跳到主要內容

臺灣博碩士論文加值系統

(3.236.84.188) 您好!臺灣時間:2021/08/06 11:51
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:周兆龍
研究生(外文):Chou, Chao-Lung
論文名稱:可回復式資訊隱藏之主動式影像藏密分析
論文名稱(外文):Active Image Steganalysis For Reversible Data Hiding
指導教授:瞿忠正瞿忠正引用關係婁德權婁德權引用關係
口試委員:柳金章陳同孝黃博惠喻石生婁德權瞿忠正賴義鵬
口試日期:2012-07-06
學位類別:博士
校院名稱:國防大學理工學院
系所名稱:國防科學研究所
學門:軍警國防安全學門
學類:軍事學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:68
中文關鍵詞:資訊隱藏掩護通道主動式藏密分析可回復式資訊隱藏
外文關鍵詞:Data hidingCovert channelActive steganalysisReversible data hiding
相關次數:
  • 被引用被引用:1
  • 點閱點閱:196
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
現代資訊隱藏技術泛指利用數位化媒體(如文字、音訊、影像、視訊)作為隱蔽通道,將秘密訊息藏入其中而令他人無法發覺,以達到秘密通訊的目的。近年來新型資訊隱藏技術不斷被提出與精進,在此發展趨勢下,為防堵罪犯、恐怖份子或有心人士惡意濫用資訊隱藏技術,造成對個人、社會、甚至國家造成無法想像的威脅,藏密分析技術之研究,實屬刻不容緩。
藏密分析係指利用各種偵測或分析技術來判斷各種媒體資料中是否隱藏著秘密訊息,一般可以將其區分為被動式與主動式兩大類。被動式藏密分析僅對於分析之結果提出「是」或「否」的簡單答案;而主動式藏密分析則進一步估測藏密量、藏密位置、系統參數…等資訊,較符合實務上的需求且難度較高。
近年來新興的可回復式資訊隱藏技術,具備可在萃取出秘密訊息後,仍能將掩護媒體的原始資訊內容完整還原的特性,可廣泛應用於影像品質需求較高的醫學、軍事、衛星、藝術及犯罪偵察…等各種領域。
本研究以具代表性的可回復式資訊隱藏技術為主要研究範疇,採用統計分析、影像處理、模式識別、機器學習等相關理論與技術加以整合,提出三種高效能之主動式藏密分析演算法。由實驗結果可知本論文提出之藏密分析方法可有效偵測藏密影像,並對於藏密量、藏密位置、系統參數…等相關資訊之估測亦有良好效能。

Data hiding is the art and science for embedding data into innocuous-looking cover media (such as audio, images, or video) to build a covert channel for secret communication. During the past decade, data hiding techniques have made great progress due to the rapid development of information technology. However, worried about illegal use by terrorists and criminals has gradually risen, and therefore the importance of developing effective steganalysis systems to deal with the potential threats of malicious steganography is becoming self-evident.
Steganalysis is dealing with detecting the presence of hidden messages in suspicious media and the goal of it is to detect abnormalities and unveil the existence of hidden messages in target objects. Steganalysis techniques can be classified as passive or active based on the detection capabilities of the algorithms. While passive steganalysis algorithms only concerned with discriminating the presence of hidden messages or identifying the steganographic scheme, the active steganalysis algorithms aimed at estimating some important parameters (e.g. message length, message locations, etc.) of the embedding method for further analyses.
Recently, a new technique, namely reversible data hiding, guarantees that the cover-image can be fully restored without distortion, after extracting hidden messages from the stego-image. The advantage of lossless recovery property is desired in certain types of applications, such as medical, satellite, military, law enforcement, and fine art, which require high definition and high fidelity for image quality.
In this dissertation, three of innovative active steganalysis algorithms for typical reversible data hiding schemes are introduced. Statistical analysis, image processing, pattern recognition and machine learning techniques are integrated to achieve its high efficiency. Experimental results show that the proposed algorithms are highly effective both on stego-images detection and key parameters estimation.

誌謝 ii
摘要 iii
ABSTRACT iv
目錄 v
表目錄 vii
圖目錄 viii
1. 緒論 1
1.1 研究背景 1
1.2 研究動機與目的 1
1.3 論文架構 3
2. 資訊隱藏技術介紹 4
2.1數位影像藏密技術 4
2.2 可回復式影像藏密技術 6
3. 藏密分析技術介紹 8
3.1 藏密分析之類型 8
3.2 藏密分析系統架構 10
3.3藏密分析效能評量 14
3.4 藏密分析相關技術介紹 16
4. 針對直方圖位移法之主動式藏密分析技術 20
4.1 直方圖位移法 20
4.2 直方圖位移法特徵分析 22
4.3 本文提出之主動式藏密分析演算法 25
4.3.1 特徵萃取 25
4.3.2 分類器訓練 27
4.3.3 藏密影像偵測 29
4.3.4 嵌入位置估測 30
4.4 實驗結果與分析 31
5. 針對取樣影像差值法之主動式藏密分析技術 36
5.1 取樣影像差值法 36
5.2 取樣影像差值法之特徵分析 39
5.3 本文提出之主動式藏密分析演算法 41
5.3.1 取樣參數估測 42
5.3.2 嵌入層數估測 43
5.4 實驗結果與分析 45
6. 針對影像插值誤差法之主動式藏密分析技術 48
6.1 影像插值誤差法 48
6.2 影像插值誤差法之特徵分析 51
6.3 本文提出之主動式藏密分析演算法 52
6.3.1 藏密影像偵測 52
6.3.2 嵌入位置估測 53
6.4 實驗結果與分析 55
7. 結論與未來研究方向 58
7.1 結論 58
7.2 未來研究方向 59
參考文獻 61
論文發表 66
自傳 68

[1]Lampson, B.W., “A Note on the Confinement Problem,” Communications of the ACM, Vol. 16, No.10, pp. 613-615, 1973.
[2]http://www.usatoday.com/tech/news/2001-02-05-binladen.htm (2012.6.26)
[3]http://archives.cnn.com/2001/US/09/20/inv.terrorist.search/ (2012.6.26)
[4]Provos, N. and Honeyman, P., “Detecting Steganographic Content on the Internet,” Center for Information Technology Integration, University of Michigan, CITI Technical Report 01-11, pp. 1-14, 2001.
[5]Johnson, N. F., Duric, Z., and Jajodia, S., Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, Boston, pp. 1-8, 2001.
[6]Fridrich, J., Goljan, M., and Rui, D., “Invertible Authentication,” Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, USA, Vol. 3971, pp. 197-208, 2001.
[7]Fridrich, J., Goljan, M., and Rui, D., “Lossless Data Embedding - New Paradigm in Digital Watermarking,” EURASIP Journal on Applied Signal Processing, Special issue on Emerging Applications of Multimedia Data Hiding, Vol. 2, pp. 185-196, 2002.
[8]Celik, M. U., Sharma, G., Tekalp, A. M., and Saber, E., “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, Vol. 14, No. 2, pp. 253-266, Feb. 2005.
[9]Tian, J., “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890-896, 2003.
[10]Alattar, A. M., “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156, 2004.
[11]Chang, C. C. and Lin, C. Y., “Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation,” IEEE Transactions on Information Forensics and Security, Vol. 1, No. 4, pp. 493-501, 2006.
[12]Lee, J. D., Chiou, Y. H., and Guo, J. M., “Reversible Data Hiding Based on Histogram Modification of SMVQ Indices,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 4, pp. 638-648, 2010.
[13]Ni, Z., Shi, Y. Q., Ansari, N., and Su, W., “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.
[14]Lin, C. C., Tai, W. L., and Chang, C. C., “Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images,” Pattern Recognition, Vol. 41, No. 12, pp. 3582-3591, 2008.
[15]Tai, W. L., Yeh, C. M., and Chang, C. C., “Reversible Data Hiding Based on Histogram Modification of Pixel Differences,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 6, pp. 906-910, 2009.
[16]Jung, S. W., Ha, L. T., and Ko, S. J., “A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System,” IEEE Signal Processing Letters, Vol. 18, No. 2, pp. 95-98, Feb. 2011.
[17]Kim, K. S., Lee, M. J., Lee, H. Y., and Lee, H. K., “Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images,” Pattern Recognition, Vol. 42, No.11, pp. 3083-3096, 2009.
[18]Hu, Y., Lee, H., Li, J., and Chen, K., “Reversible Data Hiding Using Prediction Error Values Embedding,” Proceedings of International Workshop on Digital Watermarking, Guangzhou, China, pp. 244-253, 2007.
[19]Fallahpour, M., “Reversible Image Data Hiding Based on Gradient Adjusted Prediction,” IEICE Electronics Express, Vol. 5, No. 20, pp. 870-876, 2008.
[20]Hong, W., Chen, T. S., and Shiu, C. W., “Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors,” The Journal of Systems and Software, Vol. 82, No. 11, pp. 1833-1842, 2009.
[21]Hong, W. and Chen, T. S., “A Local Variance-controlled Reversible Data Hiding Method Using Prediction and Histogram-shifting,” The Journal of Systems and Software, Vol. 83, No. 12, pp. 2653-2663, 2010.
[22]Tsai, P., Hu, Y. C., and Yeh, H. L., “Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting,” Signal Processing, Vol. 89, No. 6, pp. 1129-1143, 2009.
[23]Luo, L., Chen, Z., Chen, M., Zeng, X., and Xiong, Z., “Reversible Image Watermarking Using Interpolation Technique,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 1, pp. 187-193, 2010.
[24]Hong, W. and Chen, T. S., “Reversible Data Embedding for High Quality Images Using Interpolation and Reference Pixel Distribution Mechanism,” Journal of Visual Communication and Image Representation, Vol. 22, No. 2, pp. 131-140, 2011.
[25]Simmons, G. J., “The Prisoners’ Problem and the Subliminal Channels,” Proceedings of Annual International Cryptology Conference, Santa Barbara, USA, pp. 51-67, 1984.
[26]Li, B., He, J., Huang, J., and Shi, Y. Q., “A Survey on Image Steganography and Steganalysis,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 142-172, 2011.
[27]Chandramouli, R., Kharrazzi, M., and Memon, N., “Image Steganography and Steganalysis: Concepts and Practice,” Proceedings of International Workshop on Digital Watermarking, Seoul, Korea, pp. 35-49, 2004.
[28]Luo, X. Y., Wang, D. S., Wang, P., and Liu, F. L., “A Review on Blind Detection for Image Steganography,” Signal Processing, Vol. 88, pp. 2138-2157, 2008.
[29]Avcibas, I., Memon, N., and Sankur, B., “Steganalysis Using Image Quality Metrics,” IEEE Transactions on Image Processing, Vol. 12, No. 2, pp. 221-229, 2003.
[30]Lyu, S. and Farid, H., “Steganalysis Using Higher-order Image Statistics,” IEEE Transactions on Information Forensics Security, Vol. 1, No. 1, pp. 111-119, 2006.
[31]Harmsen, J. J. and Pearlman, W. A., “Steganalysis of Additive Noise Modelable Information Hiding,” Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, USA, pp. 131-142, 2003.
[32]Farid, H. and S. Lyu, “Detecting Hidden Messages Using Higher-order Statistics and Support Vector Machines,” Proceedings of 5th International Information Hiding Workshop, Noordwijkerhout, Netherlands, pp. 340-354, 2002.
[33]Lie, W. N. and Lin, G. S., “A Feature-based Classification Technique for Blind Image Steganalysis,” IEEE Transactions on Multimedia, Vol.7, No.6, pp. 1007-1020, 2005.
[34]Westfeld, A. and Pfitzmann, A., “Attacks on Steganographic Systems,” Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, pp. 61-76, 1999.
[35]Fridrich, J., Goljan, M., and Rui, D., “Detecting LSB Steganography in Color and Gray-scale Images,” IEEE Multimedia, Vol. 8, No. 4, pp. 22-28, 2001.
[36]Zhang, X. P. and Wang, S. Z., “Vulnerability of Ppixel-value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letter, Vol. 25, No. 3, pp. 331-339, 2004.
[37]Wu, D. C. and Tsai, W. H., “A Steganographic Method for Images by Pixel-value Differencing,” Pattern Recognition Letter, Vol. 24, No.9-10, pp. 1613-1626, 2003.
[38]Dumitrescu, S., Wu, X., and Wang, Z., “Detection of LSB steganography via Sample Pair Analysis,” IEEE Transactions on Signal Processing, Vol. 51, No. 7, pp. 1995-2007, 2003.
[39]http://www-staff.lboro.ac.uk/~cogs/datasets/UCID/ucid.html (2012.6.26)
[40]http://pirsquared.org/research/mcgilldb/welcome.html (2012.6.26)
[41]http://vision.stanford.edu/resources_links.html (2012.6.26)
[42]http://www.csie.ntu.edu.tw/~cjlin/libsvm/ (2012.6.26)
[43]Zhang, L. and Wu, X., “An Edge-guided Image Interpolation Algorithm via Directional Filtering and Data Fusion,” IEEE Transactions on Image Processing, Vol. 15, No. 8, pp. 2226-2238, 2006.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊