透過您的圖書館登入
IP:3.21.19.13

摘要


At the time of rapid change, the advancement of the Internet and the ceaseless development of technologies allowed for the frequent use of the Internet for communication and data transmission. Yet, these data can easily be replicated and transmitted, given their distinctive characteristics. Therefore, the secure transmission and receiving of data with peace of mind is an issue worth our second thoughts. The purpose of this article is to apply the modulus of the Chinese Remainder Theorem (CRT) to the LSB replacement method and the GEMD method to decompose the confidential data under the binary system and embed the decomposed confidential data into the designated pixels of the image. Then, use the LSB Replacement method or the GEMD hiding method in the carrier to form a hidden image. The receiver could then extract the designated pixel of the concealed image with the extraction of the LSB value or the GEMD data in the first place and compute the confidential data through the CRT with the same modulus value. The sorting of the modal value is the point of gravity and will affect the quantity for hiding and the PSNR value. Yet, this modulus is used to enhance the level of security.

延伸閱讀