Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69760
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor吳家麟(Ja-Ling Wu)
dc.contributor.authorYa-Huan Chengen
dc.contributor.author鄭雅桓zh_TW
dc.date.accessioned2021-06-17T03:26:46Z-
dc.date.available2020-08-24
dc.date.copyright2020-08-24
dc.date.issued2020
dc.date.submitted2020-08-18
dc.identifier.citation[1] Zhong Shangping, Cheng Xueqi, and Chen Tierui. Data hiding in a kind of pdf texts for secret communication. International Journal of Network Security, 4, 01 2007.
[2] I-Shi Lee and Wen-Hsiang Tsai. A new approach to covert communication via pdf files. Signal Processing, 90(2):557 – 565, 2010.
[3] Stéphane Gael R. Ekodeck and René Ndoundam. Pdf steganography based on chinese remainder theorem. Journal of Information Security and Applications, 29:1 – 15, 2016.
[4] A. V. Sergeev and P. B. Khorev. Review of the algorithms steganography in pdf documents and analysis. In 2020 Moscow Workshop on Electronic and Networking Technologies (MWENT), pages 1–4, March 2020.
[5] Katarzyna Koptyra and Marek R Ogiela. Distributed steganography in pdf files— secrets hidden in modified pages. Entropy, 22(6):600, 2020.
[6] Adi Shamir. How to share a secret. Commun. ACM, 22(11):612–613, November 1979.
[7] Adobe Systems Incorporated. Document management — portable document format — part 1: Pdf 1.7. ISO 32000-1:2008, July 2008.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69760-
dc.description.abstract隨著網路科技與多媒體的蓬勃發展,各項惡意攻擊與威脅也與日俱增,資訊安全性儼然成為重要議題。而秘密共享技術則讓我們可以安全地將秘密分享出去,任何人需要有 k 個 shares 才可以正確還原秘密。本篇論文結合了兩大技術,提出一個能應用在有限資源的共享服務以及團體認證等情境的秘密共享方法。我們根據 Koptyra 等人的概念以及 Shamir 秘密共享方法,提出了一個基於秘密共享的資訊隱藏方法。可以將一段秘密資訊依照指定的共享份數分散到多個 PDF 檔案中,並使用 PDF 隱寫技術進行 資訊隱藏,且不會留下視覺痕跡。由於 PDF 良好的結構性以及使用的共享方法,秘密不易受到攻擊破壞,且若有部分丟失也不至於無法還原秘密,藉此提高了安全性及容錯性。zh_TW
dc.description.abstractWith the rapid development of network and multimedia, malicious attacks and threats are increasing day by day, making information security an important issue. Secret sharing technique allows us to share secrets safely, and it needs k shares to recover the secrets. In this paper, we combined the two techniques and proposed a secret sharing approach that can be applied in some scenarios such as resource-consuming shared services and group authentication.Based on Koptyra's concepts and the Shamir's Secret Sharing method, we proposed a secret sharing based data hiding method. A secret can be distributed to multiple PDF files according to a specified number of shares, and then can be concealed using PDF-Steganography without leaving visual traces. Due to the good structure of the PDF and the use of the sharing method, the secret isn't easy to be attacked and damaged. If part of shares got lost, it is still possible to reconstruct the secret, thereby improving security and fault tolerance.en
dc.description.provenanceMade available in DSpace on 2021-06-17T03:26:46Z (GMT). No. of bitstreams: 1
U0001-1808202002343100.pdf: 2171204 bytes, checksum: 6de8a757baffe90d5650e9f3ace53d0c (MD5)
Previous issue date: 2020
en
dc.description.tableofcontents口試委員會審定書 ............................. i
摘要 ............................. ii
Abstract ............................. iii
List of Figures ............................. vi
List of Tables ............................. vii
Chapter 1 Introduction ......................... 1
Chapter 2 Portable Document Format ......................... 4
2.1 Structures of PDF File ......................... 5
2.2 Hiding in PDF ............................. 6
2.2.1 The TJ Operator ............................. 6
2.2.2 Pages Hiding ............................. 7
Chapter 3 Secret Sharing ............................. 10
3.1 XOR Operation ............................. 11
3.2 The Shamir’s Secret Sharing Scheme ................. 11
3.3 The Comparison Between XOR- and (k, n)-threshold-based Approaches .......................... 12
Chapter 4 The Proposed Method ............................. 14
4.1 The Secret Data Hiding Processes ................... 15
4.2 The Hidden Secret Recovery Processes ................ 15
Chapter 5 Simulation Results ............................. 17
Chapter 6 Analysis and Discussion ............................. 21
6.1 Embedding Capacity and Security . . . . . . . . . . . . . . . . . . . 21
6.2 Possible Attacks ............................ 22
Chapter 7 Conclusion ............................. 23
References ............................. 24
dc.language.isoen
dc.subject資訊隱藏zh_TW
dc.subject資訊安全zh_TW
dc.subject秘密共享zh_TW
dc.subject隱寫術zh_TW
dc.subjectPDF檔案zh_TW
dc.subjectPDF filesen
dc.subjectInformation Securityen
dc.subjectSecret Sharingen
dc.subjectSteganographyen
dc.subjectData Hidingen
dc.title基於秘密共享技術之PDF檔案資訊隱藏技術zh_TW
dc.titleSecret Sharing based Data Hiding in PDF Filesen
dc.typeThesis
dc.date.schoolyear108-2
dc.description.degree碩士
dc.contributor.oralexamcommittee李明穗(Ming-Sui Lee),胡敏君(Min-Chun Hu),林育慈(Yu-Tzu Lin)
dc.subject.keyword資訊隱藏,資訊安全,秘密共享,隱寫術,PDF檔案,zh_TW
dc.subject.keywordData Hiding,Information Security,Secret Sharing,Steganography,PDF files,en
dc.relation.page24
dc.identifier.doi10.6342/NTU202003907
dc.rights.note有償授權
dc.date.accepted2020-08-19
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊網路與多媒體研究所zh_TW
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
U0001-1808202002343100.pdf
  未授權公開取用
2.12 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved