跳到主要內容

臺灣博碩士論文加值系統

(3.235.56.11) 您好!臺灣時間:2021/07/29 03:32
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:郭晉廷
研究生(外文):Jin-ting Kuo
論文名稱:資訊隱藏技術應用於半色調影像之研究
論文名稱(外文):A Study of Information Hiding Based on Halftone Images
指導教授:曾顯文曾顯文引用關係
指導教授(外文):Hsien-Wen Tseng
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:97
語文別:中文
論文頁數:51
中文關鍵詞:DHSPT半色調影像格雷碼可逆式資訊隱藏直方圖修改
外文關鍵詞:Reversible hidingHalftone imageHistogram modificationGray codeDHSPT
相關次數:
  • 被引用被引用:2
  • 點閱點閱:628
  • 評分評分:
  • 下載下載:39
  • 收藏至我的研究室書目清單書目收藏:0
在現今網際網路普及的時代,造就了使用者利用便利與快速的網路環境,來傳遞彼此間的數位資訊。然而在一般安全機制的網路環境中,傳輸的資料很容易被截取,為了避免重要資料在網路傳輸中遭任意複製、竄改及偽造,故資訊隱藏技術便應運而生。目前的許多文獻都是以灰階或彩色影像為研究的方向,然而在日常生活中半色調影像廣泛使用在書籍、傳真、影印等等非彩色的影像資料上。我們希望能在半色調影像裡嵌入一些有用的資訊,像是將浮水印嵌入在影像中做版權的保護,或者是做影像是否被破壞的偵測。在本篇論文裡我們將提出兩個資訊隱藏方法,第一個方法是針對半色調影像的可逆式資訊隱藏技術,所謂可逆式資訊隱藏即是影像在取出嵌入資訊後可以回復到原始狀態。我們將Ni等學者所提之直方圖修改技術,結合格雷碼編碼的概念進一步應用在半色調影像上,達到在嵌入大量資訊的同時,還可以兼顧到影像品質,不至於被破壞的太嚴重。第二個方法是一個不可逆的資訊隱藏技術,此方法利用重疊區塊來嵌入秘密資訊,並結合Fu學者所提之DHSPT(Data Hiding by Smart Pair Toggling)概念,使我們可獲得更高的藏入量,並且影像品質將不會有明顯失真。
With the great advance of technology and the well popularization of Internet, people always transmit digital data on Internet. Although it is very convenient, the transmission of data could be intercepted by anyone in this environment. To avoid the important data to be copied, garbled or faked, data hiding (steganography) appeared. In current literature of data hiding techniques, most are applied to grayscale and color images. In the other side, halftone images also have great applications, such as the printing of books, newspapers, magazines and computer printers. It is often desirable to embed data into the halftone images as value-added content, or for copyright control and authentication purposes. In this research, we proposed two data hiding techniques for halftone image. One of the methods is a reversible data hiding scheme. The image can be restored to original image after the data is extracted. We modified Ni''s method of histogram and combined the concept of Gray Code to the hiding method. This method not only has high hiding capacity, but also can generate stego-images with good quality. The second method is not a reversible data hiding method, but it can provide a large hiding capacity. It is a great improvement of Fu’s DHSPT scheme. The overlapping blocks are used to embed the secret data and the stego-images can be generated without noticeable distortion.
目 錄
摘 要 I
ABSTRACT II
誌 謝 III
目 錄 IV
圖 目 錄 VI
表 目 錄 VIII
第一章 緒 論 1
1.1研究動機 1
1.2研究目的 2
1.3論文架構 2
第二章 文獻探討 3
2.1 資訊隱藏 3
2.2 半色調影像 6
2.3 格雷碼(GRAY CODE) 8
2.4使用直方圖修改之資訊隱藏技術 9
2.5 FU等學者所提之DHST、DHPT、DHSPT方法 12
第三章 植基於直方圖格雷碼編碼之可逆式資訊隱藏方法 16
3.1 研究方法 16
3.1.1 格雷碼(Gray code)區塊編碼 16
3.1.2 嵌入 18
3.1.3 取出和回復 19
3.2 實驗結果 20
第四章 使用重疊區域之高藏入量資訊隱藏技術 24
4.1 研究方法 24
4.1.1 嵌入 24
4.1.2 取出 28
4.2 實驗結果 29
第五章 結論與未來工作 36
5.1 結論 36
5.2 未來工作 36
參考文獻 38

圖 目 錄
圖2-1 資訊隱藏技術分類圖 4
圖2-2 格雷碼 9
圖2-3 找峰值點和零值點 11
圖2-4 位移 11
圖2-5 嵌入 11
圖3-1 區塊編碼 17
圖3-2 區塊編碼 18
圖3-3 門檻值與藏入量對照曲線圖 23
圖3-4 門檻值與額外資訊對照曲線圖 23
圖3-5 LENA直方圖 24
圖3-6 BABOON直方圖 25
圖3-7 AIRPLANE直方圖 26
圖3-8 PEPPER直方圖 24
圖3-9 的原始影像 25
圖3-10 TH =20之嵌入後影像圖 26
圖3-11 TH =120之嵌入後影像圖 27
圖4-1 範圍區塊分解圖 25
圖4-2 512 512的原始影像 32
圖4-3 FU所提之DHST嵌入後影像圖 33
圖4-4 FU所提之DHSPT嵌入後影像圖 34
圖4-5 我們所提之方法嵌入後影像圖 35

表 目 錄
表3-1 不同門檻值所得到之藏入量 22
表3-2 不同門檻值所產生之額外資訊 22
表4-1 BIT MAP中A類區塊總數和B類區塊總數 31
表4-2 所提方法與FU的DHST和DHSPT比較 31
表4-3 經算數編碼壓縮後的額外資訊 31
[1]陳柏如 (2002), “數位時式著作權集體管理之研究” ,國立台灣大學法律學研究所碩士論文。
[2]李遠坤、陳玲惠 (1999), “數位影像之資訊隱藏技術探討”,資訊安全通訊,第五卷,第四期,第18-30頁。
[3]張真誠、陸哲明、呂慈純 (2007), “多媒體安全技術” ,全華。
[4]A. M. Alattar(2003), “Reversible Watermark Using Difference Expansion of Triplets,” Proc. IEEE Int. Conf. Image Processing, Vol. 1, pp. 501-504.
[5]A. M. Alattar(2004), “Reversible Watermark Using Difference Expansion of Quads,” Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 3, pp. 377-380.
[6]A. M. Alattar(2004), “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Trans. Image Processing, Vol. 13, no. 8, pp. 1147-1156.
[7]Z. Baharav, D. Shaked(1999), “Watermarking of Dither Halftone Images,” Hewlett-Packard Labs Tech Rep, HPL-98-32.
[8]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber(2002), “Reversible Data Hiding,” Proc. Int. Conf. Image Processing, pp.157-160.
[9]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber(2005), “Lossless Generalized-LSB Data Embedding,” IEEE Trans. Image Processing, Vol. 14, no. 2, pp. 253-265.
[10]C. C. Chang and H. W. Tseng(2004), “VQ-based Image Watermarking Using Anti-Gray Coding,” Informatica, Vol. 15, no. 2, pp. 147-160.
[11]C. C. Cheng, W. L. Tai, and M. H. Lin(2005), “A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization,” Proc. Int. Conf. Advanced Information Networking and Application, Vol. 1, pp. 947-952.
[12]R. W. Floyd, L. Steinberg (1976), “An Adaptive Algorithm for Spatial Grayscale,” Proceedings of Society for Information Display, Vol. 17(2), pp. 75-77.
[13]J. Fridrich, M. Goljan, and R. Du(2001), “Distortion-free Data Embedding for Images,” Proc. 4th Workshop Information Hiding, Vol. 2137, pp. 27-41.
[14]J. Fridrich, M. Goljan, and R. Du(2001), “Invertible Authentication,” Proc. SPIE, Security and Watermarking of Multimedia Contents III, Vol. 3971, pp. 197-208.
[15]J. Fridrich, M. Goljan, and R. Du(2001), “Invertible Authentication Watermark for JPEG Images,” Proc. Int. Conf. Information Technology: Coding and Computing, pp. 223-227.
[16]J. Fridrich, M. Goljan, and R. Du(2002), “Lossless Data Embedding-New Paradigm in Digital Watermarking,” EURASIP J. Appl. Siginal Processing, Vol. 2002, no. 2, pp. 185-196.
[17]J. Fridrich, M. Goljan, and R. Du(2002), “Lossless Data Embedding for All Image Formats,” Proc. SPIE Security and Watermarking of Multimedia Contents IV, Vol. 4675, pp. 572-583.
[18]C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel(1999), “Lossless recovery of an original image containing embedded data,” US Patent Application, no. US6278791.
[19]H. C. Huang, F. H. Wang, and J. S. Pan(2002), “A VQ-based Robust Multi-Watermarking Algorithm,” IEICE Trans. Fund., Vol. E85-A, no. 7, pp. 1719-1726.
[20]L. Kamstra and Henk J. A. M. Heijmans(2005), “Reversible Data Embedding Into Images Using Wavelet Techniques and Sorting,” IEEE Trans. Image Processing, Vol. 14, no. 12, pp. 2082-2090.
[21]A. Leest, M. Veen, and F. Bruekers(2003), “Reversible Image Watermarking,” Proc. IEEE Int. Conf. Image Processing, Vol. 2, pp. 731-734.
[22]Wei Lu, Hongtao Lu, Fu-Lai Chung(2006), “Robust digital image watermarking based on subsampling,” Applied Mathematics and Computation, Vol. 181, pp. 354-362.
[23]P. S. Liao, J. S. Pan, Y. H. Chen, B. Y. Lioa(2005), “A Lossless Watermarking Technique for Halftone Images,” International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, pp.593-599.
[24]Der-Chyuan Lou, Hao-Kuan Tso, Jiang-Lung Liu(2007), “A copyright protection scheme for digital images using visual cryptography technique,” Computer Standards & Interfaces, Vol. 29, pp. 125-131.
[25]Z. Ni, Y. Q. Shi, N. Ansari and W. Su(2006), “Reversible Data Hiding,” IEEE Trans. Circuits Syst. Video Technol., Vol. 16, no. 3, pp. 354-362.
[26]F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn(1999), “Information Hiding – A Survey,” Proceedings of the IEEE, Vol. 87, no. 7, pp. 1062-1078.
[27]D. M. Thodi and J. J. Rodrigues(2004), “Reversible Watermarking by Prediction-Error Expansion,” Proc. 6th IEEE Southwest Symposium Image Analysis and Interpretation, Vol. 3, pp.21-25.
[28]J. Tian and R. O. Wells(2004), ”Reversible Data-Embedding with a Hierarchical Structure,” Proc. ICIP Int. Conf. Image Processing, Vol. 5, pp. 3419-3422.
[29]J. Tian(2002), “Wavelet-based Reversible Watermarking for Authentication,” Proc. SPIE Security and Watermarking of Multimedia Contents IV, Vol. 4675, pp. 679-690.
[30] Ming Sun Fu, Oscar C. Au(2002) “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing, Vol.11, no.4, pp. 477-484.
[31] Ming Sun Fu, Oscar C. Au(2001), “Improved Halftone Image Data Hiding with Intensity Selection” IEEE Transactions on Image Processing, Vol.5, no.4, pp. 243-246.
[32] Ming Sun Fu, Oscar C. Au(2004), “Correlation-based Watermarking for Halftone Images” Proceedings of the 2004 International Symposium on Circuits and Systems, Vol. 2, pp. 21-24.
[33]Ming Sun Fu, Oscar C. Au(2003) , “A Novel Method to embed Watermark in Different Halftone Images: Data Hiding by Conjugate Error Diffusion(DHCED)” IEEE International Conference on ICASSP, Vol. 3, pp. 529-532.
[34]J. S. Pan, H. Luo, Z. M. Lu(2006), “A Lossless Watermarking Scheme for Halftone Image Authentication,” International Journal of Computer Science and Network Security, Vol. 6, no.2B , pp.147-151.
[35]F.A.P. Petitcolas, R. J. Anderson and M. G. Kuhn(1999), “Information hiding-a survey,” proceedings of the IEEE, Vol87, no.7, pp.1062-1078.
[36]K. J. Sankar, V. M. Pandharipande, P. S. Moharir(2004), “Generalized Gray codes,” Intelligent Signal Processing and Communication Systems, pp. 654-659.
[37]J. Tian(2003), “High Capacity Reversible Data Embedding and Content Authentication,” Proc. IEEE Int. Conf. Acoustics, Speech, and signal Processing, Vol. 3, pp. III-570-20.
[38]J. Tian(2003), “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. and Video Technol., Vol. 13, no. 8, pp. 890–896.
[39]R. Ulichney(1987), “Digital Halftoning,” MIT Press, Cambridge, MA.
[40]C. De. Vleeschouwer, J. F. Delaigle, and B. Macq(2001), “Circular Interpretation of Histogram for Reversible Watermarking,” Proc. IEEE 4th Workshop Multimedia Signal Processing, pp. 345-350.
[41]C. De. Vleeschouwer, J. F. Delaigle, and B. Macq(2003), “Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management,” IEEE Trans. Multimedia, Vol. 5, no. 1, pp. 97–105.
[42]G. Xuan, C. Yang, Y. Zhen, Yun Q. Shi, Z. Ni(2004), “Reversible Data Hiding based on Wavelet Spread Spectrum,” IEEE Workshop Multimedia Signal processing, pp. 211-214.
[43]B. Yang, M. Schmucker, C. Busch, X. Niu, and S. Sun(2004), “Approaching Optimal Value Expansion for Reversible Watermarking,” Proc. 7th Workshops Multimedia and Security, pp. 95-102.
[44]B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun(2004), “Integer DCT-based Reversible Watermarking for Images Using Companding Technique,” Proc. SPIE, Vol. 5306, pp. 405-415.
[45]B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun(2004), “Reversible Image Watermarking by Histogram Modification for Integer DCT Coefficients,” Proc. IEEE 6th Workshop Multimedia Signal Processing, pp. 143-146.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top