完整後設資料紀錄
DC 欄位語言
dc.contributor.author羅楠焜en_US
dc.contributor.authorNan-Kun Loen_US
dc.contributor.author蔡文祥en_US
dc.contributor.authorWen-Hsiang Tsaien_US
dc.date.accessioned2014-12-12T02:04:35Z-
dc.date.available2014-12-12T02:04:35Z-
dc.date.issued2003en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#GT009123550en_US
dc.identifier.urihttp://hdl.handle.net/11536/53057-
dc.description.abstract隨著電腦科技的進步與網際網路的蓬勃發展,越來越多的資料利用網 路傳輸,本論文利用資訊隱藏和數位浮水印技術在個人電腦與手機的操作平台上作秘密通訊、驗證與版權保護之研究與應用。在秘密通訊方面,我們將秘密訊息分別隱藏在MPEG 視訊檔案與遮蔽影像中,再透過網頁與手機上之無線網路系統安全地將其傳送。在版權保護方面,我們在MPEG 視訊檔案中隱藏一種不同於以往的版權資訊,當MPEG 視訊檔案在網頁上被下載時,會主動地將可視的版權資訊表現出來。對於MPEG 視訊檔案與利用手機所拍攝的影像內容是否遭到竄改,我們也提出了兩個方法可以在網頁上讓MPEG 視訊檔案主動地自我驗證以及在手機上對影像做驗證。相關的實驗結果證明了所提方法的可行性。zh_TW
dc.description.abstractWith the advance of computer technologies and the popularity of the Internet, more and more data can be transmitted speedily and conveniently on public networks. In this study, several methods for three data hiding applications, namely, covert communication, authentication, and copyright protection, on two application platforms, namely, personal computers and cellular phones, are proposed. In order to transmit large-volume secret messages on the web page more securely, an active covert communication method for MPEG videos is proposed. Because contents of web pages are getting richer, authors need to protect their ownership of MPEG videos on web pages. Two active watermarking methods for copyright protection of this purpose are proposed. Due to the prevalence of hacker activities, receivers cannot be sure that MPEG videos received from the public network are genuine, so an active authentication method is also proposed to verify the integrity and the fidelity of them. Furthermore, with the prevalence of using cellular phones, mobile computing technologies of cellular phones are getting more powerful. They can be used to take images and transmit them through wireless networks provided by telecommunication companies. In order to transmit secret messages via cellular phones, two covert communication methods using cover images are proposed. Moreover, for the purpose of using cellular phones to transmit captured images and ensuring the validity of them, an authentication method based on data hiding techniques is also proposed. Good experimental results show the feasibility of the proposed methods.en_US
dc.language.isoen_USen_US
dc.subject主動式資訊隱藏zh_TW
dc.subject主動式媒介zh_TW
dc.subject數位浮水印zh_TW
dc.subject影片驗證zh_TW
dc.subject秘密傳輸zh_TW
dc.subjectActive information hidingen_US
dc.subjectActive agenten_US
dc.subjectDigital watermarkingen_US
dc.subjectVideo authenticationen_US
dc.subjectCovert communicationen_US
dc.title主動式資訊隱藏與應用之研究zh_TW
dc.titleA Study on Active Information Hiding and Applicationsen_US
dc.typeThesisen_US
dc.contributor.department資訊科學與工程研究所zh_TW
顯示於類別:畢業論文


文件中的檔案:

  1. 355001.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。