跳到主要內容

臺灣博碩士論文加值系統

(216.73.217.165) 您好!臺灣時間:2026/05/18 01:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王愉慈
研究生(外文):WANG, YU-TZU
論文名稱:基於XOR與可變動區塊區塊大小的二元影像資訊隱藏法
論文名稱(外文):A Data Hiding Method Based on Partition Variable Block Size with Exclusive-OR Operation on Binary Image
指導教授:楊權輝楊權輝引用關係
指導教授(外文):THOMAS YANG, CHYUAN-HUEI
口試委員:陳建彰蔡耀弘楊權輝
口試委員(外文):CHEN, CHIEN-CHANGTSAI, YAO-HONGTHOMAS YANG, CHYUAN-HUEI
口試日期:2016-06-29
學位類別:碩士
校院名稱:玄奘大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:中文
論文頁數:48
中文關鍵詞:資訊隱藏隱匿學互斥運算不可察覺
外文關鍵詞:Data hidingAdaptiveSteganographyXORImperceptible
相關次數:
  • 被引用被引用:1
  • 點閱點閱:136
  • 評分評分:
  • 下載下載:5
  • 收藏至我的研究室書目清單書目收藏:0
本研究中,我們提出了一種於二元影像裡的高容量資訊隱藏應用方法,在二元影像當中只有2種顏色(黑色與白色),所以是難以在沒有察覺的狀況之下嵌入資料,而安全性與資訊嵌入量是我們一直討論與權衡的問題。在嵌入秘密資訊之前,我們先使用亂數產生器將資料重新打亂,可增加資訊安全性。在一個M×N的掩護影像中,將掩護影像劃分為(2k+1)×(2k+1)不重疊的區塊,其中k=1,2,3…,(M或N較小者)。我們將不重疊的母區塊再分割成四個重疊的(k+1)×(k+1)子區塊,並跳過所有全黑或全白的(2k+1)×(2k+1)區塊。我們在重疊的(k+1)×(k+1)的區塊中,將四個角落區塊與母區塊(2k+1)×(2k+1)中心像素施作XOR運算,在每個(k+1)×(k+1)區塊可中嵌入k^2個位元,總共可藏4×k^2。整個主掩護圖像可以嵌入4×k^2×M/(2k+1)×N/(2k+1)位元。
提取的方法是檢測每個(k+1)×(k+1)四個角落的子區塊和(2k+1)×(2k+1)母區塊中心像素之間XOR運算。收集所有嵌入的位元,然後還原成原來的順序。我們想要選擇的方法,可能會影響嵌入量與影像的不可查覺性。實驗結果表明該方法提供了大的嵌入容量維持不可察覺和掩護影像的低失真率。

In this paper, we propose a high capacity data hiding method applying in binary images. Since a binary image has only two colors, black or white, it is hard to hide data imperceptible. The capacities and imperception are always in a trade-off problem. Before embedding we shuffle the secret data by a pseudo-random number generator to keep more secure. We divide the host image into several non-overlapping(2k+1)×(2k+1)sub-blocks in an M by N host image as many as possible, where k=1,2,3,…,or min (M,N). Then we partition each sub-block into four overlapping(k+1)×(k+1)sub-blocks. We skip the all blacks or all whites in each(2k+1)×(2k+1)sub-blocks. We consider all four(k+1)×(k+1)sub-blocks to check the XOR between the non-overlapping parts and center pixel of the(2k+1)×(2k+1)sub-block, it embed k^2bits in each(k+1)×(k+1)sub-block, totally are4×k^2. The entire host image can be embedded 4× k^2×M/(2k+1)×N/(2k+1)bits. The extraction way is simply to test the XOR between center pixel with their non-overlapping part of each sub-block. All embedding bits are collected and shuffled back to the original order. The adaptive means the partitioning sub-block may affect the capacities and imperception that we want to select. The experimental results show that the method provides the large embedding capacity and keeps imperceptible and reveal the host image lossless.
目錄
中文摘要I
英文摘要III
致謝V
目錄VI
表目錄VIII
圖目錄IX
第一章序論01
1.1研究背景與動機01
1.2研究目的02
1.3論文架構02
第二章文獻回顧04
2.1資訊隱藏04
2.2文獻探討05
第三章本文提出的方法11
3.1入規則與方法13
3.2嵌入流程與演算法16
3.3嵌入範例20
3.4提取規則與方法23
3.5提取流程與演算法23
3.6提取範例26
第四章實驗結果27
第五章結論與未來工作44
參考文獻45

[1]S.K. Bandyopadhyay, D. Bhattacharyya, D. Debnath and P. Das. (2008) “Bi-Color Nonlinear Data Embedding and Extraction of Handwritten Signature” Industrial Electronics and Applications, ICIEA 2008. 3rd IEEE Conference on. IEEE, p1896 -1901.
[2] J. Y. Byun, K. H. Jung and K.Y. Yoo. (2008) “Improve Data Hiding Method by Block Parity for Binary Images” Computer Science and Software Engineering, 2008 International Conference on (Volume:3 ). IEEE, p 931 - 934.
[3]C. C. Chang, Y. H. Huang and W. C. Chang. (2015) “Reversible data hiding for VQ indices using XOR operator and SOC codes” Machine Learning and Cybernetics (ICMLC), International Conference on . IEEE, p 340 - 345.
[4]H. Cao. and A.C. Kot (2012) “EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication” Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), Asia-Pacific. IEEE,p1 –6.
[5] B. Feng, W. Lu and W. Sun.(2014) “Reversible Data Hiding Method Based on Exclusive-OR with Two Host Images” Trustworthy Systems and their Applications (TSA), International Conference on. IEEE, p 69 – 74.
[6]J.M. Guo, G.H. Lai,K.S. Wong and L.C. Chang(2015) “Progressive Halftone Watermarking Using Multilayer Table Lookup Strategy” Image Processing, IEEE Transactions on (Volume:24 , Issue: 7 ) .IEEE, p 1057-7149.
[7]M. Guo and H. Zhang. (2010) “High Capacity Data Hiding for Binary Image Authentication” Pattern Recognition (ICPR), 20th International Conference on. IEEE, p 1441 - 1444.
[8]Q. Hou, D. Junping, Li Li, J. Lu And C.C. Chang.(2014) “Scanned binary image watermarking based on additive model and sampling” Springer Science+Business Media New York ,2014 Multimedia Tools and Applications, Multimedia Tools and Applications, Volume 74, Issue 21 , pp 9407-9426.
[9]P. T. Huy1 and C. Kim. (2013) “Binary Image Data Hiding Using Matrix Encoding Technique in Sensors” International Journal of Distributed Sensor Networks Volume, Article ID 340963, 7 pages.
[10]K.H. Jung, K.S. Ha and K.Y. Yoo. (2008) “Data Hiding in Binary Images by Pixel-valueWeighting” International Conference on Convergence and Hybrid Information Technology, Seventh International Conference on. IEEE, p 262 - 265.
[11]S. Khan and A. Bhattacharya. (2015) “Secure Data Pixels for Binary Host Images Using Edge-Adaptive Grid Technique” Communication Technologies (GCCT), Global Conference on . IEEE,p 691 - 695.
[12]K. T. Lin. (2011) “Data Encrypting In A Binary Image Base On Modified Data Hiding Method” Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Seventh International Conference on. IEEE, p 69 - 72.
[13]C.C. Lo ,C.M. Lee, B.Y. Liao and J.S. Pan (2008) “Halftone Image Data Hiding with Reference to Original Multitone Image” Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP '08 International Conference on. IEEE, p265 - 268.
[14]R. Naskar and R. S. Chakraborty. (2011) “Lossless Data Hiding for Halftone Images” Image Information Processing (ICIIP), International Conference on. IEEE,p 1 - 6.
[15] H. Tirandaz, R. Davarzani and, M. Monemizadeh and J. Haddadnia. (2009) “Invisible and High Capacity Data Hiding in Binary Text Images Based on Use of Edge Pixels” International Conference on Signal Processing Systems. IEEE, p 130 - 134.
[16]C.C. Wang, Y.F. Chang, C.C. Chang, J.K. Jan and C.C. Lin, (2014) “A high capacity data hiding scheme for binary images based on block patterns” The Journal of Systems and Software 93. ScienceDirect, p152 –162.
[17]X.Y. Yu and A. Wang. (2009) “Chain Coding Based Data Hiding in Binary Images” Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP '09. Fifth International Conference on. IEEE, p 933 - 936.
[18]C.-H.T. Yang , Y. T. Hsu , C.C. Wu And J.W. Chang.(2014) “Reversible Data Hiding Method Based on Exclusive-OR with Two Host Images” Trustworthy Systems and their Applications (TSA), International Conference on. IEEE,p 69 – 74.
[19]H.B. Zhang and L. Man (2008) “Data hiding in binary line drawing images” Wavelet Analysis and Pattern Recognition, 2008. ICWAPR '08. International Conference on (Volume:1 ). IEEE, p 134 - 140.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊