Simple Operations for Countermeasures of Steganlysis

碩士 === 逢甲大學 === 資訊工程所 === 99 === RCM(Reversible contrast mapping) and LSB data hiding(Least significant bit) are two of the most popular data hiding techniques, they have different characteristics and advantages. However, both are subject to steganalysis. In this work we propose a new scheme to cou...

Full description

Bibliographic Details
Main Authors: Pang-Chun Sung, 宋邦俊
Other Authors: Jenshiuh Liu
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/58404147558686090420
id ndltd-TW-099FCU05392030
record_format oai_dc
spelling ndltd-TW-099FCU053920302015-10-23T06:50:32Z http://ndltd.ncl.edu.tw/handle/58404147558686090420 Simple Operations for Countermeasures of Steganlysis 對於藏密解析的對策與反制 Pang-Chun Sung 宋邦俊 碩士 逢甲大學 資訊工程所 99 RCM(Reversible contrast mapping) and LSB data hiding(Least significant bit) are two of the most popular data hiding techniques, they have different characteristics and advantages. However, both are subject to steganalysis. In this work we propose a new scheme to counter measure the steganalysis. By employing simple arithmetic operations, we provide ways to foil the steganalysis, to improve these two methods based on not to increase the burden and destroy the secret. The experimental results show that the proposed scheme successfully breaks the camouflage medias unusual features, and both the embedding measure and confidentiality are not worse than the original ways. Jenshiuh Liu 劉振緒 2011 學位論文 ; thesis 28 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 逢甲大學 === 資訊工程所 === 99 === RCM(Reversible contrast mapping) and LSB data hiding(Least significant bit) are two of the most popular data hiding techniques, they have different characteristics and advantages. However, both are subject to steganalysis. In this work we propose a new scheme to counter measure the steganalysis. By employing simple arithmetic operations, we provide ways to foil the steganalysis, to improve these two methods based on not to increase the burden and destroy the secret. The experimental results show that the proposed scheme successfully breaks the camouflage medias unusual features, and both the embedding measure and confidentiality are not worse than the original ways.
author2 Jenshiuh Liu
author_facet Jenshiuh Liu
Pang-Chun Sung
宋邦俊
author Pang-Chun Sung
宋邦俊
spellingShingle Pang-Chun Sung
宋邦俊
Simple Operations for Countermeasures of Steganlysis
author_sort Pang-Chun Sung
title Simple Operations for Countermeasures of Steganlysis
title_short Simple Operations for Countermeasures of Steganlysis
title_full Simple Operations for Countermeasures of Steganlysis
title_fullStr Simple Operations for Countermeasures of Steganlysis
title_full_unstemmed Simple Operations for Countermeasures of Steganlysis
title_sort simple operations for countermeasures of steganlysis
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/58404147558686090420
work_keys_str_mv AT pangchunsung simpleoperationsforcountermeasuresofsteganlysis
AT sòngbāngjùn simpleoperationsforcountermeasuresofsteganlysis
AT pangchunsung duìyúcángmìjiěxīdeduìcèyǔfǎnzhì
AT sòngbāngjùn duìyúcángmìjiěxīdeduìcèyǔfǎnzhì
_version_ 1718110401843953664