跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.81) 您好!臺灣時間:2025/02/13 08:52
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:李振杰
研究生(外文):Chen-Chieh Lee
論文名稱:二元影像非失真壓縮與加密方法之研究
論文名稱(外文):A Study of Lossless Compression and Encryption Scheme for Large Binary Image
指導教授:李維斌李維斌引用關係
指導教授(外文):Wei-Bin Lee
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:48
中文關鍵詞:影像安全影像加密掃描語言跑長度壓縮
外文關鍵詞:image securityrun-length compressionSCAN languageimage encryption
相關次數:
  • 被引用被引用:0
  • 點閱點閱:126
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0

當透過公開網路傳送重要資訊時,這些重要的資訊必須被保護,而加密對於保護秘密資料是一個很好的技術也是目前一般常用的方法,然而傳統的密碼學技術並不適合直接應用在數位影像之中,主要的原因是因為數位影像的資料與文字型態的資料有二個不同的差異性,第一個主要的差異在於數位影像的資料量相較於文字型態的資料量大得許多,而另一個主要的差異性在於當數位影像在解密時能夠允許些許的失真,而文字資料不能,因此有必要針對影像設計新的加密的方法。在本論文中對於二元影像安全上的問題我們根據影像的特性提出有效的解決方法,首先利用二維跑長度編碼(two-dimensional run-encoding)的技術對二元影像作壓縮的動作,然後再使用掃描樣板(Scan Pattern)與翻轉位元對壓縮後的資料作加密的動作,因此我們的架構不僅有高安全性與低時間複雜度,同時還具有高壓縮率的特性。


Important information must be protected when transmitting through public network environments. Encryption is a good technique for protecting secret information and is also a general method. However the traditional cryptology techniques are not directly suitable to deal with digital images because there are two main differences between textual data and image data. One difference is that the size of image data is much greater than the size of textual data. The other difference is that the decrypted image allows little distortion. Therefore, it is necessary that proposes a new digital image encrypted scheme. In this thesis, we propose an efficient solution for the problem of the security of binary images according to the properties of digital images. We utilize a two-dimensional run-encoding (2DRE) technique to compress binary images, and then use scan patterns and flipping bits on it. Hence, our scheme not only has high security and a lower time complexity but also has a good compression ratio.


Chapter 1 Introduction ................................................... 1
1.1 Background and Motivation .......................................... 1
1.2 Previous Researches ................................................ 1
1.3 Discovery Problems and Turning Point................................ 2
1.4 Organization of Thesis.............................................. 6
Chapter 2 Related Theories ............................................... 7
2.1 Bit Plane of a Gray-Level Image .................................... 8
2.2 Quadtree ........................................................... 11
2.3 Two-Dimensional Run-Encoding (2DRE) ................................ 13
2.4 Chung-Chang’s Scheme .............................................. 17
Chapter 3 Lossless Compressed and Encrypted Binary Images ................ 24
3.1 Compression of a Binary Image ...................................... 24
3.2 Encryption of the Compressed Binary Image .......................... 25
Chapter 4 Experimental Results and Security Analysis ..................... 29
4.1 Experimental Results................................................ 29
4.2 Security Analysis .................................................. 31
Chapter 5 Conclusions and Future Researches .............................. 33
References................................................................ 35
誌謝...................................................................... 39
Vita...................................................................... 40


[1] Barni, M., Bartolimi, F., Cappellini, V., and Piva, A., “A DCT-domain system for robust image watermarking,” Signal Processing, Vol. 66, No. 3, pp. 357-372, May, 1998.[2] Bourbakis, N., “A language for efficient accessing of a 2D array,” IEEE Workshop on LFA, Singapore, pp. 52-58, 1986.[3] Bourbakis, N. and Alexopoulos, C., “Picture data encryption using SCAN patterns,”Pattern Recognition, Vol. 25, No. 6, pp. 567-581, 1992.[4] Chang, Henry K. C. and Liu, J. L., “A linear quadtree compression scheme for image encryption,” Signal Processing of Image Communication, Vol. 10, pp. 279-290, Sep. 1997.[5] Chang, K. C. and Liu, J. L., “An image encryption scheme based on quadtreecompression scheme,” Proceedings of Internat. Comput. Symp., Taiwan, pp. 230-237, 1994.[6] Chang, C. C., Hwang, M. S., and Chen, T. S., “A new encryption algorithm for image cryptosystems,” The Journal of Systems and Software, Vol. 58, pp. 83—91, 2001.[7] Chen, T. S., Chang, C. C., and Hwang, M. S., “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, pp. 1485—1488, Oct. 1998.[8] Chung, K. L. and Chang, L. C., “Large encrypting binary images with highersecurity,” Pattern Recognition Letters, Vol. 19, No. 5-6, pp. 461-468, April 1998.[9] Clarke, R. J., “Digital compression of still images and video,” Academic Press, 1995.[10] Cox, I. J., Killian, J, Leighton, F. T., and Shamoon, T., “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1678, Dec. 1997.[11] ElGamal, T., “A public-key cryptosystem and a signature scheme based on discrete logarithms,” Advances in Cryptology: Proceedings of CRYPTO 84, pp. 10-18, Springer-Verlag, 1985.[12] ElGamal, T., “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transaction on Information Theory, Vol. IT-31. No. 4, pp. 469-472, 1985.[13] Friedman, G. L., “The trustworthy digital camera: restoring credibility to the photographic image,” IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905-910, Nov. 1993.[14] Gonzalez, R. C. and Woods, R. E., “Digital image processing,” Addison Wesley, 1992.[15] Hsieh, M. S., Tseng, D. C., and Huang, Y. H., “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,” IEEE Transactions on Industrial Electrons, Vol. 48, pp. 875-882, Oct. 2001.[16] Hsu, C. T. and Wu, J. L., “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, Vol. 8, No. 1, pp. 56-68, Jan. 1999.[17] Hsu, C. T. and Wu, J. L., “Multiresolution watermarking for digital images,” IEEE Transactions on Circuit and System-II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp. 1097-1101, Aug. 1998.[18] Hwang, M. S., Chang, C. C. and Hwang, K. F., “A watermarking technique based on one-way hash functions,” IEEE Transactions on Consumer Electronic, Vol. 45, no 2, pp. 286-294, May 1999.[19] Kou, W., “Digital image compression algorithms and standards,” Kluwer Academic Publishers, Second Printing, 1995.[20] Lee, Y. K. and Chen, L.H., “High capacity image steganographic model,” IEE Proceedings of Vision, Image and Signal Processing, Vol. 147, pp. 288—294, June 2000.[21] Lou, D. C. and Liu, J. L. “Fault resilient and compression tolerant digital signature for image authentication,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 31-39, Feb. 2000.[22] Podilchuk, C. I. and Zeng, W., “Image-adaptive watermarking using visual models,”IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 525-539,May. 1998.[23] Rivest, R. L., Shamir, A., and Adleman, L. M., “A method for obtaining digital signature and public-key cryptosystems,” Communication of the ACM, Vol. 21, No. 5, pp. 120 - 126, Feb. 1978.[24] Schneier, B., “Applied cryptography,” John Wiley & Sons, 2nd ed, 1996.[25] Tsai, M. J., Yu, K. Y., and Chen, Y. Z., “Joint wavelet and spatial transformation for digital watermarking,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 241-245, Feb. 2000.[26] Wong, P. W. and Memon, N., “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, Vol. 10, pp. 1593—1601, Oct. 2001.[27] Wu M., Tang, E., and Li, B., “ Data Hiding in Digital Binary Image,” IEEE International Conference on ICME, Vol. 1, pp. 393—396, 2000.[28] Wu D. C. and Tsai W. H., “Spatial-domain image hiding using image differencing,”IEE Proceedings on Vision Image and Signal Processing, Vol. 147, No. 1, pp. 29—37, Feb. 2000.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top