簡易檢索 / 詳目顯示

研究生: 吳秉鋒
WU,PINGFENG.
論文名稱: SVG向量圖形資訊隱藏之研究
Research of SVG Images Information Hiding
指導教授: 葉耀明
Yeh, Yao-Ming
學位類別: 碩士
Master
系所名稱: 資訊教育研究所
Graduate Institute of Information and Computer Education
論文出版年: 2005
畢業學年度: 93
語文別: 中文
論文頁數: 83
中文關鍵詞: 資訊融入法資訊附加法可變動向量圖形資訊安全資訊隱藏
英文關鍵詞: Information Mixture, Information Add-On, Scaleable Vector Graphics, Information Security, Information Hiding
論文種類: 學術論文
相關次數: 點閱:247下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於網際網路的快速成長,對於保護影像智慧財產權(Intellectual Property Rights, IPR)的需求與日遽增。影像資訊隱藏(Information Hiding)於數位內容典藏 (Digital Content Archives)的應用已有多年的發展,但關於可變動向量圖形(Scaleable Vector Graphic, SVG)智慧財產權的保護機制,尚處於萌芽階段。並且因其圖形格式是以明文(Plain Text)方式存在,更增加了保護的難度。
    有鑑於此,本研究提出了兩種資訊隱藏模型於可變動向量圖形保護上,分別為資訊融入法(Information Mixture)與資訊附加法(Information Add-On)。其具有下列四個特點: (1) 利用明文加密的技術來隱藏資訊,讓合法使用者能驗證資訊 (2) 結合Unicode編碼方式,提供亞洲字元驗證資訊的能力 (3) 利用偽裝標籤來達到資訊隱藏的目的 (4) 結合公鑰基礎建設(Public Key Infrastructure, PKI)與Client-Server架構,提供一針對可變動向量圖形線上智慧財產權的保護機制。此外加密後的可變動向量圖形與原始檔案,於瀏覽器端的顯示完全一致,並且速度上無太大差異。

    With the rapid growing popularity of the World Wide Web (WWW), the need of Intellectual Property Rights (IPR) for images is becoming steadily on the increase. The application of Image Information Hiding for Digital Content Archives has been developed for many years, but development of protecting mechanism for the IPR of Scaleable Vector Graphic (SVG) is just the beginnings. Since the format of SVG files is stored in the Plain Text type, the degree of difficuty in protecting files is getting higher.
    Based on these facts, in the study, we propose two Information Hiding models for protection on SVG, the Information Mixture and the Information Add-On, respectively. The two models have the following four features. (1) The legal user can verify the information by the encrypted techniques of the plain-text. (2) Providing the ability to verify the information in Asia characters by combining the Unicode encoding. (3) Achieving the objective of Information Hiding by adding the camouflage tag. (4) Providing the mechanism of online protection of IPR by combining the public key infrastructure (PKI) and Client-Server architecture. In addition, between the original SVG file and the SVG file of hiding authenticated information, the visual perception is consistent and the execution speed is almost the same.

    表目錄 vii 圖目錄 viii 第1章 緒論 1 1.1 研究背景與動機 1 1.2 研究目的 3 1.3 研究範圍與限制 3 1.4 研究流程與論文組織架構 5 第2章相關技術探討 6 2.1 資訊隱藏 6 2.2 浮水印與圖形 9 2.3 簡述XML 12 2.4 簡述DOM 19 2.5 可變動向量圖形(SVG) 22 2.5.1 SVG簡介 22 2.5.2 SVG的特色 22 2.5.3 SVG的常用語法 25 第3章資料隱藏方法 39 3.1 資訊融入法 40 3.1.1 轉置隱藏(Hide Transform) 41 3.1.2 位移隱藏(Hide Move) 43 3.1.3 動畫隱藏 (Hide Montion) 44 3.1.4 顏色隱藏 (Hide Color) 45 3.1.5 外形隱藏 (Hide Shape) 45 3.1.6 矩陣隱藏 (Hide Matrix) 46 3.1.7 隱藏雙位元文字 49 3.2 資訊附加法 54 3.2.1 增加標籤 (ADD Tag) 54 3.2.2 附加動畫 (Add Animate) 55 3.2.3 附加遮罩 (Add Mask) 57 3.2.4 附加曲線 (Add Curve) 59 3.3 資料隱藏之比較 60 第4章 系統設計與分析 65 4.1 系統環境與開發軟體 65 4.2 擷取SVG DOM Tree 66 4.3 系統功能與實作 69 4.3.1 系統功能 69 4.3.2實作一般字元隱藏 73 4.3.3實作中文隱藏與偽裝 77 第5章 結論與未來發展 79 5.1結論 79 5.2未來發展 80 參考文獻 82

    [1] 林錦雀,江高舉,"XML 基礎領航",金禾圖書,民國90年5月。
    [2] 林禎吉,賴溪松,"數位浮水印的技術",資訊安全通訊,第四卷,第三期,民國87年6月。
    [3] 曾士熊,"Unicode與ISO10646",中央研究院Newsletter of Computing Center計算中心通訊 ,資訊話題 ,第16卷10期民國89年05月。
    [4] 鄧慶齡,許成之,"應用於數位學習之版權管理系統規劃與建置", 第三屆DATF數位典藏技術研討會,民國93年8月。
    [5] Danielsen, P. J. “The Promise of a Voice-Enabled Web”. IEEE Vol. 33 pp. 104-106. Aug. 2000.
    [6] Josep Domingo-Ferrer, Francesc Seb’e, and Jordi Castell`a-Roca , "On the Security of Noise Addition for Privacy in Statistical Databases" , Lecture Notes in Computer Science, vol. 3050, pp. 149-161, 2004.
    [7] Nisha Kunder. "Low-Pass Filter Design Project" . MASTER’S PROJECT for the MSEE degree.July 23rd, 2003
    [8] Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G. (1999), "Information Hiding – A Survery", Proceeding of IEEE, pp. 1062-1078.
    [9] Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures 2000
    [10] Raggett, D. and O. Ben-Natan, “Voice Browsers”, W3C Note. WWW Con- sortium, Jan. 1998. http://www.w3.org/TR/NOTE-voice
    [11] Roger L. Hintz , Kenneth J. Moore , Alison B. Tarr , "Cropping Systems Research for Biomass Energy Production" , April 1, 2002
    [12] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Artech House Books, January 2000. Information Hiding: Steganography and Watermarking
    [13] W3C Voice Browser Working Group, “Voice Extensible Markup Language”, Version 2.0, W3C Working Draft. WWW Consortium, April 2002. http:// www.w3.org/TR/voicexml20/
    [14] WWW Consortium, “XML-Signature Syntax and Processing “, February 2002. Available as http://www.w3.org/TR/xmldsig-core/
    [15] WWW Consortium, " SGML: Introductions and Overviews" , Avaiable as http://www.oasis-open.org/cover/general.html#overview
    [16] WWW Consortium, “Voice Browser Activity Voice enabling the Web”. Avaiable as http:// www.w3.org/Voice/

    QR CODE