跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/06 20:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:連青科
研究生(外文):Lien,Ching-Ke
論文名稱:可偵測像素值差異藏密技術藏密量之藏密分析技術之研究
論文名稱(外文):Study of Payload Estimation for Steganalysis of Pixel-value Differencing Steganography
指導教授:劉江龍劉江龍引用關係
指導教授(外文):Liu,Chiang-Lung
口試委員:魯大德陸儀斌王正豪張克勤
口試日期:2013-05-16
學位類別:碩士
校院名稱:國防大學理工學院
系所名稱:電子工程碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:67
中文關鍵詞:資訊隱藏偵測
相關次數:
  • 被引用被引用:0
  • 點閱點閱:470
  • 評分評分:
  • 下載下載:19
  • 收藏至我的研究室書目清單書目收藏:0
像素值差異藏密法(PVD)係透過調整像素對間之差值進行秘密訊息之嵌入,其可避免被RS偵測技術及x2攻擊法所偵測,且藏密量亦較最低位元取代藏密法(LSB法)多,同時能維持其影像品質,但是其像素差值直方圖呈現不正常之階梯狀分佈,容易被暴露其藏密之事實。儘管如此,當藏密量不足100%時,此藏密特徵會隨著藏密量之下降而逐漸不明顯,增加偵測的困難度;除此之外,對PVD藏密影像進行藏密量之偵測,也是一大挑戰。
本論文提出一可偵測PVD藏密影像藏密量之特定偵測技術。本偵測技術利用像素差值直方圖在不同藏密量之統計值差異作為特徵值,並利用SVM分類器對不同藏密量之PVD藏密影像特徵進行訓練,產生訓練模型。藉由訓練模型,可對未知藏密量之PVD藏密影像進行藏密量偵測。
實驗結果顯示,本偵測技術在藏密量級距為50%、25%時,對不同藏密量之PVD藏密影像之平均偵測正確率達93%以上;而在藏密量級距20%時,除藏密量40%及60%外,其餘藏密量之PVD藏密影像之偵測效果亦達80%以上。此結果證明,本文所提出之偵測技術可有效偵測PVD藏密影像之藏密量,為一有效且實際之PVD藏密偵測技術,不但可提高國防資訊之防護,且能提供後續發展以PVD藏密法為基礎之藏密技術之參考。
誌謝 iv
摘要 v
ABSTRACT vi
目錄 vii
表目錄 ix
圖目錄 x
縮寫英中對照表 xii
1. 緒論 1
1.1 研究背景 1
1.2 研究動機 3
1.3 研究目的及方法 4
1.4 論文架構 5
2. 文獻探討 6
2.1 像素值差異藏密技術 6
2.1.1 像素區塊差值的量化 6
2.1.2 訊息嵌入 8
2.1.3 訊息萃取 10
2.1.4 PVD藏密法之效能評估 11
2.2 PVD偵測技術發展 12
2.3 支援向量機簡介 14
3. 基於像素差值直方圖之偵測技術 19
3.1 PVD藏密特徵 19
3.2 本偵測技術使用之藏密特徵 22
3.2.1 特徵值F1 23
3.2.2 特徵值F2~F7 24
3.2.3 特徵值F8~F20 29
3.3本偵測技術之偵測流程 38
3.3.1 訓練模型產生階段 39
3.3.2 影像偵測階段 39
4. 實驗結果與討論 40
4.1 實驗環境 40
4.2 實驗步驟 41
4.3 實驗結果 42
5. 結論及未來研究方向 49
5.1 結論 49
5.2 未來研究方向 50
參考文獻 51

[1]Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Information Hiding-A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999.
[2]Rabah, K., “Steganography-The Art of Hiding Data,” Information Technology Journal, Vol. 3, No. 3, pp. 245-269, 2004.
[3]Shih, F. Y. and Wu, Scott. Y. T., “Combinational Image Water Marking in the Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, Apr. 2003.
[4]Chang, C. C., Chen, T. S., and Chung, L. Z., “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1-2, pp. 123-138, 2002.
[5]Joo, S., Suh, Y., Shin, J., and Kikuchi, H., “A New Robust Watermark Embedding into Wavelet DC Components,” ETRI Journal, Vol. 24, No. 5, pp. 401-404, 2002.
[6]Lee, W. B. and Chen, T. H., “A Public Verifiable Copy Protection Technique for Still Images,” Journal of Systems and Software, Vol. 62, No. 3, pp. 195-204, 2002.
[7]Alturki, F. and Mersereau, R., “Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,” Proceedings of IEEE International Conference on Image Processing, Thessaloniki, pp. 542-545, 2001.
[8]Bender, W., Gruhl, D., Morimoto, N., and Lu, A., “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996.
[9]Fridrich, J., Goljan, M., and Rui, D., “Detecting LSB Steganography in Color, and Gray-scale Images,” Magazine of IEEE Multimedia Special Issue on Security, Vol. 4, No. 4, pp. 22-28, 2001.
[10]Westfeld, A. and Pfitzmann, A., “Attacks on Steganographic Systems,” Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, pp. 61-75, 1999.
[11]Chang, C. C., Hsiao, J. Y., and Chan, C. S., “Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595, 2003.
[12]Mielikeainen, J., “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006.
[13]Wu, D. C. and Tsai, W. H., “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003.
[14]Wu, H. C., Wu, N. I, Tsai, C. S., and Hwang, M. S., “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005.
[15]Kim, K. J., Jung, K. H., and Yoo, K. Y., “A High Capacity Data Hiding Method Using PVD and LSB,” Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Wuhan, Hubei, pp. 876-879, Dec. 2008.
[16]Chang, K. C., Chang C. P., Huang, P. S., and Tu T. M., “A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing,” Journal of Multimedia, Vol. 3, No. 2, pp. 37-44, 2008.
[17]Wang, C. M., Wu, N. I, Tsai, C. S., and Hwang M. S., “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function,” Journal of Systems and Software, Vol. 81, No. 1, pp. 150-158, 2008.
[18]http://zh.wikipedia.org/wiki/911%E4%BA%8B%E4%BB%B6#cite_note-35
[19]http://www.ettoday.net/news/20120502/43256.htm
[20]Joo, J. C., Lee, H. Y., Bui, C. N., Yoo, W. Y., and Lee, H. K., “Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function,” Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing, Tainan, Taiwan, pp. 476-485, 2008.
[21]Joo, J. C., Kim, K. S., and Lee, H. K., “Histogram Estimation Scheme Based Steganalysis Defeating the Steganography Using Pixel-Value Differencing and Modulus Function,” Optical Engineering, Vol. 49, No. 7, pp. 1-11, 2010.
[22]Sabeti, V., Samavi, S., Mahdavi, M., and Shirani, S., “Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks,” Pattern Recognition, Vol. 43, No. 1, pp. 405-415, 2010.
[23]Zaker, N. and Hamzeh, A., “A Novel Steganalysis for TPVD Steganographic Method Based on Differences of Pixel Difference Histogram,” Multimedia Tools and Applications, DOI :10.1007/s11042-010-0714-9.
[24]劉江龍、劉興漢、李翊豪,“適用於三向型像素值差異藏密法之偵密技術”,第二屆航空技術學術研討會,高雄,台灣,第221-228頁,2012年9月21日。
[25]劉江龍、李翊豪、劉興漢,“可偵測使用模數運算像素值差異藏密法之偵密技術”, 第 20 屆國防科技學術研討會,桃園,台灣,第631-637頁,2011年11月18日。
[26]郭琇靜、顧瑞祥,“應用支援向量機於管制圖異常圖形之辨識”, 中華民國品質學會第43 屆年會暨第13 屆全國品質管理研討會論文集,第1-10頁,2007。
[27]Andreani, R., Martínez, J. M., and Schuverdt, M. L., “On the Relation between Constant Positive Linear Dependence Condition and Quasinormality Constraint Qualification,” Journal of optimization theory and applications, Vol. 125, No. 2, pp. 473-485, 2005.
[28]http://photogallery.nrcs.usda.gov/
[29]Pevny, T., Bas, P., and Fridrich, J., “Steganalysis by Subtractive Pixel Adjacency Matrix,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 215-224, 2010.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top