跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.88) 您好!臺灣時間:2024/12/04 14:23
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:詹啟祥
研究生(外文):Chi-Shiang Chan
論文名稱:影像偽裝術與數位浮水印之研究
論文名稱(外文):The Study of Image Steganography and Digital Watermarking
指導教授:張真誠張真誠引用關係
指導教授(外文):Chin-Chen Chang
學位類別:博士
校院名稱:國立中正大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:94
語文別:英文
論文頁數:103
中文關鍵詞:數位浮水印影像偽裝
外文關鍵詞:Digital WatermarkingImage Steganography
相關次數:
  • 被引用被引用:3
  • 點閱點閱:446
  • 評分評分:
  • 下載下載:68
  • 收藏至我的研究室書目清單書目收藏:1
在此博士論文中主要探討兩大主題。第一個主題是影像隱藏技術,第二個主題則是數位浮水印技術。雖然影像隱藏技術和數位浮水印技術是不同的研究主題,但是影像隱藏技術和數位浮水印技術具有一個共同點,那就是這兩個主題的技術,都必須將資料藏入數位影像中。所不同的是,數位浮水印技術必須能多達一個特性,即是確保藏入資料的強韌性。因此,可以將數位浮水印技術,當作是影像隱藏技術的一個特殊應用。由於影像隱藏技術和數位浮水印技術具有此共同點,在此博士論文中,包含影像隱藏技術和數位浮水印技術這兩種技術。
首先先探討第一個主題,那就是影像隱藏技術。影像隱藏技術又可分成兩大類。第一類是灰階影像影藏技術,第二類是彩色影像隱藏技術。
灰階影像影藏技術是目前熱門的研究主題。再眾多的方法中,最直接的方法,就是將秘密資料藏到原影像中不重要的位置。 然而此種隱藏方法,會對原影像產生比較大的傷害。在2001年,Wang等人將 “一對一取代表” (One-to-one Substitution Table)的技術引入灰階影像影藏技術中。經由 “一對一取代表” 的指引,就可以將秘密資料,轉換成另一個秘密資料。而這轉換後的秘密資料,將會更接近原影像中不重要位置的值。所以將轉換後的秘密資料,藏入原影像中的不重要位置,會降低對原影像的傷害。然而Wang等人所提的方法,並不能保證可以找到最佳的“一對一取代表”。在2003年,Chang等人利用動態程式規劃(Dynamic Programming Strategy)來找到最佳的“一對一取代表”。
為了對灰階影像影藏技術提供貢獻,此博士論文提出三個不同的方法,來做灰階影像隱藏。第一個方法是“多位元參考取代表”(Multi-bit-reference Substitution Table),第二個方法是“一對二取代表”(One-to-two Substitution Table),第三個方法是“模數函式取代表(Modulus Function Based Substitution Table)”。
第一個方法,利用在原影像中沒有藏秘密資料的部份,來將原影像分割成不同的影像平面。對每一個的影像平面,分別使用‘動態程式規劃’來找到最佳的“一對一取代表”。而後將每一個平面的“一對一取代表”組合起來,就可以得到“多位元參考取代表”。
第二個方法,介紹如何用產生最佳的“一對二取代表”,並利用它來做秘密資料之隱藏。為了要產生最佳的“一對二取代表”,首先會建立一個三維的陣列,而後利用 ‘動態程式規劃’ 在此三維的陣列上,從而獲得最佳解的“一對二取代表”。
第三個方法,結合Thien and Lin所提的模數函式(Modulus Function)資料隱藏法以及Chang等人所提的“一對一取代表”,來產生的最佳的“模數函式取代表”。經由此表的指引,可得到轉換後的秘密資料。對於這個轉換後的秘密資料,利用 ‘模數函式資料隱藏法’ 藏入原影像,會對原影像的傷害最小。
接著介紹第二類的影像隱藏技術,彩色影像隱藏技術。在彩色影像隱藏技術中,將彩色秘密影像藏入彩色原影像中,來產生彩色偽裝影像。對於彩色秘密影像,先利用調色盤(Palette)將此彩色秘密影像進行量化,而產生索引影像(Indexed Color Image)。然後分別對原彩色影像以及索引影像,計算每一個像素與其鄰近像素的差值。接著再把 ‘索引影像’ 所產生的像素差值,藏入原彩色影像所產生的像素差值中。最後將藏入資料的彩色影像的像素差,反轉回像素值,而得到彩色偽裝影像。
緊接著介紹第二個主題,數位浮水印技術。數位浮水印是用於數位影像的保護。在數位浮水印的嵌入階段,先將原影像切成一個個區塊,並且將這些區塊投影到一個線性空間,而後將這些投影值與數位浮水印產生關連。當要取出數位浮水印時,要對修改過的影像,進行相同的程序。也就是將修改過的影像,切成區塊,並且投影到線性空間,以找到投影點。經由這些投影點,可以將浮水印取出。
There are two topics in this dissertation. One is image steganography and the other is digital watermarking. Although image steganography and digital watermarking are two different topics, there exists one common point. Both image steganography and digital watermarking embed data into images except that digital watermarking has an additional property, the robustness of the embedded data. Therefore, we can treat digital watermarking as a special case of image steganography. Owing to this common point, two topics are studied in this dissertation.
Regarding, image steganography, we consider the problems of gray-level image hiding and color image hiding. For gray-level images, we propose three different methods; a color image hiding technique is also proposed for color images.
Among all related works for gray-level images, least-significant-bit (LSB) substitution is the most straightforward way to embed a secret image into a host image. To avoid the image degradation of the LSB substitution technique, Wang et al. proposed a method using the substitution table to perform image hiding. In 2001, Wang et al. brought up the concept of one-to-one mapping where each secret data value is transformed into another value by applying the table. Nevertheless, Wang et al. have not developed any method to obtain an optimal one-to-one substitution table. In 2003, Chang et al. proposed a way to find an optimal one-to-one substitution table by using the dynamic programming strategy.
In this dissertation, we have proposed three gray-level image hiding techniques by using an optimal multi-bit-reference substitution table, an optimal one-to-two substitution table and an optimal modulus function based substitution table.
In the first method, we use un-embedded bits of host pixels to partition the host pixels into different planes. We can derive an optimal substitution table for each plane. After combining all optimal substitution tables, we can obtain an optimal multi-bit-reference substitution table. The secret data being transformed via the optimal multi-bit-reference substitution table will degrade the host image possibly least.
In the second method, we introduce a new method that uses an optimal one-to-two substitution table. We first built up a square-error matrix with 3-dimension. After applying a dynamic programming strategy on the square-error matrix, we can obtain an optimal one-to-two substitution table.
Combing the modulus function, proposed by Thien and Lin, and the optimal substitution table, we develop a novel method to improve the image quality of the stego-image.
Now, consider the problem of color image embedding. The secret image to be embedded is first color-quantized using a palette previously sorted by the principal component analysis technique to generate the indexed color image. Then, the concept of pixel difference is employed to process both the host image and the indexed color image. After that, the processed indexed color image is embedded into the processed color host image.
Finally, we describe the second topic, digital watermarking, in this dissertation. Digital watermarking is used for the copyright protection of digital images. To embed the watermark, the proposed method partitions an original image into blocks and uses a PCA function to project these blocks to a linear subspace. There is a watermark table, which is computed from projection points, kept in our proposed method. When extracting a watermark, the proposed method projects the blocks of the modified image by using the same PCA function. Both the newly projected points and the watermark table are used to reconstruct the watermark.
ABSTRACT
中文摘要
LIST OF FIGURES
LIST OF TABLES
CHAPTER 1
INTRODUCTION
1.1 MOTIVATION
1.2 IMAGE HIDING TECHNIQUES
1.3 DIGITAL WATERMARKING
1.4 ORGANIZATION
CHAPTER 2
A SURVEY OF RELATED WORKS
2.1 IMAGE HIDING TECHNIQUES
2.1.1 LSB substitution method
2.1.2 Modulus function method
2.1.3 Image differencing method
2.2 CHANG AND TSAI’S WATERMARKING METHOD
2.2.1 Principal Component Analysis (PCA)
2.2.2 Watermarking Techniques with Codebooks
CHAPTER 3
THE PROPOSED METHOD
3.1 GRAY-LEVEL IMAGE HIDING USING SUBSTITUTION TABLE
3.1.1 The Multi-bit-reference Substitution Table
3.1.2 An One-to-two Substitution Table
3.1.3 Combing Modulus Function and Substitution Table
3.2 COLOR IMAGE HIDING USING IMAGE DIFFERENCING
3.3 A NEW WATERMARKING TECHNIQUE
CHAPTER 4
EXPERIMENTAL RESULTS
4.1 GRAY-LEVEL IMAGE HIDING USING SUBSTITUTION TABLE
4.1.1 The Multi-bit-reference Substitution Table
4.1.2 An One-to-two Substitution Table
4.1.3 Combing Modulus Function and Substitution Table
4.2 COLOR IMAGE HIDING USING IMAGE DIFFERENCING METHOD
4.3 A NEW WATERMARKING TECHNIQUE
CHAPTER 5
DISCUSSIONS AND CONCLUSIONS
REFERENCES
[1] D. W. Bender, N. M. Gruhl and A. Lu, " Techniques for Data Hiding, " IBM Systems Journal, vol. 35, 1996, pp. 313-336.
[2] M. U. Celik, G. Sharma, E. Saber and A. M. Tekalp, "Hierarchical Watermarking for Secure Image Authentication with Localization, " IEEE Transactions on Image Processing, vol. 11, no. 6, 2002, pp. 585-595.
[3] C. K. Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution, " Pattern Recognition, vol. 37, no. 3, March 2004, pp. 469-474.
[4] C. S. Chan and C. C. Chang " An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy, " Fundamenta Informaticae, vol. 65, no. 4, 2005, pp. 291-305.
[5] C. S. Chan and C. C. Chang " An Image Hiding Scheme by Finding an Optimal One-to-two Substitution Table Using Dynamic Programming Strategy, " submitted to Imaging Science Journal, March 2005. (Under Revision).
[6] C. S. Chan, C. C. Chang, and Y. C. Hu, " A Color Image Hiding Scheme Using Image Differencing, " Optical Engineering, vol. 44, no. 1, 2005, pp. 017003-1-017003-9.
[7] C. S. Chan, C. C. Chang, and Y. C. Hu, " Image Hiding Scheme Using Modulus Function and Optimal Substitution Table, " Pattern Recognition and Image Analysis, vol. 15, no. 4, 2005.
[8] C. C. Chang and C. S. Chan, "A Watermarking Scheme Based on Principal Component Analysis Technique," Informatica, vol. 14, no. 4, 2003, pp. 431-444.
[9] C. C. Chang, T. S. Chen and P. F. Chung, "A Technique of Watermarking for Digital Images Using (t,n)-Threshold Scheme, " Informatica, vol. 24, no. 1, 2000, pp. 51-55.
[10] C. C. Chang, J. Y. Hsiao and C. S. Chan, " Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, vol. 36, no. 7, 2003, pp. 1583-1595.
[11] C. C. Chang, M. H. Lin, Min Hui, and Y. C. Hu, "A fast and secure image hiding scheme based on LSB substitution," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, 2002, pp. 399-416.
[12] C. C. Chang and C. S. Tsai, "A Technique for Computing Watermarks from Digital Images,". Informatica, vol. 24, no. 3, 2000, pp. 391-396.
[13] L. H. Chen and J. J. Lin, "Mean Quantization Based Image Watermarking," Image and Vision Computing, vol. 21, no. 8, 2003, pp. 717-727.
[14] Y. H. Chu and S. Chang, "Dynamical Cryptography Based on Synchronized Chaotic Systems," Electronics Letters, vol. 35, no. 12, 1999, pp. 974-975.
[15] M. S. Fu and O. C. Au, " Halftone Image Data Hiding with Intensity Selection and Connection Selection, " Signal Processing: Image Communication, vol. 16, no. 10, August 2001, pp. 909-930.
[16] M. S. Fu and O. C. Au, "Steganography in Halftone Images: Conjugate Error Diffusion," Signal Processing, vol. 83, no. 10, Oct. 2003, pp. 2171-2178.
[17] H. J. Highland, "Data Encryption: a Non-mathematical Approach," Computer Security, vol. 16, 1997, pp. 369-386.
[18] M. S. Hwang, C. C. Chang and K. F. Hwang, "A watermarking technique based on one-way hash functions," IEEE transactions on Consumer Electronics, vol. 45, no. 2, 1999, pp. 286-294.
[19] R. C. T. Lee, Y. H. Chin and S. C. Chang, "Application of Principal Component Analysis to Multikey Searching," IEEE Transactions on Software Engineering, vol. SE-2, no. 3, Sep. 1976, pp185-193.
[20] S. D. Lin and C. F. Chen, "A Robust DCT-based Watermarking for Copyright Protection, " IEEE Transactions on Consumer Electronics, vol. 46, no. 3, 2000, pp. 415-421.
[21] Y. Linde, A. Buzo and R. M. Gray, "An Algorithm for Vector Quantizer Design," IEEE Transactions on communications, vol. 28, Sep. 1980, pp. 84-95.
[22] S. S. Maniccam and N. Bourbakis, "Lossless Compression and Information Hiding in Images, " Pattern Recognition, vol. 37, no.3, Mach 2004, pp. 475-486.
[23] L. M. Marvel, C. T. Retter, and C. G. J. Boncelet, "Hiding Information in Images", Proceedings of IEEE ICIP, vol. 2, 1998, pp. 396 –398.
[24] S. C. Pei, and J. M. Guo, "Data Hiding in Halftone Images with Noise-Balanced Error Diffusion, " IEEE Signal Processing Letters, vol. 10, no. 12, Dec. 2003, pp. 345-351.
[25] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding – a survey," Proceedings of the IEEE, vol. 87, no. 7, July 1999, pp. 1062-1078.
[26] D. H. Pritchard, "U. S. color television fundamentals – a review," IEEE Transactions on Consumer Electronics, vol. CE-23, no. 4, 1977, pp. 467-478.
[27] J. Spaulding, H. Noda , M. Shirazi and E. Kawaguchi, " BPCS Steganography Using EZW Lossy Compressed Images," Pattern Recognition Letters, vol. 23, no.13, Nov. 2002, pp. 1579-1587.
[28] C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol. 36, no. 12, Dec. 2003, pp. 2875-2881.
[29] G.. Voyatzis, and I. Pitas, "Protecting Digital-Image Copyrights: A Framework, " IEEE Computer Graphics and Applications, vol. 1, 1999, pp.18-24.
[30] M. Y. Wu, Y. K. Ho and J. H. Lee, "An Iterative Method of Palette-based Image Steganography, " Pattern Recognition Letters, vol. 25, no.3, Feb. 2004, pp. 301-309.
[31] R. Z. Wang, C. F. Lin and J. C. Lin "Hiding by Optimal LSB Substitution and Genetic Algorithm, " Pattern Recognition, vol. 34, no.3, March 2001, pp. 671-683.
[32] R. B. Wolfgang, and E. J. Delp, "A Watermark for Digital Image, " Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, vol. 3, 1996, pp. 219-222.
[33] D. C. Wu and W. H. Tsai, "Spatial-domain image hiding using image differencing," IEE Proceedings on Vision, Image and Signal Processing, vol. 147, no. 1, Feb. 2000, pp. 29-37.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top