiding secret messages in emails using some special ASCII codes which are invisible in the window of Outlook Express and IE Webmail browsers. Also proposed are two methods for data hiding in software programs. One is used for security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes. And the other is applicable to covert communication with the additional capability of authenticating the hidden secret message. Furthermore, two methods are proposed for data hiding in PDF files which are popular nowadays. One is useful for covert communication and the other for PDF file authentication, both using certain special ASCII codes. Finally, two methods are proposed for data hiding in web pages which are browsed by lots of people in the world. One method is proposed for covert communication and the other for authentication of web pages, both utilizing certain space codes of various coding systems applicable in HTML files. Experimental results show the feasibility and practicality of all the proposed methods.
|
author2 |
Wen-Hsiang Tsai |
author_facet |
Wen-Hsiang Tsai I-Shi Lee 李義溪 |
author |
I-Shi Lee 李義溪 |
spellingShingle |
I-Shi Lee 李義溪 A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications |
author_sort |
I-Shi Lee |
title |
A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications |
title_short |
A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications |
title_full |
A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications |
title_fullStr |
A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications |
title_full_unstemmed |
A Study on New Techniques of Data Hiding in Images and Text Documents and Their Applications |
title_sort |
study on new techniques of data hiding in images and text documents and their applications |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/88122874718044461777 |
work_keys_str_mv |
AT ishilee astudyonnewtechniquesofdatahidinginimagesandtextdocumentsandtheirapplications AT lǐyìxī astudyonnewtechniquesofdatahidinginimagesandtextdocumentsandtheirapplications AT ishilee zàiyǐngxiàngyǔwénzìdàngànzhōngjìnxíngzīliàoyǐncángdejìshùyǔyīngyòngzhīyánjiū AT lǐyìxī zàiyǐngxiàngyǔwénzìdàngànzhōngjìnxíngzīliàoyǐncángdejìshùyǔyīngyòngzhīyánjiū AT ishilee studyonnewtechniquesofdatahidinginimagesandtextdocumentsandtheirapplications AT lǐyìxī studyonnewtechniquesofdatahidinginimagesandtextdocumentsandtheirapplications |
_version_ |
1716857805164511232 |