Some Data Hiding Techniques and Their Applications

碩士 === 國立中正大學 === 資訊工程研究所 === 101 === As a consequence of the prevalence of the Internet in recent years, the transmission of digital information has become much more frequent. Thus, it has become very important to identify methods that ensure the security of the digital information that is transf...

Full description

Bibliographic Details
Main Authors: Hsu, Tai-Jung, 許泰榕
Other Authors: Chang, Chin-Chen
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/mg54kg
Description
Summary:碩士 === 國立中正大學 === 資訊工程研究所 === 101 === As a consequence of the prevalence of the Internet in recent years, the transmission of digital information has become much more frequent. Thus, it has become very important to identify methods that ensure the security of the digital information that is transferred on the Internet. Extensive research has been conducted on data hiding techniques in order to accomplish this goal, as evidenced by the various techniques that have been proposed, e.g., steganography, reversible data hiding, fragile watermarking, and secret sharing. Normal data hiding is a technique that usually hide the secret information in the cover media, such as an image, a video, or a text file. This approach makes it difficult for a malicious attacker to perceive that information is hidden in the medium, thus it is unlikely that an attack or tampering with the information will occur, so the aim of transmitting private information securely is achieved. In this thesis, we proposed two reversible data hiding methods, and a fragile watermarking scheme. One of the reversible data hiding methods uses dual-histograms to embed the secret data, and to avoid underflow/overflow problems. The other reversible data hiding method uses the exploiting modification direction (EMD) and two steganographic images to reach the goal of reversibility. We also proposed a fragile watermarking scheme that generates authentication bits respectively by using the most significant bits (MSBs) and the reference bits, to enhance the recovery performance after a tamper attack has been encountered.