跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.87) 您好!臺灣時間:2025/01/14 04:44
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:王喻正
研究生(外文):Yu-Zheng Wang
論文名稱:高資訊藏量的影像偽裝技術之研究
論文名稱(外文):Some Image Steganography Schemes with High Embedding Capacity
指導教授:張真誠張真誠引用關係
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:93
語文別:英文
論文頁數:72
中文關鍵詞:資訊隱藏分群技術灰階影像VQ壓縮影像調色盤影像
外文關鍵詞:steganographydata hidingclusteringgray-level imageVQ imagepalette image
相關次數:
  • 被引用被引用:0
  • 點閱點閱:230
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
資訊隱藏(stegaongraphy)是一種將機密資訊藏在數位檔案(如影像、文字、音訊或視訊)中的技術。本論文共提出三個高藏量的資訊隱藏方法。第一個方法是結合Run-Length的觀念和模數運算將機密資料藏入灰階影像中。旨在使用Run-Length的觀念藏入資訊,並利用模數運算來控制影像品質。
第二個方法是植基VQ壓縮影像的資訊隱藏方法。在編碼簿上使用基因演算法的分群技術來得到較好的分群結果,以此來降低在替換編碼索引時所造成的影像失真。並藉由多元搜尋的方法去隱藏機密資料於VQ壓縮的影像中。
第三個方法則是針對調色盤影像進行資訊隱藏。為了達到高藏量的目的,我們採用分群技術,根據群的大小使用群順序和對映 (cluster ordering-and-mapping)以及組合 (combination)這兩個隱藏機制來做為藏入的方法。群順序和對映的技術將1個位元的機密資料藏入在群大小為1的影像資料中。而對於群的大小大於1的影像資料,排列技術則可藏超過1個位元以上的機密資料在此影像資料中。
根據我們的實驗結果,我們提出的這三個隱藏技術不僅擁有高的資訊藏量而且有良好的影像品質。
Steganography is a technique that hides the secret data in the digital data, such as images, texts, audios or videos. In this thesis, we propose three steganography schemes with high embedding capacity. The first scheme that incorporates both the run-length concept and the modulus operation is to hide the secret data in the gray-level images. We use the concept of run-length to construct the simple and efficient steganography scheme, and apply the modulus operation to control image quality.
The second scheme is a stegangraphy scheme based on the VQ images. The genetic clustering technique on the codebook is to obtain better clusters so that the replacement distortion of indices can be reduced. Then, we apply the multi-way search to hide the secret data in the VQ image.
The third scheme is for palette images. The clustering technique is adopted to reach the high embedding capacity, and two embedding mechanisms, the cluster ordering-and-mapping technique and the combination technique, are used to do embedding according to the size of the cluster. The cluster ordering-and-mapping technique embeds one bit in the image data with the cluster size being one. The combination technique makes it possible to embed more bits in the image data with a larger cluster size.
According to our experimental results, these three steganography schemes are not only high embedding capacity but also good image quality.
Chapter 1 Introduction………………………………………….……….....1
1.1 Background and Motivation……………………………………..………...1
1.2 A Survey of Related Research……………………………………..………2
1.2.1 The Gray-level Image Steganography Methods…..…………..….....3
1.2.2 The VQ-based Image Steganography Methods…..……..….…...….3
1.2.3 The Palette-based Image Steganography Methods………..….….…5
1.3 Thesis Organization…………………………………………..……..……...6

Chapter 2 Image Steganographic Methods Using Run-Length Approach………………………………………………………….8
2.1 Related Works……………………………………………………..……....8
2.1.1 Wu and Tsai’s Steganographic Method……………………….. ….8
2.1.2 Chang and Tseng’s Steganographic Method………………………..10
2.2 The Proposed Method………………………………………………..……12
2.2.1 Hiding Bitmap Files…………………………………………...........13
2.2.2 Hiding General Data Files……………………………….………….15
2.3 Experimental Results………………………………………….…………….16
2.3.1 The BRL experimental results……………………………..…...........18
2.3.2 The GRL experimental results…………………………..……...........19
2.3.3 The synthetic comparisons……………………………..………........20
2.4 Discussion and Summary…………………………………………..……......22

Chapter 3 VQ image Steganographic Method with High Embedding Capacity Using Multi-Way Search Approach……………………………......24
3.1 Related Works………………………………………………...…………...24
3.1.1 Vector Quantization…………………………………………...........24
3.1.2 Du and Hsu’s embedding method………………………….……….26
3.2 The Proposed Hiding Scheme on VQ…………………………….…...........27
3.2.1 Preprocessing of Codebook…………………………………..........27
3.2.2 Binary and Multi-Way Search Schemes for Embedding the Secret Data………………………………………………………...............29
3.3 Experimental Results………………………………………………...….…...31
3.4 Discussion and Summary………………………………………...…….……34

Chapter 4 An Adaptive Data Hiding Scheme for Palette Images...35
4.1 Related Works………………………………………………………...........35
4.2 The Proposed Method………………………………………………...........39
4.2.1 The Embedding Procedure……………………..……………….…..39
4.2.2 The Extraction Procedure……………………..…………….............48
4.3 Experimental Results…………………………………..…………….….…..50
4.4 Discussion and Summary………………………………..……………….…56

Chapter 5 Conclusions……………………………………..………………..58
[1]R. J. Anderson, and F. A. P. Petitcolas, 1998. “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 474-481.
[2]S. Katzenbeisser, and F. A. P. Petitcolas, 2000. Information hiding techniques for steganography and digital watermarking, Artech House.
[3]C. C. Chang, K. F. Hwang, and M. S. Hwang, 2002. “Robust authentication scheme for protecting copyrights of images and graphics,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 149, No. 1, pp. 43-50.
[4]N. Nikolaidis, and I. Pitas, 1998. “Robust image watermarking in the spatial domain,” Signal Process, Vol. 66, pp. 385-403.
[5]J. J. K. O'Ruanaidh, W. J. Dowling, and F. M. Boland, 1996. “Watermarking digital images for copyright protection,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 143, No. 4, pp. 250-256.
[6]C. I. Podilchuk, and E. J. Delp, 2001. “Digital watermarking: algorithms and applications,” IEEE Signal Process, Vol. 18, No. 4, pp. 33-46.
[7]J. Fridrich, 1998. “Image watermarking for tamper detection,” Proceedings of IEEE International Conference on Image Processing, Chicago, Illinois, pp. 404-408.
[8]C. S. Lu, and H. Y. M. Liao, 2001. “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1579-1592.
[9]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, 1996. “Techniques for data hiding,” IBM Systems Journal, Vol. 35, No.3&4, pp. 313-336.
[10]R. Z. Wang, C. F. Lin, and J. C. Lin, 2001. “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, Vol. 34, pp. 671-683.
[11]C. C. Chang, and H. W. Tseng, 2004. “A steganographic method for digital Images using side-match,” Pattern Recognition Letters, Vol. 25, pp. 1431-1437.
[12]W. N. Lie, and L. C. Chang, , 1999. “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” Proceedings of IEEE International Conference on Image Processing, Kobe, Japan, pp. 286-290.
[13]D. C. Wu, and W. H. Tsai, 2003. “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613-1626.
[14]R. C. Gonzalez, and R. E. Woods, 2002. Digital image processing, Prentice Hall.
[15]A. Gersho and R. M. Gray, 1992. Vector Quantization and Signal Compression, Kluwer Academic Publishers.
[16]R. M. Gray, 1984. “Vector Quantization,” IEEE ASSP Magazine, pp. 4-29.
[17]Y. C. Lin and C. C. Wang, 1999. “Digital images watermarking by vector quantization,” National Computer Symposium,Vol. 3, pp. 76-87.
[18]Z. M. Lu and S. H. Sun, 2000. “Digital image watermarking technique based on vector quantization,” Electronics Letters, Vol. 36, pp. 303-305.
[19]W. C. Du and W. J. Hsu, 2003. “Adaptive data hiding based on VQ compressed images,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 150, No. 4, pp. 233-238.
[20]M. Ujjwal and B. Sanghamitra, 2000. “Genetic Algorithm-Based Clustering Technique,” Pattern Recognition, Vol. 33, No. 9, pp. 1455-1465.
[21]Z. Michalewicz, 1996. Genetic Algorithms + Data Structures = Evolution Programs,3 ed: Springer Verlag.
[22]C. C. Chang, D. C. Lin, and T. S. Chen, 1997. “An improved VQ codebook search algorithm using principal component analysis,” Journal of Visual Communication and Image Representation, Vol. 8, No. 1, pp. 27-37.
[23]R. C. T. Lee, Y. H. Chin, and S. C. Chang, 1976. “Application of Principal Component Analysis to Multikey Searching,” IEEE Transactions on Software Engineering, Vol. SE-2, No. 3, pp. 185-193.
[24]Y. Linde, A. Buzo, and R. M. Gary, 1980. “An Algorithm for Vector Quantization Design,” IEEE Transactions on Communications, Vol. 28, pp. 84-95.
[25]M. Kwan, 1998. GIF colormap steganography. [Online]. Available: http://www.darkside.com.au/gifshuffle/
[26]J. Fridrich and R. Du, 1999. “Secure steganographic method for palette images,” Proceedings of the Third International Workshop Information Hiding, Dresden, Germany, pp. 47-60.
[27]C. C. Chang, P. Y. Tsai, and M. H. Lin, 2004. “An Adaptive Steganography for Index-Based Images Using Codeword,” Advances in Multimedia Information Processing – PCM 2004, (Aizawa, K., Nakamura, Y. and Satoh, S. Eds.), Springer Verlag, Part III, Germany, pp. 731-738.
[28]C. H. Tzeng, Z. F. Yang and W. H. Tsai, 2004. “Adaptive data hiding in palette images by color ordering and mapping with security protection,” IEEE Transactions on Communications, Vol. 52, No. 4, pp. 791-800.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 林珊如(2002)。從教師知識分享與資源共享談教育效能之提升。教育資料與研究,45,19-24。
2. 張國恩(1999)。資訊融入各科之內實施。資訊與教育,72,2-11。
3. 余政賢(2004)。臺北縣「鄉土地圖融入教學」設計理念與實務。國民教育,44(6),23-31。
4. 何榮桂、顏永進(2001)。資訊融入健康與體育領域教學。教師天地,112,71-75。
5. 何榮桂、籃玉如(2000)。落實「教室電腦」教師應具備之資訊素養。資訊與教育,77,22-28。
6. 邱瓊慧(2002)。中小學資訊科技融入教學之實踐。資訊與教育,88,3-9。
7. 張基成(1997)。開發思考與創造力之知識建構工具與認知學習環境的探討:電腦的革新應用。教學科技與媒體,33,36-45。
8. 梁朝雲(1997)。以全球資訊網為基礎的遠距學習環境─簡介LEAD前導計畫的研發現況。教學科技與媒體,34,28-41。
9. 陳文詠(2004)。科技與教學的邂逅:淺談資訊融入教學。國教之友,56,52-56。
10. 陳書梅(2002)。從知識創新談教育效能之提昇。教育資料與研究,45,62-65。
11. 黃維貞(2004)。e世代的教師:資訊科技融入教學。國教之友,55,48-51。
12. 溫嘉榮(2003)。教師如何將資訊融入學科成為教學工具。教育研究,105,75-81。
13. 廖慧意、賴進貴(2001)。地圖技能指標之研究。地圖,11,29-40。
14. 劉世雄(2001)。資訊科技應用教學的省思。教學科技與媒體,57,88-94。
15. 盧秀琴、姚乃丹(2002)。資訊教育融入國小課程的應用與省思。國民教育,42,19-24。