請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69760完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 吳家麟(Ja-Ling Wu) | |
| dc.contributor.author | Ya-Huan Cheng | en |
| dc.contributor.author | 鄭雅桓 | zh_TW |
| dc.date.accessioned | 2021-06-17T03:26:46Z | - |
| dc.date.available | 2020-08-24 | |
| dc.date.copyright | 2020-08-24 | |
| dc.date.issued | 2020 | |
| dc.date.submitted | 2020-08-18 | |
| dc.identifier.citation | [1] Zhong Shangping, Cheng Xueqi, and Chen Tierui. Data hiding in a kind of pdf texts for secret communication. International Journal of Network Security, 4, 01 2007. [2] I-Shi Lee and Wen-Hsiang Tsai. A new approach to covert communication via pdf files. Signal Processing, 90(2):557 – 565, 2010. [3] Stéphane Gael R. Ekodeck and René Ndoundam. Pdf steganography based on chinese remainder theorem. Journal of Information Security and Applications, 29:1 – 15, 2016. [4] A. V. Sergeev and P. B. Khorev. Review of the algorithms steganography in pdf documents and analysis. In 2020 Moscow Workshop on Electronic and Networking Technologies (MWENT), pages 1–4, March 2020. [5] Katarzyna Koptyra and Marek R Ogiela. Distributed steganography in pdf files— secrets hidden in modified pages. Entropy, 22(6):600, 2020. [6] Adi Shamir. How to share a secret. Commun. ACM, 22(11):612–613, November 1979. [7] Adobe Systems Incorporated. Document management — portable document format — part 1: Pdf 1.7. ISO 32000-1:2008, July 2008. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69760 | - |
| dc.description.abstract | 隨著網路科技與多媒體的蓬勃發展,各項惡意攻擊與威脅也與日俱增,資訊安全性儼然成為重要議題。而秘密共享技術則讓我們可以安全地將秘密分享出去,任何人需要有 k 個 shares 才可以正確還原秘密。本篇論文結合了兩大技術,提出一個能應用在有限資源的共享服務以及團體認證等情境的秘密共享方法。我們根據 Koptyra 等人的概念以及 Shamir 秘密共享方法,提出了一個基於秘密共享的資訊隱藏方法。可以將一段秘密資訊依照指定的共享份數分散到多個 PDF 檔案中,並使用 PDF 隱寫技術進行 資訊隱藏,且不會留下視覺痕跡。由於 PDF 良好的結構性以及使用的共享方法,秘密不易受到攻擊破壞,且若有部分丟失也不至於無法還原秘密,藉此提高了安全性及容錯性。 | zh_TW |
| dc.description.abstract | With the rapid development of network and multimedia, malicious attacks and threats are increasing day by day, making information security an important issue. Secret sharing technique allows us to share secrets safely, and it needs k shares to recover the secrets. In this paper, we combined the two techniques and proposed a secret sharing approach that can be applied in some scenarios such as resource-consuming shared services and group authentication.Based on Koptyra's concepts and the Shamir's Secret Sharing method, we proposed a secret sharing based data hiding method. A secret can be distributed to multiple PDF files according to a specified number of shares, and then can be concealed using PDF-Steganography without leaving visual traces. Due to the good structure of the PDF and the use of the sharing method, the secret isn't easy to be attacked and damaged. If part of shares got lost, it is still possible to reconstruct the secret, thereby improving security and fault tolerance. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-17T03:26:46Z (GMT). No. of bitstreams: 1 U0001-1808202002343100.pdf: 2171204 bytes, checksum: 6de8a757baffe90d5650e9f3ace53d0c (MD5) Previous issue date: 2020 | en |
| dc.description.tableofcontents | 口試委員會審定書 ............................. i 摘要 ............................. ii Abstract ............................. iii List of Figures ............................. vi List of Tables ............................. vii Chapter 1 Introduction ......................... 1 Chapter 2 Portable Document Format ......................... 4 2.1 Structures of PDF File ......................... 5 2.2 Hiding in PDF ............................. 6 2.2.1 The TJ Operator ............................. 6 2.2.2 Pages Hiding ............................. 7 Chapter 3 Secret Sharing ............................. 10 3.1 XOR Operation ............................. 11 3.2 The Shamir’s Secret Sharing Scheme ................. 11 3.3 The Comparison Between XOR- and (k, n)-threshold-based Approaches .......................... 12 Chapter 4 The Proposed Method ............................. 14 4.1 The Secret Data Hiding Processes ................... 15 4.2 The Hidden Secret Recovery Processes ................ 15 Chapter 5 Simulation Results ............................. 17 Chapter 6 Analysis and Discussion ............................. 21 6.1 Embedding Capacity and Security . . . . . . . . . . . . . . . . . . . 21 6.2 Possible Attacks ............................ 22 Chapter 7 Conclusion ............................. 23 References ............................. 24 | |
| dc.language.iso | en | |
| dc.subject | 資訊隱藏 | zh_TW |
| dc.subject | 資訊安全 | zh_TW |
| dc.subject | 秘密共享 | zh_TW |
| dc.subject | 隱寫術 | zh_TW |
| dc.subject | PDF檔案 | zh_TW |
| dc.subject | PDF files | en |
| dc.subject | Information Security | en |
| dc.subject | Secret Sharing | en |
| dc.subject | Steganography | en |
| dc.subject | Data Hiding | en |
| dc.title | 基於秘密共享技術之PDF檔案資訊隱藏技術 | zh_TW |
| dc.title | Secret Sharing based Data Hiding in PDF Files | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 108-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 李明穗(Ming-Sui Lee),胡敏君(Min-Chun Hu),林育慈(Yu-Tzu Lin) | |
| dc.subject.keyword | 資訊隱藏,資訊安全,秘密共享,隱寫術,PDF檔案, | zh_TW |
| dc.subject.keyword | Data Hiding,Information Security,Secret Sharing,Steganography,PDF files, | en |
| dc.relation.page | 24 | |
| dc.identifier.doi | 10.6342/NTU202003907 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2020-08-19 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊網路與多媒體研究所 | zh_TW |
| 顯示於系所單位: | 資訊網路與多媒體研究所 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| U0001-1808202002343100.pdf 未授權公開取用 | 2.12 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
