跳到主要內容

臺灣博碩士論文加值系統

(2600:1f28:365:80b0:879a:e16d:38fe:36d8) 您好!臺灣時間:2024/12/13 08:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:盧宏文
研究生(外文):Hung-Wen Lu
論文名稱:具可適應性與可匹配性之灰階影像藏密演算法之研究
論文名稱(外文):A Study of Adaptive and Matching Steganographic Algorithms for Grayscale Images
指導教授:王宗銘王宗銘引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學與工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
畢業學年度:96
語文別:中文
論文頁數:56
中文關鍵詞:偽裝學可適應性人類視覺靈敏度最低位元匹配嵌入法資料隱藏
外文關鍵詞:Steganographyadaptivehuman visual sensitivityLSB matchingdata hiding
相關次數:
  • 被引用被引用:0
  • 點閱點閱:191
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本論文針對灰階影像提出兩種新類型的影像藏密學技術。第一種類型為具有最少失真性的LSBS (Least Significant Bit Substitution ) 藏密學技術,此技術可改善以LSB嵌入方式為主的藏密學技術所產生的影像失真。新方法的基本概念如下:在嵌入秘密訊息時,我們以3個像素為一組,來嵌入3個位元的訊息。這種利用像素間相互影響的關係,來嵌入秘密訊息,可以有效的減少影像數值可能的變動量。使用我們的新方法,當我們在3個像素中欲嵌入3個位元的秘密訊息時,僅有1個像素的數值會被加1或減1的機率為8分之6;2個像素同時被修改且其像素數值至多被加1或減1的機率為8分之1;3個像素均無需修改的機率為8分之1。平均而言,每一個像素數值可能被修改的機率僅有0.333。實驗結果顯示,我們的方法有效地減少像素數值可能的變動量,故所產生的偽裝影像僅具有極少的失真性。在訊息擷取時,我們的方法不僅具效率性,也具備盲擷取特性;無需原始掩護影像,即可正確無誤的擷取秘密訊息。
本論文所提的第二種類型技術為植基於人類視覺靈敏度之可適應性藏密學技術。此技術主要的研究貢獻是雖在嵌入大量的秘密訊息後,仍能產生一張具有高影像品質的偽裝影像。本技術對於單一像素可嵌入秘密訊息容量的多寡取決於原始掩護影像區域性複雜度的高低。我們將一張影像內容的複雜度分成五個等級;等級愈低代表該區域影像紋理變化愈單調,故嵌入較少的秘密訊息,以避免引起明顯地視覺失真,降低偽裝影像品質;相對地,等級愈高則代表區域影像紋理變化愈複雜,故雖然我們嵌入較多的秘密訊息,但其所引起的掩護影像失真度對於人類視覺仍然是不可視的。我們的技術可以保證在不同區域等級的像素嵌入訊息後,像素之等級仍可維持其一致性,故技術本身亦具備盲擷取性。實驗結果證實:相較於現存可適應性藏密學技術,我們的技術能產生具有更小失真的偽裝影像。
In this thesis, we present two novel steganographic techniques for grayscale images. The first technique we propose is a novel LSB matching steganographic algorithm, which provides the minimal degradation of the cover image when embedding the secret message. In conventional algorithms, the probability of pixel modification is 0.5 on average when embedding one bit of secret message into each pixel. In contrast, our new scheme groups three pixels together to convey three bits of secret message. This reduces the probability of pixel modification to as low as 0.333 on average. As a result, our algorithm offers a higher visual quality of the stego image. Experimental results have proven the superiority of our new scheme over previous algorithms.
The second technique we present is a novel adaptive steganography for digital grayscale images based on the human visual sensitivity. Our scheme can reduce the visual quality degradation significantly after the data embedding. The payload of each pixel in the cover image is various and the size of payload is assessed by the local image complexity. Basically, we embed more messages into complex areas than smooth areas taking advantage to preserve the features of the original cover image. Our scheme is efficient and belongs to the blind extraction since we maintain the consistent information held for the image complexity after the data embedding. Experimental results demonstrate that the visual quality produced by our scheme is better than that generated by the existing techniques.
致謝 i
中文摘要 ii
英文摘要 iii
目錄 iv
圖目錄 vi
表目錄 viii
第一章 簡介.....1
1-1 研究動機.....1
1-2 研究目標.....8
1-3 論文架構...... 9
第二章 相關工作及研究..... 11
2-1 簡易型LSBs嵌入技術...... 11
2-2 最佳化LSBs嵌入技術..... 12
2-3 LSB匹配嵌入技術..... 13
2-4 基於像素差值的影像藏密學技術...... 15
2-5 多樣式基底且符合人類視覺靈敏度的影像藏密學技術......19
第三章 新型且具有最少失真性的LSBs匹配藏密學技術...... 24
3-1 訊息嵌入過程...... 24
3-2 訊息取出過程...... 30
3-3 實驗結果與分析比較...... 30
3-4 結論...... 35
第四章 基於人類視覺靈敏度之可適應性藏密學技術...... 36
4-1 訊息嵌入過程...... 36
4-1-1 影像區塊之直方圖統計..... 37
4-1-2 資料嵌入的方法...... 38
4-1-3 子影像複雜度等級的一致性校正......38
4-2 訊息取出過......41
4-3 實驗結果與分析比較......42
4-4 結論......49
第五章 結論及未來工作.....51
5-1 結論......51
5-2 未來研究工作.....52
參考文獻.....53
中英對照表..... 57
英中對照表......61
[Alat2004] A. M. Alattar, “Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147–1156, August 2004.
[Ande1998] R. J. Andersen and F. A. P. Petitcolas, “On the Limits of Steganography,” IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, Vol. 16, No. 4, pp. 474-481, May 1998.
[Besd2005] E. Besdok, “Hiding Information in Multispectral Spatial Images,” Journal of Electronics and Communications, Vol. 59, pp. 15-24, 2005.
[Cald2006] R. Caldelli, F. Filippini and M. Barni, “Joint Near-Lossless Compression and Watermarking of Still Images for Authentication and Tamper Localization,” Signal Processing: Image Communication, Vol. 21, pp. 890-903, November 2006.
[Celi2005] M.U.Celik,G.S.,A.M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on ImageProcessing, Vol. 14, pp. 253-266, February 2005.
[ Chan2003] C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, pp. 1583-1595, July 2003.
[ Chan2004a] C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSBSubstitution,” Pattern Recognition, Vol. 37, pp. 469-474, March 2004.
[Chan2004b] C. C. Chang and H. W. Tseng, “A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letters, No. 25, pp. 1431–1437, June 2004.
[Chen2001] B. Chen and G. W. Wornell, “Quantization Index Modulation Methods: A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Transactions on Information Theory, Vol. 47, No. 4, pp. 1423-1443, May 2001.
[ Cox1996] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “A Secure, Robust Watermark for Multimedia,” Lecture Notes In Computer Science(Proceedings of the First International Workshop on Information Hiding), Vol. 1174, pp. 185-206, 1996.
[ Cox2001] I. J. Cox and M. L. Miller, “Electronic Watermarking: the First 50 Years,” 2001 IEEE Fourth Workshop on Multimedia Signal Processing, pp. 225-230, October 2001.
[Fu2002] M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing, Vol. 11, No. 4, pp. 477-484, 2002.
[John1998] N. F. Johnson and S. Jajodia, “Steganography: Seeing the Unseen,” IEEE Transactions on Computers, Vol. 31, pp. 26-34, February 1998.
[Kams2005] L. Kamstra and H. J. A. M. Heijmans, “Reversible Data Embedding into Images Using Wavelet Techniques and Sorting,” IEEE Transactions on Image Processing, Vol. 14, No. 12, pp. 2082–2090, December 2005.
[Lyu2005] S. Lyu and H. Farid, “How Realistic is Photorealistic?,” IEEE Transactions on Signal Processing Supplement on Secure Media, Vol. 53, No. 2, pp. 845-850, February 2005.
[Miel2006] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, May 2006.
[ Peti1999] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding--A Survey,” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Vol. 87, pp. 1062-1078, July 1999.
[Stei2001] Y. Steinberg and N. Merhav, “Identification in The Presence of Side Information With Application to Watermarking,” IEEE Transactions on Information Theory, Vol. 47, No. 4, pp. 1410-1422, May, 2001.
[Simm1983] G. J. Simmons, “The Prisoners'' Problem and the Subliminal Channel,” Proceedings of CRYPTO''83, pp. 51-67, 1983.
[Tana1990] K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding Secret Information Into A Dithered Multi-Level Image,” In: Proceedings of IEEE International Conference on Image Processing, pp. 216-220, 1990.
[Thie2003] C. C. Thien and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-By-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, pp. 2875-2881, December 2003.
[Tsen2002a] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A Secure Data Hiding Scheme for Binary Images,” IEEE Transactions on Communications, Vol. 50, pp. 1227-1231, August 2002.
[Tsen2002b] Y. C. Tseng and H. K. Pan, “Data Hiding in 2-Color Images,” IEEE Transactions on Computers, Vol. 51, No. 7, pp.873-878, July 2002.
[ Tzen2004a] C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping With Security Protection,” IEEE Transactions on Communications, Vol. 52, pp. 791-800, May 2004.
[Tzen2004b] C. H. Tzeng and W.-H. Tsai, “A New Approach to Authentication of Binary Image for Multimedia Communication With Distortion Reduction and Security Enhancement,” IEEE Communications Letters, Vol. 7, September 2004.
[Wang2001] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol. 34, pp. 671-683, March 2001.
[Wang2005] S. J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, pp. 99-116, January 2005.
[Wang2006] C. M. Wang and P. C. Wang, “Steganography on Point-Sampled Geometry,” Computers & Graphics, Vol. 30, pp. 244-254, April 2006.
[Wang2008] C. M. Wang, N. I. Wu, C. S. Tsai and M. S. Hwang, “A High Quality Steganographic Method With Pixel-Value Differencing and Modulus Operation,” The Journal of Systems and Software, Vol. 81, pp. 150-158, January 2008.
[Wu2003] D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, June 2003.
[Wu2004] M. Wu and B. Liu, “Data Hiding in Binary Image for Authentication and Annotation,” IEEE Transactions on Multimedia, Vol. 6, pp. 528-538, August 2004.
[Wu2005] H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings on Vision, Image, and Signal Processing, Vol. 152, No. 5, pp. 611-615, October 2005.
[Wu2007] N. I. Wu and M. S. Hwang, “Data hiding: Current Status and Key Issues,” International Journal of Network Security, Vol. 4, pp.1-9, January 2007.
[Yang2007] H. Yang and A. C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication By Connectivity-Preserving,” IEEE Transactions on Multimedia, Vol. 9, pp. 475–486, April 2007.
[Yang2008] C. H. Yang, “Inverted Pattern Approach to Improve Image Quality of Information Hiding by LSB Substitution,” Pattern Recognition, in press, accepted manuscript, available online, February 2008.
[Zhan2005] X. Zhang and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, pp. 67-70, January 2005.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊