跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.171) 您好!臺灣時間:2024/12/10 13:48
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林東憲
研究生(外文):Tung-Hsien Lin
論文名稱:一個將向量量化影像藏入於JPEG影像之隱藏技術
論文名稱(外文):An Image Hiding Method for JPEG Compression Images Based on Vector Quantization
指導教授:何裕琨
指導教授(外文):Yu-Kuen Ho
學位類別:碩士
校院名稱:國立成功大學
系所名稱:電腦與通信工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:51
中文關鍵詞:JPEG向量量化影像隱藏
外文關鍵詞:JPEGVector QuantizationImage Hiding
相關次數:
  • 被引用被引用:0
  • 點閱點閱:215
  • 評分評分:
  • 下載下載:27
  • 收藏至我的研究室書目清單書目收藏:1
  近年來隨著網路技術的進步,各種多媒體資料能夠輕易地在網際網路上傳送,影像隱藏技術(Image Hiding Technique)在此亦有著相當的進展,在網路傳輸上JPEG壓縮影像廣泛的使用率使其成為一個很好的影像隱藏載體。由於一般影像資料量甚大,因此將欲隱藏之秘密影像利用高壓縮率的向量量化法壓縮後減少所需的容量,在藏入影像之後較能降低對掩護影像畫質之影響也較不亦被察覺。
  先前將秘密影像經向量量化壓縮後藏入於JPEG掩護影像之研究,需修改量化表以達到可逆式地加以藏入,再利用掩護影像作為訓練編碼簿的影像,雙方不需事先建制編碼簿,增加使用上之機動性。量化表乃是放置於JPEG格式檔頭,因此可以輕易的取出觀察,竊聽者較容易判斷出是否為一張可疑之影像,對於安全性需求很高的秘密圖像通訊可能尚有不足。
  本論文提出一個將向量量化影像藏入於JPEG影像之隱藏技術,利用JPEG掩護影像在壓縮後頻率域之特性將經向量量化壓縮之秘密影像藏入JPEG影像當中,而且掩護影像也可利用作為編碼簿訓練之用。此一不需要更改量化表之方式可使嵌入後所造成的掩護影像之失真降低於類似經過JPEG壓縮之失真,使得秘密圖像的傳遞更不易被察覺。
論文經由實驗顯示,所提出之方法,除了不需建制編碼簿,證明其利用JPEG影像可以作為秘密圖像傳遞的工具,較之於其他方法,能夠保有一定品質達到較不易被察覺之效果。
  With the progress of network techniques in recent years, various multimedia data can be conveyed on internet easily, and image hiding technique also have great improvement in this respect. JPEG image is a suitable secret image carrier because it’s popular usage on internet. On the other hand, due to the capacity of secret image is high and it could degrade the cover image’s quality seriously after embedded. It’s suitable to use high compression ratio method such like vector quantization (VQ) to compress the secret image.
  Pervious research about embed VQ secret image into JPEG cover image, it’s done by an invertible embed method with changing the coefficients of JPEG quantization table, so the JPEG cover image could directly use as the VQ codebook training image. Therefore, both side of secret channel no need to build up codebook in advance to increase the maneuverability of the system. But the JPEG quantization table is restored in it’s header and it could take out easily to observe if it’s a suspicious image, It is probably inadequate when high security demanded situation.
  An image hiding method is proposed in this paper, VQ secret image is embedded into JPEG cover image utilizing the features in frequency domain of JPEG image and no need to modify the JPEG quantization table. The degradation due to embed is like the degradation of higher JPEG compression to reduce the chance to be suspicious. At the same time, cover image can also be use as the codebook training image to keep the maneuverability of the system. Experiment shows this method can maintain good imperceptibility than other methods to transmit secret image.
第一章 緒論............................................1
第二章 相關背景. ......................................5
2.1 JPEG壓縮標準概觀. ..............................5
2.2 向量量化影像編碼...............................13
2.3 影像隱藏技術...................................16
2.4 利用JPEG特徵之資料隱藏技術.....................18
2.5 影像品質評估方式...............................22
第三章 一個將向量量化影像藏入於JPEG影像之隱藏技術.....24
3.1 JPEG最小編碼區塊係數之劃分.................... 26
3.2 編碼簿訓練.....................................28
3.3 區塊平均變動率計算.............................29
3.4 秘密影像向量量量化編碼與嵌入...................31
3.5 秘密圖像之萃取.................................32
第四章 實驗結果.......................................34
4.1 實驗相關配備及環境.............................36
4.2 不同品質參數對於JPEG掩護影像壓縮之影響.........36
4.3 編碼簿大小與碼向量維度.........................37
4.4 不同JPEG品質參數與嵌入後掩護影像品質之影響.....41
4.5 與相關研究之比較...............................45
第五章 結論與未來展望.................................46
[1]CCITT Recommendation T.81, “Digital Compression and Coding of Continuous-tone Still Images”, 1992

[2]C.C. Chang, C.L. Chiang and J.Y. Hsiao, “A DCT-domain System for Hiding Fractal Compressed Images.”, Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Vol. 2 Pages 83-86, 2005

[3]C.C. Chang, Y.C. Chou and J.J. Shen, “Improving Image Quality for JPEG Compression” Ninth International Conference on Knowledge-Based Intelligent Information & Engineering Systems, LNAI 3683, Pages 442-448, 2005

[4]C.K Chan, L.M. Cheng, K.C. Leung and S.L. Li, “Image Hiding Based on Block Difference”, 8th International Conference on Control , Automation, Robotics and Vision, Vol. 2, Pages 968-972, 2004

[5]D.C. Wu and W.H. Tsai, “Spatial-domain Image Hiding Using Image Differencing”, IEE Proc.-Vis. Image Signal Processing., Vol. 147, No.1, 2000

[6]G.C. Langelaar , R.L. Lagendijk and J. Biemond, “Watermarking by DCT Coefficient Removal: A Statistical Approach to Optimal Parameter Settings”, Proc. SPIE Vol. 3657 Security and Watermarking of Multimedia Contents, Pages 2-13, 1999

[7]G.K. Wallace, “The JPEG Still Image Compression Standard”, Consumer Electronics, IEEE Transactions, Vol. 38, Issue 1, Pages xviii-xxxiv, 1992

[8]http://www.ijg.org/

[9]H.W. Tseng and C.C. Chang, “Steganography Using JPEG-Compressed Images”, Proceedings of the Fourth International Conference on Computer and Information Technology, Pages 12-17, 2004

[10]H.W. Wong, C. Au and W.C. Wong, “A Data Hiding Technique in JPEG Compressed Domain”, Proc. SPIE Vol. 4314 Security and Watermarking of Multimedia Contents III, Pages 309-320, 2001

[11]H.W. Wong, C. Au and W.C. Wong, “Data Hiding and Watermarking in JPEG Compressed Domain by DC Coefficient Modification”, Proc. SPIE Vol. 3971 Security and Watermarking of Multimedia Contents II, Pages 237-244, 2000

[12]J. Fridrich, M. Goljan and R. Du, “Invertible Authentication Watermark for JPEG Images” IEEE International Conference on Information Technology: Coding and Computing, 2001. Proceedings, Pages 223-227, 2001

[13]M. Iwata, K. Miyake and A. Shiozaki, “Digital Steganography Utilizing Features of JPEG Images” IEICE Trans. Fundamentals, Vol. E87-A, No. 4, 2004

[14]R.M. Gary, “Vector Quantization”, IEEE ASSP Magazine, Apr. 1984, Vol.1, Issue 2, Pages 4-29, 1984

[15]S.F. Lin, S.C Shie and C.C. Chou, “A suitable Image Hiding Scheme for JPEG Images”, 2004 International Conference on Image Processing, Vol. 3, Pages 1565-1568, 2004

[16]T.S. Chen, C.C. Chang and M.S. Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization”, IEEE Transaction on Image Processing, Vol.7 No. 10 Page 1485-1488, 1998

[17]Y.C. Hu, “Grey-level Image Hiding Scheme based on Vector Quantization”, Electronics Letters, Vol. 39, No. 2, Pages 202-203, 2003

[18]Y. Linde, A. Buzo and R. Gray “An Algorithm for Vector Quantizer Design”, IEEE Transactions on Communications , Vol. COM-28, No. 1, Pages 84-95,1980

[19]Y. Noguchi, H. Kobayashi and H. Kiya, “A Method of Extracting Embedded Binary Data from JPEG Bitstreams using Standard JPEG Decoder”, IEEE International Conference on Image Processing, 2000 Proceedings, Vol. 1, Pages 577-580,2000

[20]陳同孝,張真誠,黃國峰, ”數位影像處理技術”, 旗標出版社, 92年出版
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top