跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/06 20:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:邱閔彥
研究生(外文):Min-Yen Chiu
論文名稱:利用機密資料切割與影像像素差值之高品質資料隱藏技術分析
論文名稱(外文):The Analysis of the Steganographic Technique with High Image Quality Using Secret Data Division and Pixel Value Differencing
指導教授:廖俊鑑廖俊鑑引用關係
指導教授(外文):Jiun-Jian Liaw
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊與通訊系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:中文
論文頁數:60
中文關鍵詞:資料隱藏機密資料切割模數運算像素差值影像品質
外文關鍵詞:Image qualityModulus operationPixel value differencingSteganographySecret data division
相關次數:
  • 被引用被引用:0
  • 點閱點閱:407
  • 評分評分:
  • 下載下載:29
  • 收藏至我的研究室書目清單書目收藏:0
本論文提出一個使用機密資料切割技術(secret data division)與像素差值(pixel value differencing)為基礎,並搭配模數運算(modulus operation)改善偽裝影像品質的資料隱藏方法。
在資料隱藏(Steganography)之中,隨著藏入資料的增加,對原始影像(cover-image)所造成的失真程度也會越來越嚴重。因此,如果考慮到藏入容量,就得犧牲影像品質;如果顧慮到影像品質,藏入的資料卻又相對減少。在本論文中,我們基於機密資料切割技術與像素差值的概念,在不降低藏入容量的情況下,利用切割的技術減少藏入資料時所造成的失真,並且搭配模數運算藏入資料,藉此提升偽裝影像(stego-image)的品質。如此一來,我們可以在維持一定水準影像品質的前提之下,藏入更多的資料量。
首先,我們先將原始影像切割成若干個互不重疊的區塊,而每一個區塊是由兩個相鄰像素所構成的。藉由計算區塊內兩個像素之間的差值,決定該區塊可藏入的資料量。接著我們將欲藏入區塊中的機密資料(secret data)依照適當的方式切割成兩部分,並且利用模數運算將切割後的機密資料,分別藏入區塊內的兩個像素之中。透過機密資料的切割與模數運算這兩個動作,來提升偽裝影像的品質。
實驗結果部分,藉由統計分析發現,和其他一樣以像素差值為基礎的資料隱藏方法比較後,我們的方法在像素均方差(mean squared error)部分有較佳的表現,證明我們提出的方法確實能有效縮小藏入資料時所造成的失真。而在影像實驗結果方面,在不降低藏入容量的前提下,我們所提出的方法確實能有效提升藏完資料後的偽裝影像品質,相較於其他方法,我們提出的方法在偽裝影像品質部分擁有較小的標準差,這表示我們所提出的方法不易受不同影像性質的影響,適用於更多類型的影像之中。
We propose a steganographic method which is using secret data division and pixel value differencing in this study. It can increase the image quality of the stego-image.
In the filed of steganography, hiding a lot of secret data into the cover-image will cause serious distortion. In other words, the hiding capacity is limited by maintaining the image quality. In this study, we proposed a method using separating techniques and pixel value differencing to solve this problem. By our proposed method, we obtain better effect on the image quality without making any sacrifices for the hiding capacity.
Firstly, we divide the cover-image into several non-overlapping blocks, and each block is composed of two contiguous pixels. We calculate the number of hidden bits based on the difference of these two pixels in a block. The secret data is separated into two parts. We use modulus operation to embed these two parts of secret data into the two pixels, respectively. By separating the secret data and modulus operation, we can reduce the distortion and increase the image quality of the stego-image.
In the experiment result, by computing the statistics of mean squared error, our proposed method has better performance than other methods which are also based on pixel value differencing. It proves that our proposed method can reduce the distortion indeed. Besides, our proposed method can increase the image quality of the stego-image without making any sacrifices. Comparing with others method, our proposed method has more stable performance of the image quality of stego-image than other methods. It means that our proposed method is suitable for more different kinds of images than other methods.
目錄
第一章、緒論 1
1.1 研究背景 1
1.2 資訊隱藏技術介紹 6
1.3 資料隱藏的應用與重要性 9
1.4 研究動機與目的 10
1.5 論文架構 11
第二章、相關文獻 15
2.1 MF 16
2.2 PVD 18
2.3 PVDLSB 20
第三章、方法描述 25
3.1 藏入程序 26
3.1.1 低階層 27
3.1.2 高階層 31
3.2 擷取程序 33
3.2.1 低階層 34
3.2.2 高階層 34
第四章、方法分析與實驗結果 39
4.1 統計分析 40
4.2 影像實驗 42
第五章、結論 55
參考文獻 56



圖目錄
圖 1. 資料隱藏技術的分類 12
圖 2. 數位浮水印 12
圖 3. 灰階影像 13
圖 4. 像素值10的二進位表示法 13
圖 5. LSB交換法 14
圖 6. 範圍表 23
圖 7. 範圍表的階層區分 24
圖 8. 系統流程圖 36
圖 9. Zig-Zag之區塊切割方式 37
圖 10. 不同切割方式的範圍表 38
圖 11. PVD與SDDPVD之MSE曲線圖 44
圖 12. PVDLSB與SDDPVD之MSE曲線圖 44
圖 13. PVD與SDDPVD,在子範圍 之MSE比較 46
圖 14. PVD與SDDPVD,在子範圍 之MSE比較 46
圖 15. PVD與SDDPVD,在子範圍 之MSE比較 47
圖 16. PVD與SDDPVD,在子範圍 之MSE比較 47
圖 17. PVD與SDDPVD,在子範圍 之MSE比較 48
圖 18. PVD與SDDPVD,在子範圍 之MSE比較 48
圖 19. PVDLSB與SDDPVD,在子範圍 之MSE比較 49
圖 20. PVDLSB與SDDPVD,在子範圍 之MSE比較 49
圖 21. PVDLSB與SDDPVD,在子範圍 之MSE比較 50
圖 22. PVDLSB與SDDPVD,在子範圍 之MSE比較 50
圖 23. PVDLSB與SDDPVD,在子範圍 之MSE比較 51
圖 24. 實驗原始影像 52



表目錄
表 1. PVD與提出的方法之MSE統計分析表 45
表 2. PVDLSB與提出的方法之MSE統計分析表 45
表 3. PVD與提出的方法之藏入容量與PSNR比較表 53
表 4. PVDLSB與提出的方法之藏入容量與PSNR比較表 53
表 5. PVD、PVDLSB與提出的方法之標準差比較表 54
[1] M. E. Smid, and D. K. Branstad, “Data Encryption Standard: past and future,” Proceedings of the IEEE, Vol. 76, no. 5, May 1988, pp. 550-559.
[2] A. Sinha and K. Singh, “A Technique for Image Encryption Using Digital Signature,” Optics Communications, April 2003, Vol. 218, Issue 4-6, pp. 229–234.
[3] W. C. Kuo, and M. Y. Chen, “A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem,” Information Technology and Applications, Vol. 2, December 2005, pp. 576-579.
[4] R. J. Anderson, and, F. A. P. Petitcolas, “On the Limits of Steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, no. 4, May 1998,pp. 474-481.
[5] R. Z. Wang and Y. S. Chen, “High-payload Image Steganography Using Two-way Block Matching,” IEEE Signal Processing Letters, March 2006, Vol. 13, Issue 3, pp.161–164.
[6] R. Z. Wang and Y. D. Tsai, “An Image-hiding Method with High Hiding Capacity Based on Best-block Matching and K-means Clustering,” Pattern Recognition, Feb. 2007, Vol. 40, Issue 2, pp. 398–409.
[7] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings of the IEEE, 1999, Vol. 87, No. 7, pp. 1079–1107.
[8] G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A State-of-the-art Overview,” IEEE Signal Processing Magazine, 2000, Vol. 17, No. 5, pp. 20–46.
[9] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – a survey,” Proceedings of the IEEE, 1999, Vol. 87, No. 7, pp. 1062–1078.
[10] F. Y. Shih and Y. T. Wu, “Robust Watermarking and Compression for Medical Images Based on Genetic Algorithms,” Information Sciences, Oct. 2005, Vol. 175, Issue 3, pp. 200–216.
[11] J. L. Liu, D. C. Lou, M. C. Chang, and H. K. Tso , “A Robust Watermarking Scheme Using Self-reference Image,” Computer Standards & Interfaces, January 2006, Vol. 28, Issue 3, pp. 356–367.
[12] S. P. Maity, M. K. Kundu, and T. S. Das , “Robust SS Watermarking with Improved Capacity,” Pattern Recognition Letters, Feb. 2007, Vol. 28, Issue 3, pp. 350–356
[13] D. Yu, F. Sattar, and B. Barkat, “Multiresolution Fragile Watermarking Using Complex Chirp Signals for Content Authentication,” Pattern Recognition, May 2006, Vol. 39, Issue 5, pp. 935–952.
[14] S. H. Liu, H. X. Yao, W. Gao, and Y. L. Liu, “An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-pairs,” Applied Mathematics and Computation, Feb. 2007, Vol. 185, Issue 2, pp. 869–882.
[15] S. Suthaharan, “Fragile Image Watermarking Using a Gradient Image for Improved Localization and Security,” Pattern Recognition Letters, Dec. 2004, Vol.25, Issue 16, pp. 1893–1903.
[16] D. Kundur and D. Hanzinakos, “Towards a Telltale Watermarking Technique for Tamper-proofing,” Proceedings of IEEE International Conference on Image Processing, Oct. 1998, Vol. 2, pp. 409–413.
[17] G. J. Simmons, “The Prisoner''s Problem and the Subliminal Channel. “ In Proceedings of Crypto ''83, 1983, pp. 51-67.
[18] C. C. Chang, J. C. Chuang, and Y. P. Lai, “Hiding Data in Multitone Images for Data Communications,” IEE Proceedings of Image and Signal Processing, 2004, Vol. 151, No. 2, pp. 137–145.
[19] S. J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, May 2005, Vol. 164, Issue 1, pp. 99–116.
[20] C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial Domain System,” IEEE Transactions on Information Forensics and Security, 2008, Vol. 3, Issue 3, pp. 488–497.
[21] P. L. Lin, “Robust Transparent Image Watermarking System with Spatial Mechanisms,” Journal of Systems and Software, 2000, Vol. 50, No. 2, pp. 107–116.
[22] S. L. Li, K. C. Leung, L. M. Cheng, and C. K. Chan, “A Novel image-hiding Scheme Based on Block Difference,” Pattern Recognition, 2006, Vol. 39, No. 6, pp. 1168–1176.
[23] J. J. Liaw, Y. S. Liao, and L. H. Chang, “Improvements of Blind Data Hiding Scheme in Digital Images Based on Self-reference for Lossy Compression,” WSEAS Transactions on Computers, May 2007, Vol. 6, Issue 5, pp.779-784.
[24] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-scale Images,” IEEE Multimedia, 2001, Vol. 8, No. 4, pp. 22–28.
[25] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, 2005, Vol. 14, No. 2, pp. 253–266.
[26] C. K. Chan, and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, no. 3, March 2004, pp. 469–474.
[27] D. C. Lou, H. K Tso, and J. L. Liu, “A Copyright Protection Scheme for Digital Images Using Visual Cryptography Technique,” Computer Standards & Interfaces, 2007, Vol. 29, No.1, pp. 125–131.
[28] F. Y. Shih and S. Y. T. Wu, “Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition, Apr. 2003, Vol. 36, Issue 4, pp. 969–975.
[29] J. Haung, Y. Q. Shi, and Y. Shi, “Embedding Image Watermarks in DC Components,” IEEE Transactions on circuits and systems for video technology, Sep. 2000, Vol. 10, No. 6, pp. 974–979.
[30] C. C. Chang, and H. W. Tseng, “Data Hiding in Images by Hybrid LSB Substitution,” Third International Conference on Multimedia and Ubiquitous Engineering, June 2009, pp. 360–366.
[31] C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal Least Significant Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, no. 7, July, 2003, pp. 1583–1595.
[32] C. C. Thien and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus function,” Pattern Recognition, Dec. 2003, Vol. 36, Issue 12, pp. 2875–2881.
[33] C. C. Chang, Y. S. Hu, and T. Z. Lu, “A Watermarking-based Image Ownership and Tampering Authentication Scheme,” Pattern Recognition Letters, Apr. 2006, Vol. 27, Issue 5, pp. 439–446
[34] D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-value differencing,” Pattern Recognition Letters, Jun. 2003, Vol. 24, Issue 9-10, pp. 1613–1626.
[35] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods,” IEE Proceedings: Vision, Image and Signal Processing, Oct. 2005, Vol. 152, Issue 5, pp. 611–615.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 〈荀子由智成德理論的重建與檢討〉,周天令,孔孟學報,84期 ,2006年09月
2. 〈先秦儒家性情觀之演進及其文化闡釋〉,馬育良,孔孟月刊,39卷6期,2001年02月
3. 〈孟子「四端」說與「情」〉,馬育良,孔孟月刊,39卷12期,2001年08月
4. 〈論荀子的禮樂觀〉,韓德民,中國文化月刊,225期 ,1998年12月
5. 〈「荀子」書中孔子形象析論─兼論孟、荀對孔子認知之同異〉,柯金木,孔孟學報,76期, 1998年09月
6. 〈周易大象傳「君子」哲學試探〉,蕭麗芬,孔孟月刊 ,40卷4期,2001年12月
7. 〈性情論話語背景下的《中庸》〉,馬育良,孔孟學報,83期,2005年09月
8. 〈荀子性情觀及相關思想之討論〉,馬育良,孔孟學報,81期 ,2003年09月
9. 〈荀子禮樂教育思想之研究〉,蘇嫈雰,哲學與文化,29卷7期,2002年07月
10. 〈《詩經》中的「君子」身分〉,林葉連,輔仁國文學報 ,增刊,2006年01月
11. 〈論《樂記》之樂以成德之教:當代新儒學的詮釋〉,林苗,鵝湖,
12. 〈孔子對君子和小人的辨析〉,蔣勵材,建設 ,25卷6期 ,1976年11月
13. 〈論孔子的「君子」概念〉,林義正,國立臺灣大學文史哲學報,33期 ,1984年12月
14. 〈《詩經》中「君子」的事例及言行特質〉,林葉連,興大中文學報,19 期,2006年06月
15. 〈禮樂合論與禮的內化〉,蔣義斌,宗教哲學,32 期,2005年03月