跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/06 20:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:劉志威
研究生(外文):Luo, Chih-Wei
論文名稱:基於多基底轉換系統與像素差值的鑽石編碼嵌入法
論文名稱(外文):Data Embedding Using Pixel Value Differencing And Diamond Encoding With Multiple-Base Notational System
指導教授:洪維恩洪維恩引用關係
指導教授(外文):Hong, Wien
口試委員:廖惠雯張循鋰
口試日期:2012-06-19
學位類別:碩士
校院名稱:育達商業科技大學
系所名稱:資訊管理所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:50
中文關鍵詞:資訊隱藏PVDDiamond Encoding
外文關鍵詞:Data hidingDiamond EncodingPixel Value differencing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:262
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本論文我們將提出一個新的資訊隱藏方法,用以改進PVD相關技術。由於人類對於影像邊緣容忍度較大,因此PVD的方法是計算兩兩像素差,把像素差異較大的地方嵌入較多的資訊,差異較小的地方嵌入較少的資訊,因此PVD的方法就符合人類視覺的原理。本論文將Diamond Encoding(鑽石編碼嵌入法)運用在PVD嵌入中,同時我們改善了鑽石編碼嵌入法在溢位處理上較不佳的方法,我們重新找到一組最佳像素來解決溢位的處理,並且引用了多基底轉換的技術,使得我們在嵌入鑽石編碼法的時後,能夠有效的轉換基底,不會造成過多的資訊因轉換而流失容量。我們提出的方法不但比先前PVD的方法達到更好的影像品質外,也能夠有效的避開一些偵測法,使得嵌入的資訊在傳送上可以更加安全,更不容易被他人察覺。
We propose a new data hiding method that adaptively embeds data into pixel pairs using the diamond encoding (DE) technique. Because the human eyes tolerate more changes in edge and texture areas than in smooth areas, and pixel pairs in these areas often possess larger differences, the method exploits pixel value differences (PVD) to estimate the base of digits to be embedded into pixel pairs. Pixel pairs with larger differences are embedded with digits in larger base than those pixel pairs with smaller differences to maximize the payload and image quality. Two sophisticated pixel pair adjustment processes are provided to maintain the division consistency and to eliminate the overflow/underflow problem. Experimental results reveal that the proposed method offers better embedding performance compared to prior PVD-based works in terms of payload and image quality.
論文指導教授推薦書................................................ i
論文口試委員審定書................................................ ii
國科會授權書..................................................... iii
誌謝............................................................ iv
摘要............................................................ v
Abstract....................................................... vi
目錄............................................................ vii
圖目錄.......................................................... ix
表目錄.......................................................... x
第一章 緒論...................................................... 1
1.1研究背景..................................................... 1
1.2研究動機..................................................... 2
1.3研究目的..................................................... 2
第二章 文獻探討.................................................. 3
2.1 資訊隱藏簡介................................................. 3
2.2 偽裝法(Steganography)....................................... 4
2.3 嵌入技術.................................................... 5
2.3.1最低位元嵌入法(LSB Replacement)............................. 5
2.3.2最佳像素調整法(Optimal Pixel Adjustment Process)............ 6
2.3.3座標式修改嵌入法(Exploiting Modification Direction)......... 7
2.3.4鑽石編碼嵌入法(Diamond Encoding)............................ 9
2.4人類視覺系統(Human Visual System, HVS)........................ 11
2.4.1像素值差異法(Pixel-Value Differencing)...................... 11
2.4.2模數函數之像素值差異法(Modulus Function- Pixel-Value
Differencing).................................................. 12
2.4.3多基底轉換系統(Multiple-Base Notational System)............. 12
2.4.4 Yang等學者的方法(EA-PVD)................................... 13
第三章 研究方法.................................................. 14
3.1 多基底轉換系統(Multiple-Base Notational System).............. 14
3.2 區域(Divisions)的分類........................................ 16
3.3 Overflow and Underflow 的調整............................... 16
3.4 自適應區劃分調整............................................. 19
3.5 嵌入步驟.................................................... 20
3.6 取值步驟.................................................... 21
3.7範例......................................................... 22
第四章 實驗結果.................................................. 26
4.1 比較不同載量下的影像品質...................................... 27
4.2我們的方法與 DE的比較.......................................... 30
4.3 各PVD的比較................................................. 32
4.4 Steganalysis偵測............................................ 34
4.5 Histograms 偵測............................................. 35
第五章 結論...................................................... 37
參考文獻........................................................ 38


[1]A. Cheddad, J. Condell, K. Curran, and P.M. Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, 2010
[2]C.C Chang, J.Y.Hsiao, and C.S. Chan, “Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, vol. 36, on. 7, pp.1583-1595, 2003.
[3]C.H. Yang, C.Y. Weng, S.J. Wang, H.M. Sun, “Adaptive Data Hiding in Edge Areas of Image with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security vol. 3, no. 3, pp.488-497, 2008.
[4]C.K. Chan, and L.M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
[5]C.M. Wang, N.I Wu, C.S Tsai, and M.S. Hwang, “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function,” Journal of Systems and Software, vol. 81, on. 1, pp.150-158, 2008.
[6]D.C. Lou, N.I. Wu, C.M. Wang, Z.H. Lin, C.S. Tsai, “A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity,” Journal of Systems and Software, vol. 83 pp.1236-1248
[7]D.C Wu and W.H. Tsai, “A Stegoanographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, vol. 24,pp.1613-1626, 2003
[8]J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, on. 5, pp.285-287, 2006.
[9]N. Provos, and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security and Privacy Magazine, vol. 1, no. 3, pp. 32-44, 2003.
[10]P. Fabien, A.R.J. Anderson, and M.G. Kuhn, “Information Hiding-A Survey, ”Proceedings of IEEE, Vol. 87, No. 7, Jul. 1999, pp. 1062-1078
[11]R.M. Chao, H.C. Wu, C.C. Lee, and Y.P. Chu, “A Novel Image Data Scheme with Diamond Encoding,” EURASIP Journal on Information Security.doi:10.1155/2009/658047,Article ID 658047.
[12]R.Z. Wang, C.F. Lin, and J.C. Lin, “Image Hiding by Optimeal LSB Substitution and Genetic Algorithm, ”Pattern Recognition, vol. 34, pp. 671-683, 2001.
[13]W. Hong, T.S. Chen, and C.W. Shiu, “A Minimal Euclidean Distance Searching Technique for Sudoku Steganography,” in Proceedings of International Symposium on Information Science and Engineering, vol. 1, pp. 515-518, 2008.
[14]X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
[15]X. Zhang, and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters vol. 12, no. 1, pp.67-70, 2005.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top