(3.235.191.87) 您好!臺灣時間:2021/05/13 14:34
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:詹珮雯
研究生(外文):Jhan,Pei-Wun
論文名稱:二種基於EMD及矩陣編碼方式之資料藏匿演算法
論文名稱(外文):Two Improved Data Hiding Algorithms Respectively Based on the Methods of EMD and Matrix Encoding
指導教授:黃育銘
指導教授(外文):Huang,Yuh-Ming
口試委員:阮夙姿謝孫源黃育銘
口試委員(外文):Juan,Su-TzuHsieh,Sun-YuanHuang,Yuh-Ming
口試日期:2011-07-27
學位類別:碩士
校院名稱:國立暨南國際大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:54
中文關鍵詞:EMD矩陣編碼資料藏匿漢明碼+1
外文關鍵詞:EMDMatrix encodingData HidingHamming+1
相關次數:
  • 被引用被引用:0
  • 點閱點閱:339
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:25
  • 收藏至我的研究室書目清單書目收藏:0
所謂資料隱藏(Data Hiding)就是將所要隱藏的資訊嵌入於掩蓋圖,例如一張影像,使得影像不輕易被肉眼察覺到有任何的異常。以失真度與嵌入率來做評估資料隱藏的好或壞。在本論文中我們提出兩種改進資料隱藏方法。一是基於EMD資料隱藏演算法來提高影像品質,二是改善矩陣編碼演算法利用漢明碼+1之概念來提高影像品質。以上兩種提出改進方法經由理論分析以及實驗證實其影像品質確實大幅提升。
The meaning of information (data) hiding is to embed the information into a cover host, such as an image. Usually, the naked eye of the people cannot perceive any change when the image is modified slightly. The evaluation of data hiding schemes should be done by the distortion (or called Mean Square Error; MSE) and the embedding rate (the average number of bits embedded in a pixel). In this dissertation, we propose two improved data hiding schemes. One is to improve the EMD (Exploiting Modification Direction)-based data hiding algorithm to have higher image quality. The other is to improve the Matrix encoding-based data hiding algorithm by using the idea of Hamming+1 to further improve the image quality. Both proposed improved schemes are verified to be correct through the theoretical analysis and the experiment.
致謝i
摘要iii
ABSTRACTiv
目錄v
圖片目錄viii
表格目錄x
第一章 緒論1
1.1前言1
1.2研究動機與目的2
1.3論文架構3
第二章 文獻探討4
2.1 EMD資料隱藏法 4
2.1.1訊息嵌入方法及取出方法5
2.1.2失真度的理論分析6
2.2高藏匿容量之EMD隱藏法6
2.2.1訊息嵌入方法及取出方法7
2.2.2失真度的理論分析8
2.3高品質高藏匿容量之EMD隱藏法9
2.3.1訊息嵌入方法及取出方法9
2.3.2失真度的理論分析10
2.4矩陣編碼之方式12
2.5(7, 4)漢明碼之資料隱藏法13
2.5.1訊息嵌入方法及取出方法13
2.5.2失真度的理論分析14
2.6高品質矩陣編碼之資料隱藏法15
2.6.1訊息嵌入方法及取出方法15
2.6.2失真度的理論分析17
第三章 基於EMD及矩陣編碼方式之資料藏匿演算法18
3.1基於EMD方式之資料藏匿演算法18
3.1.1系統架構18
3.1.2訊息嵌入及取出流程19
3.1.3失真度的理論分析20
3.2基於矩陣編碼方式之資料藏匿演算法23
3.2.1 系統架構23
3.2.2 (5, 3)線性碼24
3.2.3訊息嵌入方式及取出方式25
3.2.4失真度的理論分析30
第四章 實驗結果31
4.1 基於EMD方式之資料藏匿技術之實驗結果比較32
4.2基於矩陣編碼方式之資料藏匿之實驗結果比較45
第五章 結論與未來展望52
5.1結論52
5.2未來展望52
參考文獻53
圖片目錄
圖2-1:5-ary之矩陣分佈5
圖2-2:8-ary之藏匿分佈7
圖2-3:n=2之嵌入取出藏匿區塊10
圖2-4:n=3之嵌入取出藏匿區塊10
圖2-5:n=4之嵌入取出藏匿區塊11
圖3-1:EMD之嵌入藏匿流程18
圖3-2:挑出2n個不同函數值f(g1, g2)形成一個不規則形區塊19
圖3-3:n=2之嵌入取出藏匿區塊20
圖3-4:n=3之嵌入取出藏匿區塊21
圖3-5:n=4之嵌入取出藏匿區塊21
圖3-6:n=5之嵌入取出藏匿區塊22
圖3-7:矩陣編碼之嵌入藏匿流程23
圖4-1:實驗1之6張256*256.raw測試影像32
圖4-2:實驗1之不同大小藏匿影像32
圖4-3:6張偽影像之PSNR當n=233
圖4-4:6張偽影像之PSNR當n=234
圖4-5:6張偽影像之PSNR當n=435
圖4-6:6張偽影像之PSNR當n=436
圖4-7:實驗2之6張512*512.raw測試影像37
圖4-8:實驗2之不同大小藏匿影像37
圖4-9:6張偽影像之PSNR當n=238
圖4-10:6張偽影像之PSNR當n=239
圖4-11:6張偽影像之PSNR當n=440
圖4-12:6張偽影像之PSNR當n=441
圖4-13:(a)(b)影像品質之藏匿量比較44
圖4-14:實驗3之6張512*512.raw測試影像45
圖4-15:實驗3藏匿影像46
圖4-16:6張偽影像之PSNR結果46
圖4-17:Peppers之PSNR結果 47
圖4-18:實驗4之6張256*256.raw測試影像48
圖4-19:實驗4藏匿影像48
圖4-20:6張偽影像之PSNR結果49
圖4-21:6張偽影像之PSNR結果50
表格目錄
表3.1:(5, 3)線性碼24
表4.1:實驗開發之平台31
表4.2:實驗1當n=2時,R=1bpp之影像品質及嵌入率之比較34
表4.3:實驗1-1當n=4時,R=2bpp之影像品質及嵌入率之比較36
表4.4:實驗2當n=2時,R=1bpp之影像品質及嵌入率之比較39
表4.5:實驗2-1當n=4時,R=2bpp之影像品質及嵌入率之比較41
表4.6:實驗開發之平台45
表4.7:實驗3之影像品質及嵌入率之比較47
表4 8:實驗4之影像品質及嵌入率之比較50


[1 ]G.L Simmons, “The prisoners problem and subliminal channels,” Proc. Annu. Int. Cryptology Conf., SantaBarbara, CA, pp.51-67, 1984.
[2 ]X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communications Letters, vol. 10, 113, pp.781-783, 2006.
[3 ]C.F.Lee, Y.R. Wang, and C.C Chang, “A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction,” IIHMSP2007.Third International Conference on Volume 1, Issue, 26-28, pp.497-500, 2007.
[4 ]Kuo-Nan Chen, Chin-Chen Chang, and Huang-Ching Lin, “A Large Payload EMD Embedding Scheme with High Stego-image Quality,” International Conference on Computational Aspects of Social Networks, pp.126-130, 2010.
[5 ]R. Crandall, “Some notes on steganograph,” http://of.inf.tu-duresden.de/~westfeld/crandall.pdf,1998.
[6 ]A.Westfeld, “F5-a steganographic algorithm,” in IHW’01: Proceedings of the 4th International Workshop on Information Hiding, Springer-Verkag, pp.289-302, 2001.
[7 ]M. Khatirinejad and P. Lisonek, “Linear codes for high payload steganography,” Discrete Applied Mathematics, vol. 157, pp.971-981, March 2009.
[8 ]C.K. Santosh Arjun, Atul Negi and D.Keerthi, “An approach to adaptive steganography based on,” in TENCON2007-2007IEEE Region 10 Conference, pp.1-4, 2007.
[9 ]W. Zhang, S. Wang, and Z. Xinpeng, “Improving embedding efficiency of covering codes for applications in steganography, ”in Communications Letters, IEEE, vol.11,pp.680-682, 2007.
[10 ]C.C Chang, T.D.Kieu, and Y.C Chou, “A high payload Steganographic scheme based on (7, 4) hamming code for digital images” in International Symposium on Electronic Commerce and Security, pp.16-21, 2008.
[11 ]C.C Chang, T.D Kieu, and Y.C Chou, “Using nearest covering codes to embed secret information in grayscale images,” in ICUIMC’08: Proceedings of the2nd international conference on Ubiquitous information management and communication, ACM, pp.315-320, 2008.
[12 ]Hsiu-Feng Lin, Jui-Hsiu Chang, Chiou-Yueh Gun and Chih-Ying Chen, “A Low Distortion Information Hiding Method Based on (5, 3) Code,” Inter. Journal of Innovative Computing, Info. and Control , 7/7 , pp. 1-10 , 2011-07.
[13 ]Hsiu-Feng Lin, Jui-Hsiu Chang1, Chiou-Yueh Gun, and Chih-Ying Chen*, “A Low Distortion Information Hiding Method Based on (5, 3) Code,” Accepted by IJICIC, 7/6, 2011-06.
[14 ]陳後守教授 編著,“錯誤更正碼,”國立中興大學電機系,第3章 線性區塊碼 (Linear Block code), pp.55-85, 2007.
[15 ]Ki-Hyun Jung, Kee-Young Yoo, “Improved Exploiting Modification Direction Method by Modulus Operation,” International Journal of Signal Processing, Image Processing and Pattern Vol. 2, No 1, March 2009.
[16 ]Jin-Yong Byun, Ki-Hyun Jung, and Kee Young Yoo, “Improved Data Hiding Method by Exploiting Modification Direction,” Ubiquitous Multimedia Computing, 2008.UMC’08. International Symposium, Issue, pp.264, Oct. 2008.
[17 ]Chin-Chen Chang, Wei-Liang Tai, and Kuo-Nan Chen, “Improvements of EMD Embedding for Large Payloads,” Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007. Third International Conference on IIHMSP 2007, vol.1, pp.26-28, 2007.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔