Simple Operations for Countermeasures of Steganlysis
碩士 === 逢甲大學 === 資訊工程所 === 99 === RCM(Reversible contrast mapping) and LSB data hiding(Least significant bit) are two of the most popular data hiding techniques, they have different characteristics and advantages. However, both are subject to steganalysis. In this work we propose a new scheme to cou...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/58404147558686090420 |
id |
ndltd-TW-099FCU05392030 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099FCU053920302015-10-23T06:50:32Z http://ndltd.ncl.edu.tw/handle/58404147558686090420 Simple Operations for Countermeasures of Steganlysis 對於藏密解析的對策與反制 Pang-Chun Sung 宋邦俊 碩士 逢甲大學 資訊工程所 99 RCM(Reversible contrast mapping) and LSB data hiding(Least significant bit) are two of the most popular data hiding techniques, they have different characteristics and advantages. However, both are subject to steganalysis. In this work we propose a new scheme to counter measure the steganalysis. By employing simple arithmetic operations, we provide ways to foil the steganalysis, to improve these two methods based on not to increase the burden and destroy the secret. The experimental results show that the proposed scheme successfully breaks the camouflage medias unusual features, and both the embedding measure and confidentiality are not worse than the original ways. Jenshiuh Liu 劉振緒 2011 學位論文 ; thesis 28 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 逢甲大學 === 資訊工程所 === 99 === RCM(Reversible contrast mapping) and LSB data hiding(Least significant bit) are two of the most popular data hiding techniques, they have different characteristics and advantages. However, both are subject to steganalysis. In this work we propose a new scheme to counter measure the steganalysis. By employing simple arithmetic operations, we provide ways to foil the steganalysis, to improve these two methods based on not to increase the burden and destroy the secret. The experimental results show that the proposed scheme successfully breaks the camouflage medias unusual features, and both the embedding measure and confidentiality are not worse than the original ways.
|
author2 |
Jenshiuh Liu |
author_facet |
Jenshiuh Liu Pang-Chun Sung 宋邦俊 |
author |
Pang-Chun Sung 宋邦俊 |
spellingShingle |
Pang-Chun Sung 宋邦俊 Simple Operations for Countermeasures of Steganlysis |
author_sort |
Pang-Chun Sung |
title |
Simple Operations for Countermeasures of Steganlysis |
title_short |
Simple Operations for Countermeasures of Steganlysis |
title_full |
Simple Operations for Countermeasures of Steganlysis |
title_fullStr |
Simple Operations for Countermeasures of Steganlysis |
title_full_unstemmed |
Simple Operations for Countermeasures of Steganlysis |
title_sort |
simple operations for countermeasures of steganlysis |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/58404147558686090420 |
work_keys_str_mv |
AT pangchunsung simpleoperationsforcountermeasuresofsteganlysis AT sòngbāngjùn simpleoperationsforcountermeasuresofsteganlysis AT pangchunsung duìyúcángmìjiěxīdeduìcèyǔfǎnzhì AT sòngbāngjùn duìyúcángmìjiěxīdeduìcèyǔfǎnzhì |
_version_ |
1718110401843953664 |