A Data Hiding Scheme Using Modulus Coding
碩士 === 國立虎尾科技大學 === 資訊工程研究所 === 100 === In 2006, Zhang and Wang proposed a data hiding scheme based on the exploiting modification direction (EMD). Next year, Lee et al. proposed a data hiding method based on the EMD scheme in order to enhance the embedding capacity. Recently, Kieu and Chang propose...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/n59pgn |
id |
ndltd-TW-100NYPI5392003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100NYPI53920032019-09-22T03:40:59Z http://ndltd.ncl.edu.tw/handle/n59pgn A Data Hiding Scheme Using Modulus Coding 植基於模數編碼之資料隱藏法 Yu-Hsuan Chu 朱育萱 碩士 國立虎尾科技大學 資訊工程研究所 100 In 2006, Zhang and Wang proposed a data hiding scheme based on the exploiting modification direction (EMD). Next year, Lee et al. proposed a data hiding method based on the EMD scheme in order to enhance the embedding capacity. Recently, Kieu and Chang proposed a steganographic scheme by fully exploiting modification directions (FEMD). The FEMD method can achieve various hiding capacities and good visual qualities. In this study, we will use modulus coding to achieve HC-EMD and FEMD under keeping the same embedding capacities. Moreover, based on the non-unique of the code table, the proposed methods can provide the security of the secret message. And we use a simple method of modular congruence to solve overflow or underflow problem. According to the experimental results, the proposed methods can achieve performances of above-mentioned. Wen-Chung Kuo 郭文中 2012 學位論文 ; thesis 82 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立虎尾科技大學 === 資訊工程研究所 === 100 === In 2006, Zhang and Wang proposed a data hiding scheme based on the exploiting modification direction (EMD). Next year, Lee et al. proposed a data hiding method based on the EMD scheme in order to enhance the embedding capacity. Recently, Kieu and Chang proposed a steganographic scheme by fully exploiting modification directions (FEMD). The FEMD method can achieve various hiding capacities and good visual qualities. In this study, we will use modulus coding to achieve HC-EMD and FEMD under keeping the same embedding capacities. Moreover, based on the non-unique of the code table, the proposed methods can provide the security of the secret message. And we use a simple method of modular congruence to solve overflow or underflow problem. According to the experimental results, the proposed methods can achieve performances of above-mentioned.
|
author2 |
Wen-Chung Kuo |
author_facet |
Wen-Chung Kuo Yu-Hsuan Chu 朱育萱 |
author |
Yu-Hsuan Chu 朱育萱 |
spellingShingle |
Yu-Hsuan Chu 朱育萱 A Data Hiding Scheme Using Modulus Coding |
author_sort |
Yu-Hsuan Chu |
title |
A Data Hiding Scheme Using Modulus Coding |
title_short |
A Data Hiding Scheme Using Modulus Coding |
title_full |
A Data Hiding Scheme Using Modulus Coding |
title_fullStr |
A Data Hiding Scheme Using Modulus Coding |
title_full_unstemmed |
A Data Hiding Scheme Using Modulus Coding |
title_sort |
data hiding scheme using modulus coding |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/n59pgn |
work_keys_str_mv |
AT yuhsuanchu adatahidingschemeusingmoduluscoding AT zhūyùxuān adatahidingschemeusingmoduluscoding AT yuhsuanchu zhíjīyúmóshùbiānmǎzhīzīliàoyǐncángfǎ AT zhūyùxuān zhíjīyúmóshùbiānmǎzhīzīliàoyǐncángfǎ AT yuhsuanchu datahidingschemeusingmoduluscoding AT zhūyùxuān datahidingschemeusingmoduluscoding |
_version_ |
1719254715425882112 |