(54.236.58.220) 您好!臺灣時間:2021/02/28 09:38
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:宋秉恩
研究生(外文):Ping-En Sung
論文名稱:應用差值擴張法與中間邊緣偵測法於區塊截短編碼法之可回復式資訊隱藏技術
論文名稱(外文):A Reversible Information Hiding Scheme by Applying Difference Expansion and Median Edge Detector on Block Truncation Coding
指導教授:詹啟祥
指導教授(外文):Chi-Shiang Chan
學位類別:碩士
校院名稱:亞洲大學
系所名稱:資訊多媒體應用學系碩士班
學門:電算機學門
學類:電算機應用學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:49
中文關鍵詞:區塊截短編碼法中間邊緣偵測法差值擴張法
外文關鍵詞:block truncation codingmedian edge detectorANDdifference expansion
相關次數:
  • 被引用被引用:0
  • 點閱點閱:130
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在本論文中,我們先利用區塊截短編碼法(Block Truncation Coding, BTC)算出每個區塊的高低重建階,並將每個區塊高低重建階之差值計算出來。同時運用中間邊緣偵測法(Median Edge Detector, MED)於高低重建階之差值上,以預測每個區塊的預測差值。針對每個區塊,我們將預測差值去減掉高低重建階差值後,所得到的值利用差值擴張法(Difference Expansion, DE),藏回高低重建階中。根據實驗結果顯示,我們所提的方法,具有很高的藏入量與很好的影像品質。
In this thesis, the high and low reconstruction levels of each block must be obtained first by using block truncation coding. Then, the distance value of each block can be calculated by subtracting its low reconstruction level from its high reconstruction level. Meanwhile, the predicted distance value of each block can also be predicted by applying median edge detector on distance values. For each block, after subtracting the distance value from the predicted distance value, the result value is embedded to the high and low reconstruction levels by using difference expansion. The experimental results show that the capacity of the proposed method is high and the quality of the image is good.
中文摘要 i
Abstract ii
誌謝 iii
目錄 iv
圖目錄 vi
表目錄 viii
第一章 緒論 1
1.1 研究背景 1
1.1.1 資訊隱藏的分類 4
1.1.2 資訊隱藏技術特性 5
1.2 研究動機 6
1.3 論文架構 7
第二章 文獻探討 8
2.1 數位影像壓縮技術 8
2.1.1 向量量化編碼法 8
2.1.2 邊緣吻合向量量化編碼法 11
2.1.3 區塊截短編碼法 12
2.2 可回復資訊隱藏技術 14
2.2.1 直方圖修改技術 15
2.2.2 差值擴張法 18
2.2.3 Liu等人所提的方法 20
2.3中間邊緣偵測法 24
第三章 植基於差值擴張法與區塊截短編碼法之可回復式資訊隱藏技術 25
3.1 秘密資訊藏入的程序 26
3.2 秘密資訊取出的程序 29
第四章 實驗結果與分析 31
4.1 門檻值為8的實驗結果與分析 33
4.2 門檻值為16的實驗結果與分析 35
4.3 兩階段差值擴張法的實驗結果與分析 37
第五章 結論 39
參考文獻 40
個人履歷 49
[1]張真誠、黃國峰、陳同孝,電子影像處理技術,台北,旗標電腦圖書,2003。
[2]張真誠、黃國峰、陳同孝,數位影像處理技術,台北,旗標電腦圖書,2003。
[3]張真誠、賴溪松、韓亮,近代密碼學及其應用,台北,旗標電腦圖書,2004。
[4]Y. H. Chu, and S. Chang, “Dynamical Cryptography Based on Synchronized Chaotic Systems,” Electronics Letters, Vol. 35, No. 12, pp. 974-975, 1999.
[5]M. E. Hellman, “DES Will be Totally Insecure Within Ten Years,” IEEE Spectrum, Vol. 16, No. 7, pp. 32-39, 1979.
[6]D. Coppersmith, “The Data Encryption Standard (DES) and Its Strength Against Attacks,” IBM Journal Research Development, Vol. 38, No. 3, pp.243-250, 1994.
[7]R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signature and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[8]N. Bourbakis, and C. Alexopoulos, “Picture Data Encryption Using Scan Patterns,” Pattern Recognition, Vol. 25, No. 6, pp. 567-581, 1992.
[9]K. C. Chang, and J. L. Liu, “A Linear Quadtree Compression Scheme for Image Encryption,” Signal Processing: Image Communication, Vol. 10, No. 4, pp. 279-290, 1997.
[10]T. S. Chen, C. C. Chang, and M. S. Hwang, “A Virtual Image Cryptosystem Based Upon Vector Quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, pp. 1485-1488, 1998.
[11]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding -A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999.
[12]C. C. Thien and J. C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Module Function,” Pattern Recognition, Vol. 36, pp. 2875-2881, 2003.
[13]C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595, 2003.
[14]C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004.
[15]S. Dumitrescu and X. Wu, “A New Framework of LSB Steganalysis of Digital Media,” IEEE Transactions on Signal Processing, Vol. 53, No. 10, pp. 3936-3947, 2005.
[16]S. Walton, “Image Authentication for a Slippery New Age,” Dr. Dobb’s Journal, Vol. 20, No. 4, pp. 18-26, 1995.
[17]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001.
[18]W. R. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3&4, pp. 313-336, 1996.
[19]D. C. Wu and W. H. Tsai, “Image Hiding in Spatial Domain Using an Image Differencing Approach,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 147, No. 1, pp. 29-37, 2000.
[20]P. Y. Tsai, Y. C. Hu, and C. C. Chang, “An Image Hiding Technique Using Block Truncation Coding,” Proceedings of Pacific Rim Workshop on Digital Steganography, pp. 54-64, 2002.
[21]M. H. Lin and C. C. Chang, “A Novel Information Hiding Scheme Based on BTC,” Proceedings of the 4th International Conference on Computer and Information Technology, pp. 66-71. 2004.
[22]Z. M. Lu and S. H. Sun, “Digital Image Watermarking Technique Based on Vector Quantisation,” Electronic Letters, Vol. 36, No. 4, pp. 303-305, 2000.
[23]M. Jo and H. Kim, “A Digital Image Watermarking Scheme Based on Vector Quantization,” IEICE Transactions on Information and Systems, Vol. E85-D, pp.1054-1056, 2002.
[24]Y. C. Lin and C. C. Wang, “Digital Images Watermarking by Vector Quantization,” Proceedings of National Computer Symposium, Vol. 3, pp. 76-87, 1999.
[25]W. C. Du and W. J. Hsu, “Adaptive Data Hiding Based on VQ Compressed Images,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 150, No. 4, pp. 233-238, 2003.
[26]C. C. Chang and P. Y. Lin, “A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis,” Proceedings of International Conference on Cyberworlds, pp. 369-375, 2004.
[27]Y. H. Yu, C. C. Chang, and Y. C. Hu, “A Steganographic Method for Hiding Data in VQ Encoded Images,” Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, pp. 358-361, 2004
[28]S. D. Lin, S. C. Shie, M. H. Yao, and C. C. Hsieh, “A Novel Image Compression Scheme Based on VQ and Data Embedding,” Proceedings of the 8th International Conference on Internet & Multimedia Systems & Applications (IMSA2004), 2004.
[29]C. C. Chang, P. Y. Tsai, and M. H. Lin, “An Adaptive Steganography for Index-Based Images Using Codeword Grouping,” Proceedings of the 5th Pacific Rim Conference on Multimedia, pp. 731-738, 2004.
[30]C. C. Chang and W. C. Wu, “A Reversible Information Hiding Scheme Based on Vector Quantization,” Proceedings of Knowledge-Based Intelligent Information and Engineering Systems (KES 05), pp. 1101-1107, 2005.
[31]H. C. Wu and C. C. Chang, “A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique,” Computers & Security, Vol. 24, No. 6, pp. 460-471, 2005.
[32]C. C. Chang and W. C. Wu, “Hiding Secret Data Adaptively in Vector Quantization Index Tables,” IEE Proceedings-Vision Image Signal Processing, Vol. 153, No. 5, pp. 589-597, 2006.
[33]C. C. Chang and C. Y. Lin, “Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images,” Fundamenta Informaticae, Vol. 74, No. 2&3, pp. 189-207, 2006.
[34]C. C. Chang and C. Y. Lin, “Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation,” IEEE Transactions on Information Forensics and Security, Vol. 1, No. 4, pp. 493-501, 2006.
[35]C. C. Chang, Y. P. Hsieh, and C. Y. Hsieh, “Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-Compressed Codes,” IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3, pp. 341-349, 2007.
[36]C. C. Chang, W. L. Tai, and C. C. Lin, “A Novel Image Hiding Scheme Based on VQ and Hamming Distance,” Fundamenta Informaticae, Vol. 77, No. 3, pp. 217-228, 2007.
[37]C. C. Chang, W. C. Wu, and Y. C. Hu, “Lossless Recovery of a VQ Index Table with Embedded Secret Data,” Journal of Visual Communication and Image Representation, Vol. 18, No. 3, pp. 207-216, 2007.
[38]C. C. Chang, W. L. Tai, and M. H. Lin, “A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization,” Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Vol. 1, pp. 947-952, 2005.
[39]C. C. Chang and W. C. Wu, “A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization,“ IEICE Transactions on Information and Systems, Vol. E88-D, No. 9, pp. 2159-2167, 2005.
[40]C. C. Chang, W. L. Tai, and C. C. Lin, “A Reversible Data Hiding Scheme Based on Side Match Vector Quantization,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 10, pp. 1301-1308, 2006.
[41]S. C. Shie, S. D. Lin, and C. M. Fang, “Adaptive Data Hiding Based on SMVQ Prediction,” IEICE Transactions on Information and Systems, Vol. E89-D, No. 1, pp. 358-362, 2006.
[42]C. C. Chang and T. C. Lu, “Reversible Index-Domain Information Hiding Scheme Based on Side-Match Vector Quantization,” Journal of Systems and Software, Vol. 79, No. 8, pp. 1120-1129, 2006.
[43]J. Fridrich, M. Goljan, and R. Du, “Invertible Authentication Watermark for JPEG Images,” Proceedings of IEEE International Conference on Information Technology: Coding and Computing, pp. 223-227, 2001.
[44]H. W. Tseng and C. C. Chang, “Steganography Using JPEG-Compressed Images,” Proceedings of Fourth International Conference on Computer and Information Technology (CIT 2004), pp. 12-17, 2004.
[45]H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, “Application of Bit-Plane Decomposition Steganography to JPEG2000 Encoded Images,” IEEE Signal Processing Letters, Vol. 9, No. 12, pp. 410-413, 2002.
[46]F. Y. Shih and Y. T. Wu, “Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, 2003.
[47]C. C. Chang, T. S. Chen, and L. Z. Chung, “A Steganographic Method Based Upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1&2 pp. 123-138, 2002.
[48]S. Lee and H. Imai, “A New Method of Selecting Blocks for the Digital Watermark Using DCT,” Proceedings of SCIS, pp. 28-31, 1993.
[49]B. Tao and B. Dickinson, “Adaptive Watermarking in the DCT Domain,” Proceedings of 1997 IEEE International Conference on Acoustics Speech and Signal Processing, pp. 2985-2988, 1997.
[50]A. Piva, M. Barni, F. Bartolini and V. Cappellini, “DCT Based Watermark Recovering Without Resorting to the Uncorrupted Original Image,” Proceedings of 1997 International Conference on Image Processing, Vol. 1, pp. 520-523, 1997.
[51]S. D. Lin and C. F. Chen, “A Robust DCT-Based Watermarking for Copyright Protection,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415-421, 2000.
[52]W. C. Chu, “DCT-Based Image Watermarking Using Subsampling,” IEEE Transactions on Multimedia, Vol. 5, No. 1, pp.34-38, 2003.
[53]B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, “Reversible Image Watermarking by Histogram Modification for Integer DCT Coefficients,” Proceedings of 2004 IEEE 6th Workshop on Multimedia Signal Processing, pp. 143-146, 2004.
[54]M. Iwata, K. Miyake, and A. Shiozaki, “Digital Steganography Utilizing Features of JPEG Images,” IEICE Transactions on Fundamentals, Vol. E87-A, No. 4, pp. 929-936, 2004.
[55]H. Noda, M. Niimi, and E. Kawaguchi, “High-Performance JPEG Steganography Using Quantization Index Modulation in DCT Domain,” Pattern Recognition Letters, Vol. 27, No. 5, pp. 455-461, 2006.
[56]C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible Hiding in DCT-Based Compressed Images,” Information Science, Vol. 177, No. 13, pp. 2768-2786, 2007.
[57]F. Alturki and R. Mersereau, “Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,” Proceedings of IEEE International Conference on Image Processing, pp. 542-545, 2001.
[58]S. Joo, Y. Suh, J. Shin, H. Kikuchi, and S. J. Cho, “A New Robust Watermark Embedding into Wavelet DC Components,” Electronics and Telecommunications Research Institute Journal, Vol. 24, No. 5, pp. 401-404, 2002.
[59]M. S. Hsieh, D. S. Tseng, and Y. H. Huang, “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,” IEEE Transactions on Industrial Electronics, Vol. 48, No. 5, pp. 875-882, 2001.
[60]K. Ding, H. Chen, L. G. Jiang, and H. X. Wang, “Wavelet-Based Semi-Fragile Watermarking with Tamper Detection,” IEICE Transactions on Fundamentals, Vol. E88-A, No.3, pp. 787-790, 2005.
[61]Z. H. Wei, P. Qin, and Y. Q. Fu, “Perceptual Digital Watermark of Image Using Wavelet Transform,” IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, pp. 1267-1272, 1998.
[62]Y. S. Kim, O. H. Kwon, and R. H. Park, “Wavelet Based Watermarking Method for Digital Images Using the Human Visual System,” Proceedings of the IEEE International Symposium on Circuits and System, Vol. 4, pp.80-83, 1999.
[63]R. M. Gray, “Vector Quantization,” IEEE ASSP Magazine, Vol. 1, No. 1, pp. 4-29, 1984.
[64]Y. Linde, A. Buzo, and R. M. Gary, “An Algorithm for Vector Quantization Design,” IEEE Transactions on Communications, Vol. 28, No. 1, pp. 84-95, 1980.
[65]T. Kim, “Side Match and Overlap Match Vector Quantizers for Images,” IEEE Transactions on Image Processing, Vol. 1, No. 2, pp. 170-185, 1992.
[66]E. J. Delp and O. R. Mitchell, “Image Compression Using Block Truncation Coding,” IEEE Transaction on Communication, Vol. 27, No.9, pp. 1335-1342, 1979.
[67]Z. Ni, Y. Q. Shi, N. Ansari, and W, Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp.355-364, 2006.
[68]J. Tian, “Wavelet-Based Reversible Watermarking for Authentication,” Proceedings of International Conference SPIE, Security and Watermarking of Multimedia Contents IV, Vol. 4675, pp. 679-690, 2002.
[69]J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol.13, No. 8, pp. 890-896, 2003.
[70]J. Tian, “High Capacity Reversible Data Embedding and Content Authentication,” Proceedings of 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'03), Vol. 3, pp. 517-520, 2003.
[71]Y. J. Liu, Reversible Data Hiding Based on Block Truncation Coding Using Difference Expansion, Master Thesis, Department of Information Science and Applications, Asia University, Taiwan, 2008.
[72]S. A. Martucci, “Reversible Compression of HDTV Images Using Median Adaptive Prediction and Arithmetic Coding,” Proceedings of IEEE International Symposium on Circuits and Systems, Vol. 2, pp. 1310-1313, 1990.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔