跳到主要內容

臺灣博碩士論文加值系統

(44.192.95.161) 您好!臺灣時間:2024/10/16 02:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:李根慶
研究生(外文):Ken-Ching Lee
論文名稱:使用距離轉換的適應性二元影像資訊隱藏
論文名稱(外文):An Adaptive Information Hiding in Binary Image Using Distance Transform
指導教授:楊權輝楊權輝引用關係
指導教授(外文):Chyang-Huei Yang
學位類別:碩士
校院名稱:玄奘大學
系所名稱:資訊科學學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:50
中文關鍵詞:資料隱藏距離轉換二元影像
外文關鍵詞:data hidingdistance transformbinary image
相關次數:
  • 被引用被引用:0
  • 點閱點閱:228
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在本篇論文中我們對在二元影像隱藏資料感到興趣。被隱藏的資料可以很容易的嵌入一張二元影像,也可以不需要原始影像而很輕易的將之萃取出來。在隱匿學領域裡很多學者將資料隱藏在影像中的物件邊緣上以避免影像被破壞。他們以一個複雜的對照表來決定將所藏的位置上的像素為翻轉或是僅註記而不動。
我們在此提出一個簡單而且不容易察覺到的資料隱藏方法,利用數學型態學上的遞迴侵蝕作用來找出棋盤距離而不用對照一個複雜的表格。我們將掩護影像分成3乘3不重疊的小區塊。我們在這些區塊中檢驗其棋盤距離不大於二的個數,若大於或等於1到小於或等於8之間,則視欲嵌入的位元為0或1,對此小區塊的中心點,採取反轉或註記。而要隱藏的資料則先轉為二元流,利用擬亂數產生器將之打亂,然後以反轉或註記藏在先前利用距離轉換所找到的位置。萃取時則將含有隱藏資料的影像,計算其棋盤距離,找出可能藏的區塊,取其中點然後將之串連起來,再用原來嵌入時用的擬亂數產生器找回隱藏的資料原始的二元流順序。由實驗結果顯示,我們的方法簡單而有不錯的效果。
In this paper we are interested in hiding data in a binary image. The hidden data can be easily to be embedded in a binary image and to be extracted without using the original image. In steganography area many authors usually embed the binary data into the boundary of the objects in an image to avoid the distortion. They flip or mark a pixel that is an embedded pixel with a complicate set of look-up tables.
We proposed a simple and imperceptible data hiding method that uses the chessboard distance transform by recursive erosion operation of mathematical morphology to find the embedding location without using the complicate set of look-up tables. We divide the cover image into small non-overlapping 3 by 3 blocks images. We just flip or mark the embedding location, the center of the block, which has at least one and no more than eight smallest distances to the outside boundary. The hidden data are first transferred into a bit stream, shuffled them by a pseudo-random generator then embedded in the location that set up by the distance transformation. We simply read the center of each non-overlapping 3 by 3 embedding candidate block to extract the embedded data. Then we use the same pseudo-random generator to shuffle back the order to find the original secret data. The experiment results show our method is simple and quite imperceptible.
目錄
中文摘要 ......................................................... Ⅰ 英文摘要 ......................................................... Ⅱ 誌謝 ............................................................ III 目錄 ............................................................. IV表目錄 ........................................................... VI圖目錄 .......................................................... VII 第一章 序論 ....................................................... 01
1.1 研究背景與動機 ............................................... 01 1.2 研究目的 .................................................... 02 1.3 論文架構 .................................................... 03
第二章 文獻回顧 ................................................... 04
2.1 資訊隱藏 .................................................... 04 2.2 隱匿學 ...................................................... 05 2.3 相關研究 .................................................... 06
第三章 本文提出的方法 .............................................. 11
3.1 距離轉換 .................................................... 12 3.2 嵌入演算法 .................................................. 13 3.3 萃取演算法 .................................................. 17
第四章 實驗結果 ................................................... 20 第五章 結論與未來工作 .............................................. 37參考文獻 ......................................................... 38
[1] B. Pfitzmann,“Information Hiding Terminology,"Proceeding of the first workshop on Information Hiding, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Cambridge, UK, pp. 347-350
[2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn,“Information Hiding : A-Survery,"Proceedings of IEEE, Vol. 87, No. 7, Jul. 1999, pp. 1062-1078.
[3] G. L. Simmons,“The prisoners and subliminal channels,"Proc. Annu. Int. Cryptology Conf, SantaBarbara, CA, 1984, pp. 51-67
[4] Jeanne Chen, Tung-Shou Chen, and Meng-Wen Cheng,“A New Data Hiding Method in Binary Image,"Proceedings of the IEEE Fifth International Symposium on Multimedia Software Engineering (ISMSE 03)
[5] Ming Sun Fu, and Oscar C. Au,“Data Hiding Watermarking for Halftone Images,"IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 11, NO. 4, APRIL 2002, pp.477-484
[6] Ming Sun Fu, Oscar C. Au,“Data Hiding in Halftone Images by Conjugate Error Diffusion,"IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, May 2001, pp. 1965-1968
[7] Hae Yong Kim, Amir Afif,“Secure Authentication Watermarking for Binary Images,"Proceedings of the XVI Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 03)
[8] Haiping Lu, Alex C. Kot, and Rahardja Susanro,“BINARY IMAGE WATERMARKING THROUGH BIASED BINARIZATION,"IEEE International Conference on Multimedia & Expo (ICME) 2003, pp.III.101 - III.104
[9] Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot and Lihui Chen,“Watermark Embedding in DC Components of DCT for Binary Images,"Multimedia Signal Processing, IEEE Workshop on Volume, 2002, pp.300-303
[10] Shao-Hui Liu ,Tian-Hang Chen, Hong-Xun Yao, and Wen Gao,“A VARIABLE DEPTH LSB DATA HIDING TECHNIQUE IN IMAGES,"Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, 26-29 August 2004
[11] F. Y. Shih and C.-H. T. Yang,“On solving exact Euclidean distance transformation with invariance to object size,"Proc. IEEE Conf. Computer Vision and Pattern Recognition, New York City, NY, June 1993, pp. 607-608.
[12] Phil Sherry and Andreas Savakis,“IMPROVED TECHNIQUES FOR WATERMARKING HALFTONE IMAGES,"ICASSP 2004,pp.V1005-V1008
[13] Chih-Hsuan Tzeng and Wen-Hsiang Tsai,“A New Approach to Authentication of Binary Images for Multimedia Communication With Distortion Reduction and Security Enhancement,"IEEE COMMUNICATIONS LETTERS, VOL. 7, NO. 9, SEPTEMBER 2003, pp. 443-445
[14] Yu-Chee Tseng and Hsiang-Kuang Pan,“Secure and Invisible Data Hiding in 2-Color Images,"IEEE INFOCOM, 2001, pp. 887-896
[15] Chun-Chieh Wang and Long-Wen Chang,“High Capacity Binary Image Steganography,"18th Conference on Computer Vision, Graphics and Image Processing (CVGIP 2005), Taipei, ROC, August, 2005, pp. 1309-1316
[16] Hsi-Chun Alister Wang,“Data Hiding Techniques for Printed Binary Images,"International Conference on Information Technology: Coding and Computing (ITCC 01) 2001, pp. 055
[17] Min Wu, and Bede Liu,“Data hiding in binary image for authentication and annotation,"IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 4, AUGUST 2004, pp. 528-538
[18] Huijuan Yang and Alex C. Kot,“DATA HIDING FOR BI-LEVEL DOCUMENTS USING SMOOTHING TECHNIQUE,"IEEE International Symposium on Circuits and Systems (ISCAS) 2004, pp.V692-V695
[19] 王旭正、柯宏叡、ICCL-資訊密碼暨建構實驗室,「資訊與網路安全:秘密通訊與數位鑑識新技法」,博碩文化股份有限公司,2006
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top