A Study on Active Information Hiding and Applications

碩士 === 國立交通大學 === 資訊科學系所 === 92 === With the advance of computer technologies and the popularity of the Internet, more and more data can be transmitted speedily and conveniently on public networks. In this study, several methods for three data hiding applications, namely, covert communication, authe...

Full description

Bibliographic Details
Main Authors: Nan-Kun Lo, 羅楠焜
Other Authors: Wen-Hsiang Tsai
Format: Others
Language:en_US
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/19539756004375440818
Description
Summary:碩士 === 國立交通大學 === 資訊科學系所 === 92 === With the advance of computer technologies and the popularity of the Internet, more and more data can be transmitted speedily and conveniently on public networks. In this study, several methods for three data hiding applications, namely, covert communication, authentication, and copyright protection, on two application platforms, namely, personal computers and cellular phones, are proposed. In order to transmit large-volume secret messages on the web page more securely, an active covert communication method for MPEG videos is proposed. Because contents of web pages are getting richer, authors need to protect their ownership of MPEG videos on web pages. Two active watermarking methods for copyright protection of this purpose are proposed. Due to the prevalence of hacker activities, receivers cannot be sure that MPEG videos received from the public network are genuine, so an active authentication method is also proposed to verify the integrity and the fidelity of them. Furthermore, with the prevalence of using cellular phones, mobile computing technologies of cellular phones are getting more powerful. They can be used to take images and transmit them through wireless networks provided by telecommunication companies. In order to transmit secret messages via cellular phones, two covert communication methods using cover images are proposed. Moreover, for the purpose of using cellular phones to transmit captured images and ensuring the validity of them, an authentication method based on data hiding techniques is also proposed. Good experimental results show the feasibility of the proposed methods.