Comparison of High Capacity Improvements with Secure GEMD
碩士 === 國立雲林科技大學 === 資訊工程系 === 102 === With rise of the cloud computing, lots of data, diagram, and pictures are exchanged each other via Internet and some data stores in cloud storage to increase the portability and usability. Therefore, how to ensure data security and privacy becomes a considerable...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/23407951816252892797 |
id |
ndltd-TW-102YUNT0392005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102YUNT03920052016-02-21T04:27:06Z http://ndltd.ncl.edu.tw/handle/23407951816252892797 Comparison of High Capacity Improvements with Secure GEMD 基植於安全GEMD之高藏量改良方法的比較 Sheng-Yi Chang 張聖儀 碩士 國立雲林科技大學 資訊工程系 102 With rise of the cloud computing, lots of data, diagram, and pictures are exchanged each other via Internet and some data stores in cloud storage to increase the portability and usability. Therefore, how to ensure data security and privacy becomes a considerable issue. In information secure technique, user ensures data security using encryption and decryption which are means in Cryptography formerly. But in the development of technology, it is probability to unable to make sure data security which used encryption and decryption because increasing computing capability. Thus, another research interest is Steganography. The main of purpose in Steganography is to embed secret into cover media that achieves data security and privacy through imperceptive media. In Steganography, many proposed schemes have been employed in various techniques, such as medical data hiding, IP trace back, digital watermarking and etc. The purposes of this paper are to discuss capacity in which improvements inherited from generalized exploiting modification direction method (GEMD) and to analyze security in the mean time. GEMD is proposed in 2009, which not only has characteristics of irreversible data hiding but also improves flexible and secure. That inspired us. Consequently, we combined pixel segmentation and section-wise with GEMD. As a result, in our schemes, one achieves 4 bpp without occurring overflow; another achieves 1.5 bpp while avoiding concealing disclosure. Wen-Chung Kuo 郭文中 2014 學位論文 ; thesis 50 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立雲林科技大學 === 資訊工程系 === 102 === With rise of the cloud computing, lots of data, diagram, and pictures are exchanged each other via Internet and some data stores in cloud storage to increase the portability and usability. Therefore, how to ensure data security and privacy becomes a considerable issue. In information secure technique, user ensures data security using encryption and decryption which are means in Cryptography formerly. But in the development of technology, it is probability to unable to make sure data security which used encryption and decryption because increasing computing capability. Thus, another research interest is Steganography. The main of purpose in Steganography is to embed secret into cover media that achieves data security and privacy through imperceptive media.
In Steganography, many proposed schemes have been employed in various techniques, such as medical data hiding, IP trace back, digital watermarking and etc. The purposes of this paper are to discuss capacity in which improvements inherited from generalized exploiting modification direction method (GEMD) and to analyze security in the mean time. GEMD is proposed in 2009, which not only has characteristics of irreversible data hiding but also improves flexible and secure. That inspired us. Consequently, we combined pixel segmentation and section-wise with GEMD. As a result, in our schemes, one achieves 4 bpp without occurring overflow; another achieves 1.5 bpp while avoiding concealing disclosure.
|
author2 |
Wen-Chung Kuo |
author_facet |
Wen-Chung Kuo Sheng-Yi Chang 張聖儀 |
author |
Sheng-Yi Chang 張聖儀 |
spellingShingle |
Sheng-Yi Chang 張聖儀 Comparison of High Capacity Improvements with Secure GEMD |
author_sort |
Sheng-Yi Chang |
title |
Comparison of High Capacity Improvements with Secure GEMD |
title_short |
Comparison of High Capacity Improvements with Secure GEMD |
title_full |
Comparison of High Capacity Improvements with Secure GEMD |
title_fullStr |
Comparison of High Capacity Improvements with Secure GEMD |
title_full_unstemmed |
Comparison of High Capacity Improvements with Secure GEMD |
title_sort |
comparison of high capacity improvements with secure gemd |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/23407951816252892797 |
work_keys_str_mv |
AT shengyichang comparisonofhighcapacityimprovementswithsecuregemd AT zhāngshèngyí comparisonofhighcapacityimprovementswithsecuregemd AT shengyichang jīzhíyúānquángemdzhīgāocángliànggǎiliángfāngfǎdebǐjiào AT zhāngshèngyí jīzhíyúānquángemdzhīgāocángliànggǎiliángfāngfǎdebǐjiào |
_version_ |
1718193879437541376 |