跳到主要內容

臺灣博碩士論文加值系統

(98.84.18.52) 您好!臺灣時間:2024/10/15 04:25
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:王皓正
研究生(外文):Hao-Cheng Wang
論文名稱:數位影像之機密分享與可逆式偽裝技術之研究
論文名稱(外文):A Study of Secret Sharing and Reversible Steganographic Techniques for Digital Images
指導教授:吳憲珠
指導教授(外文):Hsien-Chu Wu
學位類別:碩士
校院名稱:國立臺中技術學院
系所名稱:資訊科技與應用研究所
學門:電算機學門
學類:電算機應用學類
論文種類:學術論文
論文出版年:2006
畢業學年度:95
語文別:英文
中文關鍵詞:視覺機密分享資訊隱藏影像偽裝術
外文關鍵詞:Visual Secret SharingInformationImage Steganography
相關次數:
  • 被引用被引用:0
  • 點閱點閱:227
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本論文主要探索數位影像的隱藏技術並且將其應用於數位影像的機密分享以及利用數位影像來隱藏機密資訊以達到秘密通訊的目的。首先,本論文提出二個數位影像的機密分享技術,將數位影像視為機密影像,分享給多位參與者。
本論文的第一個分享技術可將多份彩色機密影像利用視覺機密分享(visual secret sharing)技術產生二張分享影像(share)並分別交給參與者。參與者可透過分享影像的疊合及水平旋轉,呈現出多份機密影像。實驗結果顯示,本技術不僅能有效的提升機密影像的隱藏容量,而且也具備高安全性。因為每一位參與者無法藉由單張分享影像得知機密影像的資訊。
本論文的第二個分享技術則是利用視覺機密分享技術產生二張有意義的彩色分享影像並分別交給參與者,參與者可透過分享影像的疊合,即可呈現彩色機密影像。有意義分享影像的優點在於分享影像在傳輸的過程之中,不易引起駭客的注意。本技術中,主要採用半色調技術(halftone technology)、掩護編碼表(cover coding table)及機密編碼表(secret coding table)將機密影像編碼成二張有意義的分享影像。實驗結果顯示,機密影像能夠藉由疊合分享影像的方法清楚地被還原,而且也具備高安全性,因為參與者無法藉由單張分享影像得知機密影像的資訊。
另一方面,利用數位影像來隱藏機密資訊以達到秘密通訊的目的是一個重要的課題。本論文提出一個植基於預測編碼的可逆式影像偽裝術(steganography),將機密資訊嵌入於掩護影像(host image)的壓縮檔中。本技術建構在無失真影像壓縮原理之下,主要可分為二大階段:預測編碼階段及熵編碼階段。本技術在預測編碼階段會產生誤差值及隱藏樹(hiding-tree),機密位元會藉由參考隱藏樹的方式嵌入於誤差值之中。而在取出機密位元時,同樣會藉由隱藏樹來還原原始的誤差值,進而還原掩護影像,以達到可逆式影像偽裝的目的。在實驗結果方面,本技術的平均隱藏量高達0.992 bpp而且掩護影像可被無失真的還原。另外,將機密資訊藏於影像壓縮檔的好處在於可避免傳統影像偽裝術將機密資訊隱藏非壓縮格式的問題且節省資料的傳輸時間。
This thesis focuses on digital image hiding and its applications in secret image sharing and embedding secret data into digital images to achieve communication security. First, this thesis presents two secret image sharing schemes for digital images and takes the digital image into the secret image and shares it with each participant.
The first proposed secret sharing scheme is based on the visual secret sharing scheme and makes two shares for each participant for multiple color secret images. The multiple secret images can be revealed by stacking and rotating shares. In experimental results, the proposed scheme can increase capacity for the visual secret sharing scheme and moreover provide safety, as the color secret image can not be revealed from a single share.
The second proposed secret sharing scheme is based on the visual secret sharing scheme and makes two meaningful shares for each participant for a color secret image. The color secret image can be revealed by stacking two meaningful shares. These meaningful shares will not arouse the attention of a hacker. Our scheme makes use of the halftone technique, cover coding table and secret coding table to generate two meaningful shares. Experimental results showed the meaningful shares can be stacked together to reveal the secret clearly. Our scheme has high security, because the color secret image can not be revealed from a single meaningful share.
In addition, hiding secret data in the digital image to achieve communication security is an important issue. In this thesis, a reversible image steganographic scheme based on predictive coding is proposed that embeds secret data into the host image compression codes. The proposed scheme is under the principle of lossless image compression which is mainly divided into two stages: the predictive coding stage and the entropy coding stage. The proposed scheme embeds secret data into error values by referring to a hiding-tree during the predictive coding stage. The secret data can be extracted by referring to the hiding-tree during the entropy decoding stage, and the host image can be recovered during the predictive decoding stage to achieve the objective of reversible image steganography. In the experimental results, the average capacity of the proposed scheme is 0.992 bit per pixel (bpp), and the host image is lossless. The advantage of the proposed scheme is to solve the problem of embedding secret data into raw format and saving transmission time on the Internet.
Contents

Abstract in Chinese II
Abstract in English IV
Contents VI
List of Tables VIII
List of Figures IX
Chapter 1 Introduction 1
1.1 Background and Motivation 1
1.2 Visual Secret Sharing 1
1.3 Image Steganography 3
1.4 Thesis Organization 5
Chapter 2 Preliminaries 6
2.1 Basic Visual Secret Sharing Scheme 6
2.2 The Halftone Technology 9
2.3 Basic Principle of Color 11
2.4 Hou’s Color Visual Secret Sharing Scheme 12
2.5 Basic Concept of Lossless Image Compression Technique 17
2.6 MED Predictor 18
2.7 Yu et al.’s Image-Hiding Scheme 20
Chapter 3 Multiple Image Sharing Based on Color Visual Cryptography 23
3.1 The Proposed Scheme 23
3.1.1 Generation of Color Halftone Images 25
3.1.2 Pixel Extraction from Color Halftone Images 26
3.1.3 Generation of Share 1 and Share 2 27
3.1.4 Generating a Complete Share 1 29
3.2 Experimental Results and Discussion 33
3.3 Summary 43
Chapter 4 Color Visual Secret Sharing Using Meaningful Shares 45
4.1 The Proposed Scheme 45
4.1.1 Color Halftone Transform and Pixel Extraction Procedures 47
4.1.2 Encoding and Decoding Procedures 48
4.2 Experimental Results and Discussion 54
4.3 Summary 57
Chapter 5 Reversible Image Steganographic Scheme via Predictive Coding 58
5.1 The proposed scheme 58
5.1.1 The Embedding Procedure 59
5.1.1.1 Predictive Coding and Encryption Secret Data 59
5.1.1.2 Building Hiding-tree 61
5.1.1.3 Secret Bits Embedding 65
5.1.2 The Extracting and Recovery Procedure 68
5.2 Experimental Results 69
5.3 Summary 73
Chapter 6 Conclusions 75
References

[1]A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Transactions on Image Processing, Vol. 13, 2004, pp. 1147-1156.
[2]G. Ateniese, C. Blundo, A. D. Santis and D. R. Stinson, "Visual cryptography for general access structures," Information and Computation, Vol. 129, 1996, pp. 86-106.
[3]W. Bender, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, 1996, pp. 313-336.
[4]C. Blundo and A. D. Santis, "Visual cryptography schemes with perfect reconstruction of black pixels," Journal for Computers & Graphics, Vol. 22, 1998, pp. 449-455.
[5]M. U. Celik, G. Sharma, A. M. Tekalp and E. Saber, "Reversible data hiding," Proceedings of IEEE International Conference on Image Processing, 2002, pp. 157-160.
[6]C. K. Chan and L. M. Chen, "Hiding data in images by simple LSB substitution," Pattern Recognition, Vol. 37, 2004, pp. 469-474.
[7]C. K. Chan and L. M. Cheng, "Improved hiding data in images by optimal moderately significant-bit replacement," IEE Electronics Letters, Vol. 37, 2001, pp. 1017-1018.
[8]C. C. Chang and G. I. Chen, "Enhancement algorithm for nonlinear context-based predictors," IEE Proceedings Vision, Image & Signal Processing, Vol. 150, 2003, pp. 15-19.
[9]C. C. Chang, T. S. Chen and L. Z. Chung, "A steganographic method based upon JPEG and quantization table modification," Informatics and Computer Science, Vol. 141, pp. 123-138, 2002.
[10]J. Chen, T. S. Chen, H. C. Hsu and H. W. Chen, "New visual cryptography system based on circular shadow images and fixed angle segmentation," Journal of Electronic Imaging (JEI), Vol. 14, 2005, 033018(1-5).
[11]W. J. Chen and S. C. Tai, "The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS," IEEE Transactions on Image Processing, Vol. 9, 2000, pp. 1309-1324.
[12]K. L. Chung, C. H. Shen and L. C. Chang, "A novel SVD- and VQ-based image hiding scheme," Pattern Recognition Letters, Vol. 2, 2001, pp. 1051-1058.
[13]R. W. Floyd and L. Steinberg, "An adaptive algorithm for spatial greyscale," Proceedings of the Society for Information Display, Vol. 17, 1976, pp. 75-77.
[14]J. Fridrich, M. Goljan and R. Du, "Invertible authentication," Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, Vol. 3971, 2001, pp. 197-208.
[15]J. Fridrich, M. Goljan and R. Du, "Lossless data embedding-New paradigm in digital watermarking," EURASIP Journal on Applied Signal Processing, Vol. 2002, 2002, pp. 185-196.
[16]M. Goljan, J. Fridrich and R. Du, "Distortion-free data embedding for images," Proceedings of 4th International Workshop on Information Hiding, Vol. 2137, 2001, pp. 27-41.
[17]C. W. Honsinger, P. Jones, M. Rabbani and J. C. Stoffel, "Lossless recovery of an original image containing embedd data," U.S. Patent 6278791 B1, Aug. 21, 2001.
[18]Y. C. Hou, "Visual cryptography for color images," Pattern Recognition, Vol. 36, 2003, pp. 1619-1629.
[19]J. Jiang, B. Guo and S. Y. Yang, "Revisiting the JPEG-LS prediction scheme," IEE Proceedings Vision, Image & Signal Processing, Vol. 147, 2000, pp. 575-580.
[20]X. Li and M. T. Orchard, "Edge-directed prediction for lossless compression of natural images," IEEE Transactions on Image Processing, Vol. 10, 2001, pp. 813-817.
[21]B. Macq and F. Deweyand, "Trusted headers for medical images," DFG VIII-D II Watermarking Workshop, Erlangen, Germany, 1999.
[22]L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread spectum image steganography," IEEE Transactions on Image Processing, Vol. 8, 1999, pp. 1075-1083.
[23]B. Meyer and P. Tischer, "TMW-a new method for lossless image compression," presented at Picture Coding Symposium, Berlin, Germany, 1997.
[24]J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, Vol. 13, 2006, pp. 285-287.
[25]M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptology-EUROCRYPT’94, Lecture Notes in Computer Science, Springer-Verlag, Vol. 950, 1995, pp. 1-12.
[26]National Bureau of Standards, "Data Encryption Standard," FIPS Publication, US Department of Commerce, Vol. 46, 1977.
[27]Z. Ni, Y. Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, 2006, pp. 354-362.
[28]H. Noda, J. Spaulding, N. N. Shirazi and E. Kawaguchi, "Application of bit-plane decomposition steganography to JPEG2000 encoded images," IEEE Signal Processing Letters, Vol. 9, 2002, pp. 410-413.
[29]N. Provos and P. Honeyman, "Hide and seek: an introduction to steganography," IEEE Security and Privacy Magazine, Vol. 1, 2003, pp. 32-44.
[30]V. Rijmen and B. Preneel, "Efficient colour visual encryption or 'Shared colours of Benetton'," Presented at the rump session of Eurocrypt'96, Also available at http://www.iacr.org/conferences/ec96/rump/preneel.ps
[31]R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, Vol. 21, 1978, pp. 120-126.
[32]B. Schneier, Applied Cryptography. New York: Wiley, 1996.
[33]A. Shamir, "How to share a secret," Communications of the ACM, Vol. 22, 1979, pp. 612-613.
[34]J. Spaulding, H. Noda, M. N. Shirazi and E. Kawaguchi, "BPCS steganography using EZW lossy compressed images," Pattern Recognition Letters, Vol. 23, 2002, pp. 1579-1587.
[35]C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, Vol. 36, 2003, pp. 2875-2881.
[36]J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, 2003, pp. 890-896.
[37]E. R. Verheul and H. C. A. V. Tilborg, "Constructions and properties of k out of n visual secret sharing scheme," Designs, Codes, and Cryptography, Vol. 1, 1997, pp. 179-196.
[38]C. D. Vleeschouwer, J. F. Delaigle and B. Macq, "Circular interpretation on histogram for reversible watermarking," Proceedings of IEEE 4th Workshop Multimedia Signal Processing. France, 2001, pp. 345-350.
[39]R. Z. Wang, C. F. Lin and J. C. Lin, "Hiding data in images by optimal moderately significant-bit replacement," IEE Electronics Letters, Vol. 36, 2000, pp. 2069-2070.
[40]R. Z. Wang, C. F. Lin and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, Vol. 34, 2001, pp. 671-683.
[41]D. C. Wu and W. H. Tsai, "Data hiding in images via multiple-based number conversion and lossy compression," IEEE Transactions on Consumer Electronics, Vol. 44, 1998, pp. 1406-1412.
[42]D. C. Wu and W. H. Tsai, "Spatial-domain image hiding using image differencing," IEE Proceedings Vision, Image & Signal Processing, Vol. 147, 2000, pp. 29-37.
[43]X. Wu and N. Memon, "Context-based, adaptive, lossless image coding," IEEE Transactions on Communications, Vol. 45, 1997, pp. 437-444.
[44]G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni and W. Su, "Distortionless data hiding based on integer wavelet transform," IEE Electronics Letters, Vol. 38, 2002, pp. 1646-1648.
[45]Y. H. Yu, C. C. Chang and Y. C. Hu, "Hiding secret data in images via predictive coding," Pattern Recognition, Vol. 38, 2005, pp. 691-705.
[46]X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, Vol. 12, 2005, pp. 67-70.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top