Comparison of High Capacity Improvements with Secure GEMD

碩士 === 國立雲林科技大學 === 資訊工程系 === 102 === With rise of the cloud computing, lots of data, diagram, and pictures are exchanged each other via Internet and some data stores in cloud storage to increase the portability and usability. Therefore, how to ensure data security and privacy becomes a considerable...

Full description

Bibliographic Details
Main Authors: Sheng-Yi Chang, 張聖儀
Other Authors: Wen-Chung Kuo
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/23407951816252892797
id ndltd-TW-102YUNT0392005
record_format oai_dc
spelling ndltd-TW-102YUNT03920052016-02-21T04:27:06Z http://ndltd.ncl.edu.tw/handle/23407951816252892797 Comparison of High Capacity Improvements with Secure GEMD 基植於安全GEMD之高藏量改良方法的比較 Sheng-Yi Chang 張聖儀 碩士 國立雲林科技大學 資訊工程系 102 With rise of the cloud computing, lots of data, diagram, and pictures are exchanged each other via Internet and some data stores in cloud storage to increase the portability and usability. Therefore, how to ensure data security and privacy becomes a considerable issue. In information secure technique, user ensures data security using encryption and decryption which are means in Cryptography formerly. But in the development of technology, it is probability to unable to make sure data security which used encryption and decryption because increasing computing capability. Thus, another research interest is Steganography. The main of purpose in Steganography is to embed secret into cover media that achieves data security and privacy through imperceptive media. In Steganography, many proposed schemes have been employed in various techniques, such as medical data hiding, IP trace back, digital watermarking and etc. The purposes of this paper are to discuss capacity in which improvements inherited from generalized exploiting modification direction method (GEMD) and to analyze security in the mean time. GEMD is proposed in 2009, which not only has characteristics of irreversible data hiding but also improves flexible and secure. That inspired us. Consequently, we combined pixel segmentation and section-wise with GEMD. As a result, in our schemes, one achieves 4 bpp without occurring overflow; another achieves 1.5 bpp while avoiding concealing disclosure. Wen-Chung Kuo 郭文中 2014 學位論文 ; thesis 50 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立雲林科技大學 === 資訊工程系 === 102 === With rise of the cloud computing, lots of data, diagram, and pictures are exchanged each other via Internet and some data stores in cloud storage to increase the portability and usability. Therefore, how to ensure data security and privacy becomes a considerable issue. In information secure technique, user ensures data security using encryption and decryption which are means in Cryptography formerly. But in the development of technology, it is probability to unable to make sure data security which used encryption and decryption because increasing computing capability. Thus, another research interest is Steganography. The main of purpose in Steganography is to embed secret into cover media that achieves data security and privacy through imperceptive media. In Steganography, many proposed schemes have been employed in various techniques, such as medical data hiding, IP trace back, digital watermarking and etc. The purposes of this paper are to discuss capacity in which improvements inherited from generalized exploiting modification direction method (GEMD) and to analyze security in the mean time. GEMD is proposed in 2009, which not only has characteristics of irreversible data hiding but also improves flexible and secure. That inspired us. Consequently, we combined pixel segmentation and section-wise with GEMD. As a result, in our schemes, one achieves 4 bpp without occurring overflow; another achieves 1.5 bpp while avoiding concealing disclosure.
author2 Wen-Chung Kuo
author_facet Wen-Chung Kuo
Sheng-Yi Chang
張聖儀
author Sheng-Yi Chang
張聖儀
spellingShingle Sheng-Yi Chang
張聖儀
Comparison of High Capacity Improvements with Secure GEMD
author_sort Sheng-Yi Chang
title Comparison of High Capacity Improvements with Secure GEMD
title_short Comparison of High Capacity Improvements with Secure GEMD
title_full Comparison of High Capacity Improvements with Secure GEMD
title_fullStr Comparison of High Capacity Improvements with Secure GEMD
title_full_unstemmed Comparison of High Capacity Improvements with Secure GEMD
title_sort comparison of high capacity improvements with secure gemd
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/23407951816252892797
work_keys_str_mv AT shengyichang comparisonofhighcapacityimprovementswithsecuregemd
AT zhāngshèngyí comparisonofhighcapacityimprovementswithsecuregemd
AT shengyichang jīzhíyúānquángemdzhīgāocángliànggǎiliángfāngfǎdebǐjiào
AT zhāngshèngyí jīzhíyúānquángemdzhīgāocángliànggǎiliángfāngfǎdebǐjiào
_version_ 1718193879437541376