跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/06 20:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:劉功勤
研究生(外文):LIU,KUNG-CHIN
論文名稱:植基於卡方攻擊之像素差值藏密偵測技術之研究
論文名稱(外文):Study of the Pixel-Value Differencing Steganalysis Based on Chi-Square Attack
指導教授:劉江龍劉江龍引用關係
指導教授(外文):LIU,CHIANG-LUNG
口試委員:潘勤強賴泰宏劉江龍
口試委員(外文):PAN,CHIN-CHIANGLAI,TAI-HUNGLIU,CHIANG-LUNG
口試日期:2019-05-09
學位類別:碩士
校院名稱:國防大學理工學院
系所名稱:電子工程碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:46
中文關鍵詞:資訊隱藏資訊隱藏偵測像素值差異藏密技術卡方統計
外文關鍵詞:steganographysteganalysisPixel-Value Differencing steganographyChi-Square statistics
相關次數:
  • 被引用被引用:0
  • 點閱點閱:222
  • 評分評分:
  • 下載下載:2
  • 收藏至我的研究室書目清單書目收藏:0
資訊隱藏技術可以將重要資料隱藏在數位影像中,以進行秘密通信;然而敵人也可以將秘密訊息嵌入在掩護影像中,以遂行危害國家安全的不法行為。因此,時至今日,資訊隱藏偵測技術的研究比資訊隱藏技術的發展更為重要。
資訊隱藏技術中之像素差值藏密法(PVD)透過調整像素對間之差值以進行秘密訊息之嵌入,其不但藏密容量較最低位元取代藏密法(LSB)多,同時也能維持良好的影像品質。雖然PVD能避免被RS偵測技術所攻擊,但是其藏密影像之像素差值直方圖會呈現不正常之分佈,本論文即基於此藏密特徵,提出基於卡方統計之像素差值藏密法的偵測技術,以進行PVD之偵測。
本研究採取不同自由度之像素差值對進行實驗,以獲取在不同門檻值之偵測正確率。實驗結果顯示,在自由度為10至14時,偵測正確率(AC)均可達到 80%以上,且在自由度12時,偵測正確率的表現最佳(AC = 84.69%)。其顯示,本文所提出之卡方偵測技術可有效偵測PVD藏密影像,為一有效且實際之PVD藏密偵測工具。

Information hiding techniques can embed important data in digital images for secret communication. However, the enemy also can embed the secret message in the cover images to perform illegal behaviors which may damage the national security. Therefore, the study of steganalysis is more important than the development of steganography for the time being.
The Pixel-Value Differencing steganography (PVD) embeds the secret information in digital images by adjusting the difference of pixel value between the pixel pairs. The PVD can not only provide more hiding capacity than those provided by Least-Significant-Bit replacement methods but also maintain a good image quality. Although the PVD can avoid being detected by the RS steganalysis, the histogram of the pixel-value differences poses an abnormal distribution. Based on this hiding characteristic, this thesis proposes a PVD steganalysis based on Chi-Square statistics.
Different degrees of freedom were adopted in this study to be tested for obtaining various detection accuracies (ACs) under different setting of thresholds. Experimental results show that the detection accuracies are all above 80% when the degrees of freedom are set as 10 to 14 while the accuracy is the best (AC = 84.69%) when the degree of freedom is set as 12. It means that the proposed Chi-Square based method is an efficient and practical steganalytical tool for detection of PVD steganography.

誌謝 ii
摘要 iii
ABSTRACT iv
目錄 v
表目錄 vii
圖目錄 viii
1.緒論 1
1.1研究背景 1
1.2研究動機 3
1.3研究目的及方法 4
1.4論文架構 6
2.文獻探討 7
2.1資訊隱藏技術發展 7
2.2卡方偵測技術 10
2.3像素值差異藏密技術 14
2.3.1像素差值量化 14
2.3.2訊息嵌入 16
2.3.3訊息萃取 18
2.4效能評估 19
3.基於卡方統計之像素差值藏密偵測技術 21
3.1 PVD藏密特徵 21
3.2像素差值直方圖之卡方統計 24
3.3偵測流程 25
4.實驗結果與討論 26
4.1實驗環境 26
4.2不同自由度下之門檻值實驗 27
4.2.1自由度2至8實驗 28
4.2.2自由度10至14實驗 32
4.2.3自由度16至20實驗 35
4.3實驗討論 38
5.結論及未來研究方向 40
5.1結論 40
5.2未來研究方向 41
參考文獻 42
自傳 46

[1]Bender, W., Gruhl, D., Morimoto, N., and Lu, A., “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996.
[2]Zhang, X. and Wang, S., “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, No. 3, pp. 331-339, 2004.
[3]http://www.usatoday.com/life/cyber/tech/2001/10/17/bin-laden-site.htm (2013.3.15)
[4]Shih, F. Y. and Wu, Scott. Y. T., “Combinational Image Water Marking in The Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, 2003.
[5]Chang, C. C., Chen, T. S., and Chung, L. Z., “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1-2, pp. 123-138, 2002.
[6]Joo, S., Suh, Y., Shin, J., and Kikuchi, H., “A New Robust Watermark Embedding into Wavelet DC Components,” ETRI Journal, Vol. 24, No. 5, pp. 401-404, 2002.
[7]Lee, W. B. and Chen, T. H., “A Public Verifiable Copy Protection Technique for Still Images,” Journal of Systems and Software, Vol. 62, No. 3, pp. 195-204, 2002.
[8]Alturki, F. and Mersereau, R., “Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,” Proceedings of IEEE International Conference on Image Processing, Thessaloniki, Greece, pp. 542-545, 2001.
[9]Fridrich, J., Goljan, M., and Rui, D., “Detecting LSB Steganography in Color, and Gray-scale Images,” Magazine of IEEE Multimedia Special Issue on Security, Vol. 4, No. 4, pp. 22-28, 2001.
[10]Westfeld, A. and Pfitzmann, A., “Attacks on Steganographic Systems,” Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, pp. 61-75, 1999.
[11]Mielikeainen, J., “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006.
[12]Wu, D. C. and Tsai, W. H., “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003.
[13]Joo, J. C., Lee, H. Y., Bui, C. N., Yoo, W. Y., and Lee, H. K., “Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function,” Proceedings of the 9th Pacific Rim Conference on Multimedia:Advances in Multimedia Information Processing, Tainan, Taiwan, pp. 476-485, 2008.
[14]Joo, J. C., Kim, K.S., and Lee, H. Y., “Steganalysis Defeating the Steganography Using Pixel-Value Differencing and Modulus Function,” Optical Engineering, Vol. 49, No. 7, pp. 1-11, 2010.
[15]Sabeti, V., Samavi, S., Mahdavi, M., and Shirani, S., “Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks,” Pattern Recognition, Vol. 43, No. 1, pp. 405-415, 2010.
[16]劉江龍、劉興漢、李翊豪,“可偵測使用模數運算像素值差異藏密法之偵密技術”,第20屆國防科技學術研討會,桃園,台灣,第631-637頁,2011年11月18日。
[17]Zaker, N. and Hamzeh, A., “A Novel Steganalysis for TPVD Steganographic Method Based on Differences of Pixel Difference Histogram,” Multimedia Tools and Applications , Vol.58,No.1,pp.147-166,2012.
[18]劉江龍、劉興漢、李翊豪,“適用於三向型像素值差異藏密法之偵密技術”,第二屆航空技術學術研討會,高雄,台灣,第221-228頁,2012年9月21日。
[19]Andreas Westfeld., and AndreasPfitzmann., “Attacks on Steganographic Systems” Proceedings of the Third International Workshop on Information Hiding , pp. 61-76, 1999. ISBN: 3-540-67182-X.
[20]Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Information hiding - a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999.
[21]林志麟,“植基於影像統計特徵分析之資訊隱藏偵測技術研究”,博士論文,國防大學理工學院國防科學研究所,桃園,台灣,2008年7月31日。
[22]Fridrich, J., Goljan, M., and Soukal, D., “Higher-order statistical steganalysis of palette images,” Proceedings of SPIE: Electronic Imaging, Santa Clara, CA, pp. 178-190, Jan. 2003.
[23]Fridrich, J., and Pevny, T., “Multiclass Blind Steganalysis for JPEG Images,” Proceedings of SPIE Electronic Imaging, Photonics West, Jan. 2006.
[24]Farid, H. “Detecting Hidden Messages Using Higher-order Statistical Models,” Proceedings of 2002 International Conference on Image Processing, Rochester, NY, pp. 905-908, Sept. 2002.
[25]Goljan, M., Fridrich, J., and Holotyak, T. S., “New Blind Steganalysis and Its Implications,” Proceedings of SPIE Electronic Imaging, Photonics West, Jan. 2006.
[26]Lie, W.-N., and Lin, G.-S., “A Feature-based Classification Technique for Blind Image Steganalysis,” IEEE Transactions on Multimedia, vol. 7, no. 6, pp. 1007-1020, Dec. 2006.
[27]Provos, N., and Honeyman, P., “Detecting Steganographic Content on the Internet,” Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2002
[28]https://zh.wikipedia.org/wiki/ROC (2018.5.20)
[29]https://www.mathworks.com/products/matlab.html(2019.3.28)
[30]https://www.agents.cz/boss/BOSSFinal/index.php?mode=VIEW&tmpl=materials (2018.5.20)

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊