跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.87) 您好!臺灣時間:2024/12/03 01:25
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:曾約棋
研究生(外文):Yue-Chi Tseng
論文名稱:基於離散小波轉換係數關聯性之隱藏術研究
論文名稱(外文):A Study of Image Steganography Based on DWT Coefficient Analysis
指導教授:陳伯岳陳伯岳引用關係
指導教授(外文):Po-Yueh Chen
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:網路與通訊研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:33
中文關鍵詞:資訊隱藏離散小波轉換資訊安全
外文關鍵詞:securitySteganographyDWT
相關次數:
  • 被引用被引用:0
  • 點閱點閱:210
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:0
本文擬以離散小波轉換(Discrete Wavelet Transform, DWT)為工具,進行資訊隱藏之理論探討,並由實驗結果來分析影像品質(PSNR)、與藏匿容量(Capacity)等重要評估參數之改良與妥協。
由於DWT的特性是能把原始影像資料區分為低頻與高頻的部分,而人類肉眼對低頻訊號較為敏感。因此本論文所提出的一個資訊隱藏技術方案,是針對做完DWT轉換後的小波係數直接進行資訊隱藏的動作,其優點有: (1)充分利用DWT之特性,將欲隱藏之重要資訊嵌入肉眼較不敏感的高頻帶,而盡量保持低頻係數之完整性,以提升影像品質。 (2)在維持一定程度影像品質的前提之下,將可藏入更大容量的重要資訊而不被發覺,以達成資訊安全的功能。 (3)可依據使用者的需求來動態調整所需的藏匿容量。
In this thesis, performing image steganography on frequency domain in stead of spatial domain is analyzed. Image steganography is a new data hiding scheme which protects the essential information embedded in an image. The objective is to hide as many bits as possible while maintaining certain image quality (in terms of Peak Signal-to-Noise-Ratio, PSNR). By embedding the essential information in the high frequency parts of the DWT coefficients and keep the low frequency part unchanged, we can exploit the characteristic of DWT and protect the embedded information more securely since human eyes are much less sensitive to high frequency signals. Furthermore, the proposed scheme allows the users to dynamically modify the embedding capacity according to their own applications.
Chapter 1 Introduction 1
1.1 Background 1
1.1.1 Cryptography 2
1.1.2 Information hiding 2
1.1.3 Steganography 4
1.1.4 Watermarking 4
1.2 Motivation 5
1.3 Organization of thesis 6
Chapter 2 Related works 7
2.1 Relative theories 7
2.2 Literatures review 9
2.2.1 Data hiding methods in spatial domain 9
2.2.2 Data hiding methods in frequency domain 12
Chapter 3 Proposed method 16
3.1 Embedding procedure 16
3.2 Extracting procedure 19
Chapter 4 Simulation results and analysis 21
4.1 Simulation results 22
4.2 Performance analysis 23
Chapter 5 Conclusions and future works 29
5.1 Conclusions 29
5.2 Future works 29
References 30
Appendix 32
[1]T. S. Chen, C. C. Chang, and M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, 1998, Vol. 7, No. 10, pp. 1485-1488.

[2]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, 2001, Vol. 34, No. 3, pp. 671-683.

[3]R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communication of the ACM, 1978, Vol. 21, No. 2, pp. 120-126.

[4]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, 1996, Vol. 35, No. 3 and 4, pp. 313-336.

[5]A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding – A survey,” Proceeding of IEEE, 1999, Vol. 87, No. 7, pp. 1062-1078.

[6]R. G. Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” IEEE International Conference on Image Processing, 1994, Vol. 2, pp. 86-90.

[7]C. C. Chang, J. C. Yeh, and J. Y. Hsiao, “A novel scheme for securing image steganography,” IEEE Pacific Rim Conference on Multimedia, 2001, pp. 804-811.

[8]P. C. Su, C. J. Kuo, “Steganography in JPEG2000 compressed images,” IEEE Transactions on Consumer Electronics, 2003, Vol. 49, No. 4, pp. 824-832.

[9]D. C. Lou, J. L. Liu, “Steganography method for secure communications,” Elsevier Science on Computers & Security, 2002, Vol. 21, No. 5, pp. 449-460.

[10]張真誠、陳同孝、黃國峰,電子影像技術,松崗電腦圖書資料股份有限公司,2000。

[11]陳同孝、張真誠、黃國峰,數位影像處理技術,旗標出版股份有限公司,2002。
[12]Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A secure data hiding scheme for binary images,” IEEE Transactions on Communications, 2002, Vol. 50, pp. 1227-1231.

[13]Y. K. Lee, L. H. Chen, “High capacity steganographic model,” IEE Proceedings Vision, Image and Signal processing, 2000, Vol. 147, No. 3, pp. 288-294.

[14]C. K. Chan, L. M. Cheng, “Hiding data in image by simple LSB substitution,” Pattern Recognition, 2003, Vol. 37, pp. 469-474.

[15]C. C. Chang, H. W. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, 2004, Vol. 25, pp. 1431-1437.

[16]Y. H. Yu, C. C. Chang, and Y. C. Hu, “Hiding secret data in images via predictive coding,” International Journal on Pattern Recognition, 2005, Vol. 38, pp. 691-705.

[17]C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, 2002, Vol. 141, pp123-138.

[18]S. Torres, M. Nakano, and H. Perez, “An image steganography systems based on BPCS and IWT,” 16th International Conference on Electronics, Communications and Computers, 2006, pp. 51-56.

[19]Po-Yueh Chen, Hung-Ju Lin, “A steganography method on DWT features,” 2005 Symposium on Digital Life and Internet Technologies, National Cheng Kung University, Tainan, Taiwan, R.O.C. , 2005.

[20]Po-Yueh Chen, En-Chi Liao, “A new algorithm for Haar Wavelet transform,” IEEE International Symposium on Intelligent Signal Processing and Communication System, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C. , 2002, No. 21-24, pp. 453-457.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top