跳到主要內容

臺灣博碩士論文加值系統

(18.206.76.226) 您好!臺灣時間:2021/07/30 22:09
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王俊傑
研究生(外文):Chun-Chieh Wang
論文名稱:高容量黑白影像資訊偽裝術
論文名稱(外文):High Capacity Binary Image Steganography
指導教授:張隆紋張隆紋引用關係
指導教授(外文):Long-Wen Chang
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:21
中文關鍵詞:資訊隱藏資訊偽裝術黑白影像
外文關鍵詞:data hidingsteganographybinary image
相關次數:
  • 被引用被引用:0
  • 點閱點閱:122
  • 評分評分:
  • 下載下載:6
  • 收藏至我的研究室書目清單書目收藏:0
在今日社會中,多媒體資訊的流行及普及性促進了資訊偽裝術在數位通訊上的發展。就數位影像的資訊偽裝術而言,所著重的是資料可藏量以及藏入資料後原始影像品質的維護。另一方面,由於每一個像素都僅僅由一個位元組成,在黑白影像上藏入資料相當具有挑戰性。
因此,我們提出了一個簡單並且具有高資料可藏量的黑白影像資訊偽裝術。在我們的方法中,除了非全黑和非全白的區塊之外,還利用到全黑以及全白的區塊做藏入資料之用。根據我們所提出的資料嵌入準則,每一個可藏區塊至多修改兩個像素就能藏入兩個位元的資料量。必要時可藉由簡單的權重衡量法快速的找出最適合被修改的像素。由實驗結果可以得知在資料可藏量和原始影像品質的維持方面,和其他方法相較之下,我們的方法有相當卓越的表現。
The popularity and availability of multimedia data promote digital communication with steganography. High data capacity and cover image quality maintenance after data embedding are the major requirements in digital image steganography. On the other hand, hiding data in binary images is challenging for the property that each pixel is made up by only one bit.
As a result, we present a simple and high capacity binary image steganography. In our method, uniform blocks are utilized to embed data in addition to non-uniform blocks. Two data bits are hidden by at most modifying two pixels in an embeddable image block according to the proposed embedding criteria. The most suitable pixel to be modified is found quickly by simple weighting method when necessary. The experimental results show the excellent performance over other’s mechanism in data capacity and image quality.
ABSTRACT (in Chinese).............................i
ABSTRACT (in English)............................ii
ACKNOWLEDGEMENTS................................iii
List of Contents.................................iv
List of Figures...................................v
List of Tables...................................vi
Chapter 1 Introduction............................1
Chapter 2 Review of Related Researches............3
Chapter 3 The Proposed Binary
Image Steganography...............................5
3.1 The Embedding Criteria....................5
3.2 The Weighting Method......................7
3.3 The Data Embedding Procedure..............9
3.4 The Data Extracting Procedure............11
Chapter 4 Experimental Results...................13
Chapter 5 Conclusions............................19
Reference........................................20
[1] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video,” in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 111, pp. 243-246.
[2] Gruhl, D., A. Lu, and W. Bender, “Echo Hiding,” in Information Hiding: First International Workshop, Proceedings, vol.1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 295-316.
[3] Van Schyndel, R. G., A. Tirkel, and C. F. Osborne, “A Digital Watermark,” in Proceedings of the IEEE International Conferences on Image Processing, vol. 2, 1994, pp.86-90.
[4] A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-Based watermark recovering without restoring to the uncorrupted original image,” in IEEE ICIP, 1997.
[5] R. Dugad, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” in IEEE ICIP, 1998.
[6] R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 111, pp. 219-222.
[7] R. Machado, http://www.fqa.com/romana/romanasoft/stego.html.
[8] M. Y. Wu and J. H. Lee, “A novel data embedding method for two-color facsimile images,” in Proc. Int. Symp. Multimedia Inform. Processing, Chung-Li, Taiwan, R.O.C, Dec, 1998.
[9] J. Zhao and E. Koch, “Embedding robust labels into images for copyright protection,” in Proc. Int. Conf. Intellectual Property Rights for Inform., Knowledge, New Techniques, Munich, Germany, 1995, pp. 242-251.
[10] Min Wu, E. Tang and B. Lin, “Data hiding in digital binary image,” Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on, 30 July-2 Aug. 2000, vol.1, pp. 393 – 396.
[11] Yu-Chee Tseng, Yu-Yuan Chen and Hsiang-Kuang Pan, “A secure data hiding scheme for binary images,” Communications, IEEE Transactions on , Aug. 2002 , Issue: 8 , vol.50 , pp. 1227 – 1231.
[12] Haiping Lu, A.C. Kot and R. Susanto, “Binary image watermarking through biased binarization,” Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on , 6-9 July 2003, vol.3, pp. III - 101-4.
[13] J. Chen, Tung-Shou Chen and Meng-Wen Cheng, “A new data hiding method in binary image” Multimedia Software Engineering, 2003. Proceedings. Fifth International Symposium on , 2003, pp. 88 – 93.
[14] Tung - Hsiang Liu and Long-Wen Chang, “Data hiding in binary images”.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊