查詢結果分析
來源資料
頁籤選單縮合
題 名 | 多層次模運算之多媒體保護技術=Technique of Multimedia Protection Based on Multiple Modular Operations |
---|---|
作 者 | 宋嘉宏; | 書刊名 | 航空技術學院學報 |
卷 期 | 10:1 2011.08[民100.08] |
頁 次 | 頁33-41 |
分類號 | 312.76 |
關鍵詞 | 資訊隱藏; 混沌對應; 多層次模運算; Information hiding; Chaotic mapping; Multiple modular operation; |
語 文 | 中文(Chinese) |
中文摘要 | 電腦技術及網路快速發展,數位媒體的複製與傳送變得容易且快速;卻衍生數位媒體遭到非法竊取、複製、下載及竄改,甚至引發智慧財產權等問題。近年來資訊隱藏技術提供數位資料的保護,確保數位媒體保存及傳輸時的安全性,成為非常熱門研究的議題。資訊隱藏技術不同於傳統密碼技術的保護機制,其精神是把重要的資訊隱藏入要保護的數位媒體,並且不影響被保護的數位媒體的外觀及意義,換言之,使人眼不易直接察覺到有重要資訊的存在,進而達到保護的作用。 本文所提方法應用非對稱的週期和視覺模式來提供不可偵測性(Undetectability)及不可讀取性(Unreadability),使得隱藏於多媒體中的混沌密文信息不易被外在攻擊而洩露任何秘密訊息。由實驗得知其不可察覺及安全性,可以滿足需求。而基於多層次模運算的混沌對應包含了加密及驗證的效果,也同時避免了偽冒及金錀管理的問題。 |
英文摘要 | The technology of computer and network develop rapidly, replication and conveyance of the digital media make it easy and fast; But the convenience derive several problems for medias usage, duplicated, downloaded and tampered illegally, even raise questions such as the intelligence proprietary. The development of information hiding that provide the protection for digital data to ensure the security both on the transmission and the preserve of multimedia becomes the interest topic of research in recent years. The protection of information hiding is different from that of traditional cryptography. The mechanism hides important information into the digital media that will protect, and does not influence appearance and meaning of the digital media protected, in other words, make human eye to be difficult to perceive, have important existence of message directly, and then get the result of protecting. This research proposes a method based on non-symmetric orbit of a chaotic mapping and human visual model to protect digital media by providing the property of undetectability and unreadability that conceal the existence of the embedded data and decrease the possibility of malicious attacks. From the experimental results, the fine visual quality provides the benefit that information hidden in the multimedia is difficult to be attacked and revealed any secret information externally. Applying the chaotic map with multiple modular operations, the problems of fraud and key management can be resolved and the non-symmetric orbit can be consider encryption and validity the authentication of the digital media. |
本系統中英文摘要資訊取自各篇刊載內容。