簡易檢索 / 詳目顯示

研究生: 徐勝輝
Sheng-hui Hsu
論文名稱: 一個應用QR碼傳遞秘密資訊的方法
An Approach to Transmit Secret Messages via QR Code
指導教授: 鄧惟中
Wei-Chung Teng
口試委員: 邱舉明
Ge-Ming Chiu
金台齡
Tai-Lin Chin
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 63
中文關鍵詞: 資訊安全資訊隱藏二維條碼
外文關鍵詞: information security, information hiding, QR Code
相關次數: 點閱:268下載:5
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  •   為了確保資訊的安全,應用密碼學進行加密是最常見的方法。然而資訊經過加密後變成一堆毫無意義的亂碼,在網路傳遞時反而容易引起有心人士的破壞或破解。另一方面,資訊隱藏技術則利用媒體的特性將資訊的存在性隱藏起來,令人無法直接察覺,進而達到保護的效果。

      近年來二維條碼的應用日益發達,二維條碼可透過紙張等物理媒介有效率的傳遞數位資訊,而且在處理的過程中充分考慮雜訊所帶來的影響,因此適合利用資訊隱藏方法,將機密資訊隱藏於二維條碼之中。本論文實作一完整的系統來透過二維條碼傳遞機敏資訊,並且利用資訊隱藏技術改良既有方法來傳遞密碼或密鑰。


     Encryption is the most frequently used method to secure the transmitted message over unsafe channels. However, ciphertext always looks like random string and can be easily detected by attackers. On the other hand, information hiding technologies utilize the characteristic of media or the representation of data to camouflage the existence of hidden message in order to protect the secrets.

     QR code and other two-dimensional codes have gained wide applications in recent years. These codes are able to transmit information via physical media like papers in an efficient manner. Since QR code is designed to be tolerant of noise and has random-bits-like representation, it is naturally suitable for the use of information hiding method. This thesis improves an existing approach and demonstrates a complete implementation on sending confidential data with QR code by embedding the password or secret key as noise.

    摘要 Abstract 誌謝 目錄 圖目錄 表目錄 第一章 緒論 1.1 前言 1.2 研究背景與動機 1.3 研究目的與方法 1.4 論文架構 第二章 文獻探討 2.1 資訊隱藏 2.1.1 資訊隱藏之起源 2.1.2 隱藏資訊類別 2.1.3 影像隱藏應用 2.2 利用錯誤糾正演算法隱藏機密資訊 2.2.1 嵌入機密資訊 2.2.2 取出機密資訊 2.2.3 研究分析 2.3 Barcode 2.3.1 One Dimension Barcode 2.3.2 Two Dimension Barcode 2.4 Quick Response Code(QR Code) Overview 2.4.1 QR Code結構 2.4.2 QR Code規格 2.4.3 QR Code編碼流程 2.5 Virtual Network Computing 2.5.1 Remote Framebuffer Protocol 第三章 研究方法 3.1 使用情境 3.2 系統架構(Architecture) 3.3 Encode 3.4 Decode 3.5 整體改進 第四章 系統建置與實驗結果 4.1 實作測試 4.2 實驗系統建置 4.3 模擬環境 4.3.1 Server端介面操作模式 4.3.2 Client端介面操作模式 第五章 結論與未來工作 5.1 結論 5.2 未來工作 參考文獻

    [1]洪自生,「在QR Code中隱藏資料之研究」,碩士論文,國立高雄第一科技大學,高雄(2009)。
    [2]Gustavus J. Simmons, “The Prisoners’ Problem and The Subliminal Channel,”Processing of the International Cryptology Conference, Santa Barbara, California, pp. 51-67(1984).
    [3]C. Kurak and J. McHugh, “A Cautionary Note on Image Downgrading,”Proceedings of the 8th Computer Security Applications Conference, San Antonio, Texas, pp. 153-159(1992).
    [4]Matsui, Kineo and Tanaka, Kiyoshi, “Video-Steganography: How to Secretly Embed a Signature in a Picture,”Processing of the IMA Intellectual Property Project, Vol. 1, pp. 187-206(1994).
    [5]W. Bender, D. Gruhl, N. Morimoto and A. Lu, “Techniques for Data Hiding,”IBM System Journal, Vol. 35, No. 3.4, pp. 313-336(1996).
    [6]N. F. Maxemchuk and S. Low, “Marking Text Documents,”Proceedings of the International Conference Image Processing, Santa Barbara, California, Vol. 3, pp. 13(1997).
    [7]Min Wu and Bede Liu, “Watermarking for Image Authentication,” Proceedings of the International Conference Image Processing, Chicago, Illinois, USA, Vol. 2, pp. 437-441(1998).
    [8]Lisa M. Marvel, Charles G. Boncelet and Charles T. Retter, “Spread Spectrum Image Steganography,”Journal of the IEEE Transactions on Image Processing, Vol. 8, No. 8, pp. 1075-1083(1999).
    [9]Min Wu and Bede Liu, “Digital Watermarking Using Shuffling,” Proceedings of the International Conference Image Processing, Kobe, Japan, Vol. 1, pp. 291-295(1999).
    [10]Der-Chyuan Lou and Chia-Hung Sung, “A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem,”Journal of the IEEE Transactions on Multimedia, Vol. 6, No. 3, pp. 501-509(2004).
    [11]M. Wu and B. Liu, “Data Hiding in Binary Image for Authentication and Annotation,”Journal of the IEEE Transactions on Multimedia, Vol. 6, No. 4, pp. 528-538(2004).
    [12]郭文中、鄭錦楸和林琮智,「基於RSA的資料隱藏方法」,2004年網際空間:資安、犯罪與法律社會學術研究暨實務研討會論文集,第204-208頁(2004).
    [13]Association for Automatic Identification and Mobility(AIM Global), “Linear(One-Dimensional) Bar Code Symbologies,”「http://www.aimglobal.org/technologies/barcode/linear_symbologies.asp」.
    [14]Association for Automatic Identification and Mobility(AIM Global), “Two Dimensional(2D) Bar Code Symbologies,”「http://www.aimglobal.org/technologies/barcode/2d_symbologies.asp」.
    [15]林銀議,數位通訊原理:編碼與消息理論,五南,台北(2005).
    [16]Melissa Kanemasu, Golay Codes, 「http://www-math.mit.edu/phase2/UJM/vol1/MKANEM~1.pdf」.
    [17]ISO/IEC 18004:2006, Information Technology – Automatic Identification and Data Capture Techniques – QR Code 2005 Barcode Symbology Specification(2006).
    [18]Bernard Sklar, Reed-Solomon Codes, 「http://www.informit.com/content/images/art_sklar7_reed-solomon/elementLinks/art_sklar7_reed-solomon.pdf」.
    [19]David Solomon, Coding for Data and Computer Communications, Springer Press(2005).
    [20]RealVNC, VNCR remote control software, 「http://www.realvnc.com」.

    QR CODE