Privacy Protection of Document Images Based on Quadcode
碩士 === 東海大學 === 資訊工程與科學系碩士在職專班 === 97 === Abstract Following popularization of computer technology and network communication, computer users can easily transmit information all over the world by interconnection of personal computers and network equipments. Transmission of information becomes more ra...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/19926968206512248255 |
id |
ndltd-TW-097THU00392016 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097THU003920162016-05-06T04:11:27Z http://ndltd.ncl.edu.tw/handle/19926968206512248255 Privacy Protection of Document Images Based on Quadcode 基於四分碼之文件影像隱私性保護技術 Pao-Kai Chen 陳保凱 碩士 東海大學 資訊工程與科學系碩士在職專班 97 Abstract Following popularization of computer technology and network communication, computer users can easily transmit information all over the world by interconnection of personal computers and network equipments. Transmission of information becomes more rapid and convenient; therefore, in the open network environment, protections of the security of digital image data and rights of legitimate owners have become urgent issues. The Information Hiding technology is one kind of common methods for protections of information. By means of information hiding technology, important information is embedded secretly in multimedia of many forms, including digital documents, digital messages, digital images, digital videos, etc. Digital watermarking technologies are often used for protection of the intellectual property rights of electronic documents. The legitimate owner embeds special watermarking images to the original document to acclaim his ownership. By extracting embedded watermarks, the authenticity and the integrity of contents of the document can be verified. We propose a method to safeguard the privacy of documents: before transmitting of the content of the document via the network, we use a Quadcode coding technique to embed characters into an image to have visible watermarking effects ; in this way, the privacy and the integrity of the information are secured. If hackers intercept stego-images from the network, they are unable to deduce correctly the embedded information, only the legitimate receivers are capable to recover the hidden message. Although watermarked image is displayed as a matrix of characters, since the true document contents are mixed together with other words and phrases on the image background, it will be extremely difficult for hackers to figure out the original contents from the stego-image. Chu-Hsing Lin 林祝興 2009 學位論文 ; thesis 44 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 東海大學 === 資訊工程與科學系碩士在職專班 === 97 === Abstract
Following popularization of computer technology and network communication, computer users can easily transmit information all over the world by interconnection of personal computers and network equipments. Transmission of information becomes more rapid and convenient; therefore, in the open network environment, protections of the security of digital image data and rights of legitimate owners have become urgent issues. The Information Hiding technology is one kind of common methods for protections of information. By means of information hiding technology, important information is embedded secretly in multimedia of many forms, including digital documents, digital messages, digital images, digital videos, etc. Digital watermarking technologies are often used for protection of the intellectual property rights of electronic documents. The legitimate owner embeds special watermarking images to the original document to acclaim his ownership. By extracting embedded watermarks, the authenticity and the integrity of contents of the document can be verified.
We propose a method to safeguard the privacy of documents: before transmitting of the content of the document via the network, we use a Quadcode coding technique to embed characters into an image to have visible watermarking effects ; in this way, the privacy and the integrity of the information are secured. If hackers intercept stego-images from the network, they are unable to deduce correctly the embedded information, only the legitimate receivers are capable to recover the hidden message. Although watermarked image is displayed as a matrix of characters, since the true document contents are mixed together with other words and phrases on the image background, it will be extremely difficult for hackers to figure out the original contents from the stego-image.
|
author2 |
Chu-Hsing Lin |
author_facet |
Chu-Hsing Lin Pao-Kai Chen 陳保凱 |
author |
Pao-Kai Chen 陳保凱 |
spellingShingle |
Pao-Kai Chen 陳保凱 Privacy Protection of Document Images Based on Quadcode |
author_sort |
Pao-Kai Chen |
title |
Privacy Protection of Document Images Based on Quadcode |
title_short |
Privacy Protection of Document Images Based on Quadcode |
title_full |
Privacy Protection of Document Images Based on Quadcode |
title_fullStr |
Privacy Protection of Document Images Based on Quadcode |
title_full_unstemmed |
Privacy Protection of Document Images Based on Quadcode |
title_sort |
privacy protection of document images based on quadcode |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/19926968206512248255 |
work_keys_str_mv |
AT paokaichen privacyprotectionofdocumentimagesbasedonquadcode AT chénbǎokǎi privacyprotectionofdocumentimagesbasedonquadcode AT paokaichen jīyúsìfēnmǎzhīwénjiànyǐngxiàngyǐnsīxìngbǎohùjìshù AT chénbǎokǎi jīyúsìfēnmǎzhīwénjiànyǐngxiàngyǐnsīxìngbǎohùjìshù |
_version_ |
1718260993255014400 |