跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.171) 您好!臺灣時間:2024/12/13 20:28
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張宜庭
研究生(外文):Yi-Ting Chang
論文名稱:基於人眼視覺和抵抗隱藏偵測之最佳化品質影像秘密資料嵌入技術
論文名稱(外文):Optimal Image Steganographic Scheme Based on HVS and Anti-steganalysis Techniques
指導教授:賴文能賴文能引用關係
學位類別:碩士
校院名稱:國立中正大學
系所名稱:電機工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:66
中文關鍵詞:資料隱藏視覺模型模擬退火
外文關鍵詞:steganographyHVSSA
相關次數:
  • 被引用被引用:1
  • 點閱點閱:278
  • 評分評分:
  • 下載下載:28
  • 收藏至我的研究室書目清單書目收藏:0
本論文提出一套通用之抗隱藏偵測的演算法架構。在此架構中,我們將考量影像品質、人眼視覺、統計特性和位元錯誤率等因素建立評估函數,透過此評估函數,引導並提昇資料隱藏法則的效能。為了驗證此演算法,本論文實際應用於spatial domain和DCT domain之資料隱藏法則上,並進行效能評估。
In this paper, we present a new method to tell the encoder how to embed the secret data into cover image under some conditions. First, let the stego image can pass the steganalysis test and simultaneously arrive high image quality.
第一章 簡介…………………………………………..…..………..... 01
1.1 研究動機與應用………………………..…………………… 01
1.2 文獻回顧……………………………..……………………… 03
第二章 基本技術……..………………………..…..…………………. 06
2.1 HVS model……………………....……..………..…………… 06
2.1.1 DCT domain之HVS model……………………..……06
2.1.1 Spatial domain之HVS model……………………...…08
2.2模擬退火演算法…….………...………..……………………11 2.3 基因演算法………………………………..…………….…... 13
2.4 Steganalysis model………………………………..…………17
第三章 系統介紹……………………………………….…………….19
第四章 DCT domain上的資料嵌入法則………………...……...… 22
4.1 資料隱藏法則[24]之回顧………………….…………...……22
4.2 結合模擬退火演算法之DCT domain資料嵌入法則…….…25
4.3 實驗結果與分析………………………………………...……35
4.3.1實驗數據…………………………………………..……38
4.3.2實驗結果分析……………………..……………………44
4.3.3 可調適性L值………………………………………….45
第五章 Pixel domain上的資料嵌入法則……...…………………... 47
5.1 結合基因演算法之spatial domain資料嵌入法則……...… 47
5.2 實驗結果與分析…………………………………………… 53
第六章 結論與未來研究方向……………………..…………………52
6.1 結論……………………………………………….…………..57
6.2 未來研究方向……………………………………………….57
附錄A…………………………………………….…………..…………58
附錄B…………………………………………….…………..…………60
附錄C…………………………………………….…………..…………62
參考文獻…………..…………………..………………………………. 64
[1]G. J. Simmons, “‘Prisoners’ problem and the subliminal channel,” CRYPTO83—Advances in Cryptology, pp. 51–67, 1984.
[2]N. F. Johnson and S. Katzenbeisser, “A survey of steganographic techniques,” Proc. Information Hiding, pp. 43–78, 2000.
[3]J. Fridrich, M. Goljan, P. Lisonˇek, and D. Soukal,“Writing on wet paper,” IEEE Trans. on Signal Processing, vol. 53, no. 10, October 2005.
[4]Y.-T. Wu and F.-Y. Shih,“Genetic algorithm based methodology for breaking the steganalytic systems,” IEEE Trans. on Systems, Man, and Cybernetics—Part B: Cybernetics, vol. 36, no. 1, February 2006.
[5]X. Zhang and S. Wang, “Dynamical running coding in digital steganography,” IEEE Signal Processing Letters, vol. 13, no. 3, March 2006.
[6]A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-tools and some lessons learned,” Proc. 3rd Int. Workshop on Information Hiding, pp. 61–76, Sep. 1999,
[7]J. Fridrich, M. Goljan, and D. Hogea, “New methodology for breaking steganographic techniques for JPEGs,” Proc. EI SPIE, pp. 143–155, Jan. 2003.
[8]H. Farid, “Detecting steganographic message in digital images,” Dept. Comput. Sci., Dartmouth College, Hanover, NH, Tech. Rep. TR2001-412, 2001.
[9]I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics,” IEEE Trans. Image Process., vol. 12, no. 2, pp. 221–229, Feb. 2003.
[10]W.-N. Lie and G.-S. Lin, “A feature-based classification technique for blind image steganalysis,” IEEE Trans. on Multimedia , vol.7, no.6, pp.1007-1020, Dec. 2005
[11]S. Liu, H. Yao, W. Gao, “Steganalysis of Data Hiding Techniques in Wavelet Domain,” IEEE Proc. of the Int’l Conf. on Information Technology: Coding and Computing , vol. 1, pp. 751-754, 2004.
[12]K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, ”Statistical restoration for robust and secure steganography,” IEEE International Conference on Image Processing,vol. 2,pp.11-14, 2005.
[13]S. Dumitrescu and X. Wu, “A new framework of LSB steganalysis of digital media,” IEEE Trans. on Signal Processing, vol. 53, no. 10, Oct. 2005.
[14]O. Dabeer, K. Sullivan, U. Madhow,S. Chandrasekaran, and B. S. Manjunath,”Detection of hiding in the least significant bit,” IEEE Trans. on Signal Processing, vol. 52, no. 10, Oct. 2004.
[15]A. D. Ker,” Steganalysis of LSB matching in grayscale images,” IEEE Signal Processing letters, vol. 12, no. 6, June 2005.
[16]G. Gul, A. E. Dirik, I. Avcibay,”Steganalysis of Perturbed Quantization,” IEEE Signal Processing and Communications Applications, April 2006.
[17]林國祥,多媒體數位浮水印、資料隱藏和隱藏追蹤技術之研究,國立中正大學電機所博士論文,2005年五月。
[18]D. LEVICKÝ and P. FORIŠ, “Human visual system models in digital image watermarking,” RADIOENGINEERING, vol. 13, no. 4, December 2004.
[19]Q. Pei ,”Impact analysis of digital watermarking on perceptual quality using HVS models,”
[20]C.-Y. Lin and S.-F. Chang, “Watermarking capacity of digital images based on domain-specific masking effects,” Proc. Int’l Conf. on Information Technology: Coding and Computing, pp. 90-94, 2001.
[21]J. R. Hernández,, M. Amado, and F. Pérez-González, ”DCT-domain watermarking techniques for still images:detector performance analysis and a new structure,” IEEE Trans. on Image Processing, vol. 9, no. 1, January 2000.
[22]W.-N. Lie and L.-C.n Chang, “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” IEEE Proc. Int’l Conf. on image processing, vol. 1, pp. 286-290, 1999.
[23]張容瑄、紀美秀,模擬退火法在校車路線問題上的應用,國立中正大學數學所碩士論文,2001年6月。
[24]Y. Seki, H. Kobayashi, M. Fujiyoshi and H. Kiya, “Quantization-based image steganography without data hiding position memorization,” IEEE Int’l Symposium on Circuits and Systems, vol. 5, pp.4987-4990, May 2005.
[25]W.-N. Lie, G.-S. Lin, and S.-L. Cheng, “Dual Protection of JPEG Images Based on Informed Embedding and Two-stage Watermark Extraction Techniques,” Accepted for publication in IEEE Trans. on Information Forensics and Security (IFS), April. 2006.
[26]N. Damera-Venkata, T.-D. Kite, W.-S. Geisler, B.-L. Evans, and A.- C. Bovik, ”Image quality assessment based on a degradation model,” IEEE Trans. on Image Processing, vol. 9, no. 4, April 2000
[27]S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top