跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.62) 您好!臺灣時間:2025/11/18 00:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張顒
研究生(外文):YONG JHANG
論文名稱:具有高隱藏量與低失真性的資料隱藏技術研究
論文名稱(外文):A Study of Data Hiding Algorithm with High Embedding Capacity and Low Distortion
指導教授:吳男益
指導教授(外文):Nan-I Wu
口試委員:吳男益郭哲男陳政宏
口試委員(外文):Nan-I Wuzhe-Nan GuoCheng-Hung Chen
口試日期:2014-01-15
學位類別:碩士
校院名稱:稻江科技暨管理學院
系所名稱:數位內容設計與管理學系研究所
學門:電算機學門
學類:電算機應用學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:50
中文關鍵詞:可適應性資料隱藏偽裝學像素差值餘數定理運算
外文關鍵詞:AdaptiveData HidingSteganographyPixel-Value Differencing (PVD)Modulus Theory Operation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:233
  • 評分評分:
  • 下載下載:20
  • 收藏至我的研究室書目清單書目收藏:0
本論文依據人類視覺特性要求,提出一個新型可適應性資料隱藏技術,新方法具有高不可察覺性、高隱藏量且能抵抗統計方法的偽裝偵測攻擊。在新方法裏,為了同時達到高隱藏量與低失真度,主要利用原始影像的複雜度來決定訊息隱藏量的多寡,原始影像特性若是愈複雜,隱藏量則會愈高,影像特性紋理較平滑的位置,則將藏比較少的訊息。整體的影像失真性,若以人類視覺來觀察,則無法察覺到明顯的破壞狀態。新方法是採用像素對差值技術,來決定影像複雜度的高低,像素對的差值愈高,代表該像素對位於複雜的地方;反之,則位於較平滑的地方。為了有效降低因為訊息嵌入後,所引起的像素值失真性,新方法將採用餘數定理運算與雙基底非十進制數字系統,以有效地控制像素失真的幅度範圍。本論文所提出的新方法,具有盲擷取的特性,即不需要原始影像即可取出秘密訊息。經由大量的實驗結果顯示,新方法確實可以有效地降低影像的失真性,並與現存相同類型的技術相比較之下,新方法確實可以提高整體的隱藏量,並且能進一步地降低影像失真。
In this thesis, a novel data hiding method, designed base on human visual perception and capable of offering high invisibility, is proposed to enable the user to conceal large amounts of secret data into edge areas of still images. In order to achieve a higher payload and to obtain a better stego image quality, the principle of payload allotment is to hide more data into edge areas than smooth areas, thus serving the ultimate purpose of maintaining human imperceptibility to the distortion in the image caused by the embedding of the secret message. In our new scheme, we utilize the pixel-value differencing to determine the payload of a pixel pair. The higher difference values the areas are, the large the messages are hidden, and vice versa. In the embedding algorithm, the binary secret data is transferred into non-decimal number system and then hid into each pixel pair using modulus function. Since the characteristics of the pixel pairs remain the same after the secret data is hidden, the proposed scheme qualifies as a so-called "blind" scheme, meaning that the presence of the original image is not required in the extraction procedure. The experiments we conducted have demonstrated that the proposed scheme is indeed capable of hiding more data while keeping down the stego-image distortion and remaining the imperceptibility. The performance of the proposed scheme, compared with those of the existing techniques, proving that our scheme is not only feasible but better.
中文摘要……………………………………………………………………………………………………………i
英文摘要……………………………………………………………………………………………………………ii
誌  謝……………………………………………………………………………………………………………iii
目  錄……………………………………………………………………………………………………………iv
表 目 錄……………………………………………………………………………………………………………vi
圖 目 錄……………………………………………………………………………………………………………v
第一章 緒論…………………………………………………………………………………………………1
第二章 研究動機………………………………………………………………………………………3
第三章 相關研究工作………………………………………………………………………………5
3.1. 高隱藏量資訊隱藏技術……………………………………………………………6
3.2. 符合人類視覺之可適應資訊隱藏技術…………………………………8
3.3. 高效率資訊隱藏技術…………………………………………………………………11
3.4. 灰階影像資訊隱藏偵知技術……………………………………………………14
第四章 本論文新研究方法………………………………………………………………………16
第五章 實驗結果與分析比較…………………………………………………………………23
5.1. 分析比較與討論 …………………………………………………………………………29
5.2. 偽裝偵知測試結果………………………………………………………………………34
第六章 結論…………………………………………………………………………………………………36
參考文獻……………………………………………………………………………………………………………37

[1]E. Besdok, “Hiding Information in Multispectral Spatial Images,” Journal of Electronics and Communications, Vol. 59, pp. 15-24, 2005.
[2]P. Borges, J. Mayer, and E. Izquierdo, “Robust and Transparent Color Modulation for Text Data Hiding,” IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1479–1489, Dec., 2008.
[3]C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469-474, Mar. 2004.
[4]C. C. Chang and H. W. Tsai, “A Steganographic Method for Digital Images using Side Match,” Pattern Recognition Letters, No. 25, pp. 1431-1437, 2004.
[5]C. C. Chang, C. Y. Lin and Y. Z. Wang, “New Image Steganographic Methods using Run-Length Approach,” Information Sciences, Vol. 176, pp.3393-3408, 2006.
[6]H. Farid, “Detecting Hidden Messages Using Higher-Order Statistical Models,” International Conference on Image Processing, Rochester, NY, pp. 905-908, 2002.
[7]M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,”
IEEE Transactions on Image Processing, Vol. 11, No. 4, pp.477-484, 2002.
[8]J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images,” Magazine of IEEE Multimedia Special Issue on Security, pp. 22-28, Dec. 2001.
[9]J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Grayscale and Color Images,” Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, pp. 27-30, Oct. 2001.
[10]J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, “Writing on wet paper,” IEEE Transactions on Signal Processing, Vol. 53, No. 10, pp. 3923–3935, Oct. 2005.
[11]J. Fridrich and D. Soukal, “Matrix Embedding for Large payloads,” IEEE Transactions on Information Forensics and Security, Vol. 1, pp. 390-395, Sep. 2006.
[12]J. Fridrich and P. Lisonˇek, “Grid coloring in steganography,” IEEE Transactions on Information. Theory, vol. 53, no. 4, pp. 1547–1549, Apr. 2007.
[13]F. Galand and G. Kabatiansky, “Information hiding by coverings,” in Proc. IEEE Information Theory Workshop, 2004, pp. 151–154.
[14]Hartung and M. Kutter, “Information hiding - a survey, Proceedings of the IEEE: Special Issue on Identifcation and Protection of Multimedia Content, vol. 87 Issue:7, pp. 1062--1078, Jul. 1999.
[15]J. J. Harmsen and W. A. Perarlman, “Capacity of Steganographic Channels,” IEEE Transactions on Information Theory, vol. 55, pp. 1775-1792, APR. 2009.
[16]W. C. Hsieh, N. I. Wu, and C. M. Wang, “A novel data hiding scheme for binary images with the minimal distortion,” Journal of Internet Technology, vol.11, no. 7, Dec. 2010.
[17]J. C. Joo, H. Y. Lee, and H. K. Lee, “Improved steganographic method preserving pixel-value differencing histogram with modulus function," EURASIP Journal on Advances in Signal Processing, p. Article in Press, 2010.
[18]D. C. Lou and J. L. Liu, “Steganographic Method for Secure Communications,” Computers and Security, Vol. 21, pp.449-460, Jun. 2002.
[19]D. C. Lou, N. I. Wu, C. M. Wang, Z. H. Lin and C. S. Tsai “A novel adaptive steganography based on local complexity and human vision sensitivity”, The Journal of Systems and Software, vol. 83, no 7, pp. 1236-1248, 2010.
[20]S. Lyu and H. Farid, “Steganalysis Using Color Higher-Order Image Statistics, ” IEEE Transactions on Information Forensics and Security, Vol. 1, No. 1, pp. 111-119, Mar. 2004.
[21]J. C. Liu and M. H. Shih, “Generalizations of pixel-value differencing steganography for data,” Fundamenta Informaticae, vol. 83, pp.319-335, Aug. 2008.
[22]X. L. Li, B. Yang, D. F. Cheng, and T. Y. Zeng, “A generalization of LSB matching,” IEEE Signal Processing Letters, vol. 16, pp. 69-72, FEB. 2009.
[23]W. C. Li, N. I. Wu and C. M. Wang, “A High Capacity and High Quality Data Hiding Algorithm for High Dynamic Range Images,” Journal of Internet Technology, vol. 10, no. 5, pp.435-448, Oct 2009.
[24]C. F. Lee and H. L. Chen, “A novel data hiding scheme based on modulus function,” The Journal of System and Software, vol. 83, pp. 832--843, May 2010.
[25]A. Martin, G. Sapiro and G. Seroussi, “Is Image Steganography Natural,” IEEE Transactions on Image Processing, Vol. 14, No. 12, Dec. 2005.
[26]J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letter, Vol. 13, No. 5, pp. 285–287, May 2006.
[27]P. A. Regalia, “Cryptographic secrecy of steganographic matrix embedding,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 786-791, DEC. 2008.
[28]K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information into a dithered multi-level image," Proc. IEEE Milcom, pp. 216--220, 1990.
[29]C. C. Thien and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No.12. 2004.
[30]Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A Secure Data Hiding Scheme for Binary Images,” IEEE Transactions on Communications, Vol. 50, pp.1227-1231, Aug. 2002.
[31]Y. C. Tseng and H. K. Pan, “Data Hiding in 2-color Images,” IEEE Transactions on Computers, Vol. 51, No. 7, pp.873-878, Jul. 2002.
[32]C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping with Security Protection,” IEEE Transactions on Communications, Vol. 52, pp.791-800, May 2004.
[33]S. J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, pp.99-116, Jan. 2005.
[34]C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,” The Journal of Systems and Software, vol. 81, pp. 150-158, Jan 2008.
[35]C. M. Wang and P. C. Wang, “Steganography on point-sampled geometry,” Computers and Graphics, vol. 30, pp. 1719--1726, Apr. 2006.
[36]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, pp. 671--683, Mar. 2001.
[37]K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 10, pp. 1499-1512, Oct., 2009.
[38]D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value
Differencing,” Pattern Recognition Letters, Vol. 24, No.9-10, pp.1613-1626, 2003.
[39]M. Y. Wu, Y. K. Ho, and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters, Vol. 25, pp.301-309, 2004.
[40]M. Wu and B. Liu, “Data Hiding in Binary Image for Authentication and Annotation,” IEEE Transactions on Multimedia, Vol.6, pp.528-538, Aug. 2004.
[41]H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings on Vision Image and Signal Processing, Vol. 152, No. 5, pp.611-615, Oct. 2005.
[42]N. I Wu and M. S. Hwang, “Data hiding: Current status and key issues,” International Journal of Network Security, vol. 4, pp. 1--9, Jan. 2007.
[43]N. I. Wu, K. C. Fu, and C. M. Wang, “A novel data hiding method for grayscale images based on pixel-value differencing and modulus function,” Journal of Internet Technology, vol. 11, no. 7, Dec. 2010.
[44]F. Willems and M. Dijk, “Capacity and codes for embedding information in gray-scale signals,” IEEE Transactions on Information Theory, Vol. 51, No. 3, pp. 1209–1214, Mar. 2005.
[45]C. M. Wang, N. I. Wu, C. S. Tsai and M. S. Hwang, “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Operation,” The Journal of System and Software, Vol. 81, pp. 150-158, Jan. 2008.
[46]R. Z. Wang and Y. S. Chen, “High-Payload Image Steganography Using Two-Way Block Matching,” IEEE Signal Processing Letters, Vol. 13, pp.161-164, Mar. 2006.
[47]Y. H. Yu, C. C. Chang and Y. C. Hu, “Hiding Secret data in images via predictive coding,” Pattern Recognition, Vol. 38, pp. 691-705, May 2005.
[48]H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia, vol. 9, pp. 475--486, Apr. 2007.
[49]C. H. Yang, C. Y. Wang, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 488-497, Sep. 2008.
[50]H. Yang, A. C. Kot, and S. Rahardja, “Orthogonal data embedding for binary images in morphological transform domain—a high-capacity approach,” IEEE Transactions on Multimedia, vol. 10, pp.339-351, Apr. 2008.
[51]C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognition, vol. 41, pp. 2674-2683, AUG. 2008.
[52]C. F. Yang, F. L. Liu, X. Y. Luo, and B. Liu, “Steganalysis frameworks of embedding in multiple least-significant bits,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 662-672, DEC. 2008.
[53]C.H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Varied PVD+LSB evading detection programs to spatial domain in data embedding systems,” The Journal of System and Software, vol. 83, pp. 1635--1643, Oct. 2010.
[54]X. Zhang and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, pp.67-70, Jan. 2005.
[55]X. Zhang and S. Wang, “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Patter Recognition Letters, No. 25, pp. 331-339, 2004.
[56]X. Zhang and S. Wang, “Dynamical Running Coding in Digital Steganography,” IEEE Signal Processing Letters, Vol. 13, pp. 165-168, Mar. 2006.
[57]X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communication Letter, Vol. 10, No. 11, pp. 781–783, Nov. 2006.
[58]W. Zhang, X. Zhang and S. Wang, “A Double Layered “Plus-Minus One” Data Embedding Scheme,” IEEE Signal Processing Letter, Vol. 14, No. 11, pp. 848–851, Nov. 2007.
[59]X. Zhang, W. Zhang and S. Wang, “Efficient Double-Layered Steganographic Embedding,” Electronics Letters, Vol. 43, No. 8, pp.482-483, Apr. 2007.
[60]X. P. Zhang, S. H. Wang, and Z. Y. Zhou, “Multibit assignment steganography in palette images,” IEEE Signal Processing Letters, vol. 15, pp. 553-556, 2008.
[61]Z. Y. Zhang, C. Zhu, and Y. Zhao, “Two-description image coding with steganography,” IEEE Signal Processing Letters, vol. 15, pp. 887-890, 2008.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 王麗斐、林美珠(2000)。團體治療性因素量表之發展與編製。中華輔導學報,9,1-24。
2. 王郁琮、陳尚綾、王麗斐、林美珠(2012)。個人知覺與團體脈絡之團體氣氛:多層次潛在變數分析應用。中華輔導與諮商學報,32,33-55。
3. 吳聲毅、林振欽(2004)。資訊科技融入教學之教學分析模式。國教新知,50(4),63-70。
4. 王千倖(2010)。「資訊科技融入教學」推廣政策之敘說研究。教育實踐與研究,23 (1),31-56。
5. 李堅萍(2004)。運用電腦影像處理科技模擬美術繪畫教學模式之實驗研究。新竹師院學報,18,437-464。
6. 林俊德(2002)。團體規範探討。諮商與輔導,194,2-7。
7. 林美珠、王麗斐(1998)。團體治療性與反治療性重要事件之分析。中華輔導學報,6,35-59。
8. 張芳榮、李娟娟、謝宏林、王梅麗、張達人(2005)。家庭暴力加害人非自願性團體治療之團體歷程探討。中華團體心理治療。11(2),1-13。
9. 張景然(2001)。新世紀美國諮商師教育的幾個新趨勢。諮商與輔導,181,22 -25。
10. 張景然(2003)。大學生成長團體實務:新手團體領導者效能的提升。輔導季刊,39(4),41-50。
11. 張瑋珊(2007)。團體諮商的多元文化議題—以「脊髓損傷者生涯探索團體」為例。輔導季刊。43(3),52-60。
12. 陳若璋、劉志如、林烘煜(2007)。比較強暴犯與兒童性侵害犯接受團體治療之療效評估。中華輔導學報。22,1 -31。
13. 程小蘋、林杏足(2005)。國中輔導教師對青少年個案身心特徵、晤談問題及諮商作法之知覺分析。彰化師大輔導學報。25,133 -174。
14. 黃素霞、林高立(2010)。表達性媒材在團體諮商中的運用-以美術工藝類媒材為例。輔導季刊。46(2),14-23。
15. 劉慧屏(2007)。表達性藝術媒材在自我探索團體的運用-方案設計。諮商與輔導。256,37-40。