跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.103) 您好!臺灣時間:2025/11/22 01:24
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:沈志益
研究生(外文):Chih-yi Shen
論文名稱:一個以JPEG為偽裝影像格式的安全偽裝術
論文名稱(外文):A Secure Steganographic Technique for JPEG Images
指導教授:陳志瀅
指導教授(外文):Chih-Ying Chen
學位類別:碩士
校院名稱:逢甲大學
系所名稱:通訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:78
中文關鍵詞:OutguessCalibrationJ-StegF5Chi-square攻擊偽裝分析偽裝術
外文關鍵詞:SteganographyF5J-StegCalibrationChi-square attackOutguessSteganalysis
相關次數:
  • 被引用被引用:3
  • 點閱點閱:334
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
影像偽裝術(image steganography),有別於密碼學直接將欲傳送的資料做加密(encryption),是將重要的訊息嵌入在另一張看似無異樣的數位影像之中再傳送,以提升通訊的隱蔽性。它的安全性取決於不可覺察以及不可偵測機密訊息之存在的程度。偽裝分析(steganalysis)則是一門偵測此類秘密通訊行為的科學。
JPEG影像是現今網際網路最廣為使用的儲存格式;而JPEG影像偽裝技術則是以JPEG格式作為偽裝影像,因此研發一套安全又實用有效的JPEG影像偽裝術是個相當有意義且迫切解決的議題。前此已提出的JPEG影像偽裝技術並不多,而且大多使用LSB翻轉的觀念,因而無法抵擋基於區塊效應改變量的偽裝偵測攻擊。
有鑒於上述之缺點,我們提出一個可以克服之方法,我們的想法為藉由修改儘可能少的像素便可嵌入儘可能多的訊息位元,作法是參考Chen、Pan與Tseng在2002年所提出的資訊隱藏方法,平均在一區塊中只需修改一個係數即可。如此一來,修改後的訊息會稀疏地分布在區塊中,可使得發生在區塊邊緣的統計失真大大地降低以及重複取代的特性明顯地減少。
根據實驗結果證明我們的想法及作法是對的而且具有下列的特性:
1. 使用目前最常見的JPEG影像儲存格式。
2. 具有高不可覺察性。
3. 可抵檔Chi-square統計偵測攻擊。
4. 可抵檔Calibration統計偵測攻擊。
5. 訊息嵌入容量較J-Steg、F5及Outguess等著名的JPEG偽裝軟體為高。
Image steganography, which differs from cryptography that directly encrypts the data transmitted, embeds important messages into a digital image that appears usual before transmission to improve the concealment of communication. Its security depends on the ability to bypass the awareness of others and to resist the detection of secret messages. Steganalysis is the art of detecting acts of secret communication.
The JPEG image format is currently the most widely used storage format in the Internet. JPEG image steganography applies the JPEG format as the cover image, thus to develop an efficient, safety and useful JPEG image steganography technology is a meaningful and urgent problem. There are only a few JPEG image steganography techniques formerly proposed, yet most utilize the LSB flipping concept, which cannot resist detection attacks based on the variations of block effects.
Observing the flaws mentioned above, we propose a method to remedy the problems. Our main concept is to embed as much message bits as possible while minimizing the number of modified bits. Our method is based on the data hiding method proposed by Chen, Pan and Tseng in 2002, and it only needs to adjust one coefficient of average in a block. In this way, the modified message will be sparsely distributed in the block, which significantly reduces statistical distortion that may occur at the block edges and also drastically diminishes the characteristics of repeating replacement.
Experiment results show that our concept is correct and has the following properties:
1. Applying the most commonly used image storage format, the JPEG format.
2. Possesses high undetectability.
3. Is capable of resisting the Chi-square statistical detection attack.
4. Is capable of resisting the Calibration statistical detection attack.
5. Higher embedding capacity when compared with several renowned JPEG steganographic software such as J-Steg, F5 and Outguess.
誌謝 I
中文摘要 II
ABSTRACT III
目錄 V
圖目錄 VII
表目錄 IX
第一章 緒論 1
1.1 研究動機與目的 1
1.2 論文架構 5
第二章 基本數位影像理論 6
2.1 數位影像格式 6
2.2 影像偽裝技術探討 7
2.2.1 空間域數位影像資料格式 8
2.2.2 頻率域數位影像資料格式 9
2.3 JPEG靜態影像壓縮 10
2.3.1 離散餘弦轉換 11
2.3.2 量化 12
2.3.3 可變長度編碼 14
2.4 影像品質的鑑定 18
第三章 相關文獻探討 20
3.1 植基於二元影像偽裝技術 20
3.1.1 矩陣編碼 20
3.1.2 CPT演算法 22
3.1.2.1 二元影像的資料隱藏法介紹 22
3.1.2.2 二元影像的資料隱藏步驟 24
3.2 植基於JPEG壓縮影像的相關偽裝技術 28
3.2.1 Kobayashi所提出的方法 28
3.2.2 Chang所提出的方法 29
3.2.3 JPEG-JSteg 29
3.2.4 F5 31
3.2.5 Outguess 32
3.3 資訊偽裝偵測與分析 33
3.3.1 Chi-square偵測攻擊 34
3.3.2 Calibration偵測攻擊 35
第四章 以JPEG為偽裝影像格式的安全偽裝技術 41
4.1 研究目的與分析 41
4.2 嵌入流程 42
4.3 萃取流程 48
第五章 實驗結果 50
5.1 實驗方法 50
5.2 安全性 51
5.2.1 不可覺察性 51
5.2.2 不可偵測性 55
5.2.2.1 Chi-square偵測結果 55
5.2.2.2 Calibration偵測結果 57
5.3 嵌入容量 60
5.4 實驗討論 63
第六章 結論 64
6.1 結論 64
6.2 未來研究方向 65
參考文獻 66
[1]A. Latham (1999) JPHIDE and JPSEEK [Online]. Available: http://linux01.gwdg.de/~alatham/stego.html
[2]A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proc. Information Hiding—3rd Int’l Workshop, Springer Verlag, 1999, pp. 61-76.
[3]A. Westfeld, “F5—A Steganographic Algorithm: High Capacity Despite Better Steganalysis,” Proc. 4th Int’l Workshop Information Hiding, Springer-Verlag, 2001, pp. 289-302.
[4]A. Westfeld (2001) F5 [Online]. Available: http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html
[5]C. C. Chang, T. S. Chen, L. Z. Chung, “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1, 2002, pp. 123-138.
[6]C. C. Chang and H. W. Tseng, “Steganography using JPEG-compressed images,” Proc. of IEEEComputer and Information Technology, Vol. 14, No. 16, Sept. 2004, pp. 12-17.
[7]C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Trans. On Image Processing, Vol. 8, No. 1, Jan 1999, pp. 58-68.
[8]D. Upham (1997) JPEG-JSteg [Online]. Available: http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz
[9]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – A Survey,” Proc. of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078.
[10]G. W. Wallace, “The JPEG Still Picture Compression Standard,” IEEE Trans. Consumer Electronics, Vol. 38, no. 1, 1992, pp. xviii-xxxiv.
[11]H. Farid, “Detecting Hidden Messages Using Higher-Order Statistical Models,” Proc. Int’l Conf. Image Processing, IEEE Press, 2002.
[12]I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, Vol. 6, No. 12, Dec 1997, pp. 1673-1687.
[13]ISO/IEC JTC1 10918-1, Information Technology – Digital Compression and Coding of Continuous – Tone Still Image: Requirements and Guidenlined, ITU-T Rec. T.81, 1994.
[14]ISO/IEC 15544-1, Information Technology – JPEG2000 Image Coding System – Part1: Core Coding System, 2000.
[15]J. Fridrich, M. Goljan, and D. Hogea, “Attacking the OutGuess,” Proc. ACM Workshop Multimedia and Security 2002, ACM Press, 2002.
[16]J. Fridrich, M. Goljan, and D. Hogea, “New Methodology for Breaking Steganographic Techniques for JPEGs,” Proc. SPIE Electronic Imaging Santa Clara, CA, Jan 2003, pp. 143-155.
[17]J. Fridrich, M. Goljan, and D. Hogea, “Steganalysis of JPEG Images: Breaking the F5 Algorithm,” Proc. 5th Int’l Workshop Information Hiding, Springer-Verlag, 2002.
[18]M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proc. IEEE, Vol. 86, No. 6, 1998, pp. 1064-1087.
[19]N. F. Johnson and S. Jajodia, “Steganalysis of Images Created Using Current Steganographic Software,” Proc. 2nd Int’l Workshop in Information Hiding, Springer-Verlag, 1998, pp. 273-289.
[20]N. Provos, “Defending Against Statistical Steganalysis,” Proc. 10th Usenix Security Symp., Usenix Assoc., 2001, pp. 323-335.
[21]N. Provos (2001) Outguess [Online]. Available: http://www.outguess.org/outguess-0.2.tar.gz
[22]N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Trans. Security & Privacy Magazine, vol. 1, no. 3, 2003, pp. 32-44.
[23]R. Crandall, “Some Notes on Steganography,” Posted on Steganography Mailing List, 1998. http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
[24]S. Lyu and H. Farid, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines,” Proc. 5th Int’l Workshop on Information Hiding, SpringerVerlag, 2002.
[25]T. Zhang and X. Ping, “A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms,” Proc. 8th ACM Symp. Applied Computing, ACM Press, 2003.
[26]W. Bender, D. Gruhl, and N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3&4, 1996, pp. 313-336.
[27]Y. Noguchi, H. Kobayashi, H. Kiya, “A Method of Extracting Embedded Binary Data from JPEG Bitstreams Using Standard JPEG Decoder,” Proc. of IEEE International Conference on Image Processing, Vancouver, BC, Canada, Vol. 1, Sept 2000, pp. 577-580.
[28]Y. Y. Chen, H. K. Pan, and Y. C. Tseng, “A Secure Data Hiding Scheme for Binary Images,” IEEE Trans. on Communications, Vol. 50, No. 8, Aug 2002, pp. 1227-1231.
[29]張真誠、黃國峰、陳同孝,電子影像技術,旗標電腦圖書,民國九十二年。
[30]陳同孝、張真誠、黃國峰,數位影像處理技術,旗標電腦圖書,民國九十二年,ISBN 957-22-3553-2。
[31]賴溪松、韓亮、張真誠,近代密碼學及其應用,松崗電腦資料股份有限公司,民國八十九年。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top