跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.81) 您好!臺灣時間:2025/02/19 02:26
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:劉姵菱
論文名稱:植基於JPEG格式的資訊隱藏演算法
論文名稱(外文):JPEG-Based Steganographic Algorithms
指導教授:陳朝欽陳朝欽引用關係
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
論文頁數:25
中文關鍵詞:資訊隱藏
相關次數:
  • 被引用被引用:0
  • 點閱點閱:324
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
藏密學是用於資訊隱藏的一種方法,隨著網路通訊的持續成長,愈益凸顯它的重要性。現在,已經有非常多的藏密演算法或藏密軟體已經被開發出來了,其中也包括了把資訊藏入於JPEG 影像之隱藏技術。JPEG是數位相機常使用的影像格式並廣泛應用在網路上。
這篇論文提供了兩個方法改進F5資訊隱藏演算法的藏密容量。第一個方法屬於前處理的方法,在F5資訊隱藏演算法執行前,我們會隨機修改量化後的DCT係數去得到更多的非零的量化後的DCT係數來藏訊息。第二個方法裡,在F5資訊隱藏演算法執行後,我們在JPEG影像裡會稍微修改每個DCT區塊的結束位置的資訊去增加藏密容量。我們只要在量化後的DCT 8×8 區塊內修改一個DCT係數就能多儲存三位元的資料。縱使PSNR的數值有一點降低,我們提出的演算法跟許多經典的資訊隱藏演算法相比,藏密容量卻有顯著的進步。

Steganography is a method of data hiding. It is more and more important while the Internet communication grows up. Now, many steganographic algorithms or software have already been developed including image hiding techniques for JPEG images. JPEG is the most common image format used by digital cameras and transmitted in the Internet.
This thesis proposes two methods to increase the capacity of F5 embedding algorithm. The first method is a pre-processing method, we randomly modifies the qDCT coefficients before the F5 embedding algorithm to get more nonzero qDCT coefficients to embed message. In the second method, we slightly modify the end of block (EOB) information in a JPEG image to increase the capacity of embedding after the F5 embedding algorithm. We change a qDCT coefficient on each qDCT 8×8 block to embed 3 more bits of message. Although the PSNR value is slightly decreased, our proposed algorithm significantly increases the capacity of embedding compared with many classical steganographic algorithms.

Chapter 1 Introduction 1
Chapter 2 Review of DCT-Based Steganographic Algorithms 3
2.1 The JPEG Image Format 3
2.2 Some Classical Steganographic Algorithms 5
2.2.1 J-Steg 5
2.2.2 JPhide 6
2.2.3 F5 6
2.2.4 OutGuess 8
2.2.5 JPEG-CES 8
2.3 Steganalysis 10
2.3.1 χ^2-test 10
2.3.2 S1 attack 11
2.3.3 S2 attack 12
Chapter 3 Proposed Data Hiding Method 13
3.1 Method 1: Random Modification of DCT Coefficients 13
3.2 Method 2: Adding One More Coefficient 15
3.3 Embedding and Extraction 16
Chapter 4 Experimental Results 18
4.1 Image Quality 18
4.2 S1 attack test 22
Chapter 5 Conclusion and Future Work 23
References 24

[Frid2003] J. Fridrich, M. Goljan, and D. Hogea, “New methodology for breaking steganographic techniques for JPEGs,” Proceedings of SPIE: Security and Watermarking of Multimedia Contents, Vol. 5020, 143-155, 2003.
[Jain1989] A. K. Jain, “Fundamentals of digital image processing. Englewood Cliffs,” NJ: Prentice Hall, new Jersey, 1989.
[John1998] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, 26-34, 1998.
[Liu2008] C. L. Liu, and S. R. Liao, “High-Performance JPEG Steganography using complementary embedding strategy,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008.
[Penn1992] W. B. Pennebaker, and J. L. Mitchell, “JPEG still image data compression standard,” New York: Van Nostrand Reinhold, 1992.
[Prov2001a] N. Provos, “Defending Against Statistical Steganalysis,” Proceedings of the 10th USENIX Security Symposium, 323-335, 2001.
[Prov2001b] N. Provos, and P. Honeyman, “Detecting Steganographic Content on the Internet,” CITI Technical Report, Vol. 1, 1-11, 2001.
[Prov2003] N. Provos, and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, 32-44, 2003.
[West1999] A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proceedings of the 3rd International Workshop on Information Hiding, Springer-Verlag, 61-76, 1999.
[West2001] A. Westfeld, “F5—A Steganographic Algorithm:High Capacity Despite Better Steganalysis,” The 4th International Workshop on Information Hiding, Springer-Verlag, 289-302, 2001.
[Web01] http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt, last access on May 31, 2012.
[Web02] http://en.wikipedia.org/wiki/Steganography, last access on May 31, 2012.
[Web03] http://en.wikipedia.org/wiki/Histiaeus, last access on May 31, 2012.
[Web04] http://linux01.gwdg.de/~alatham/stego.html, last access on May 31, 2012.
[Web05] http://www2.htw-dresden.de/~westfeld/publikationen/f5r11.zip, last access on May 31, 2012.
[Web06] http://www.outguess.org/, last access on May 31, 2012.
[Web07] http://www.laps.ufpa.br/zampolo/portugues/engBiomedPDS2.html, last access on May 31, 2012.
[Web08] http://www.cns.nyu.edu/~zwang/files/research/quality_index/demo_jpg.html, last access on May 31, 2012.
[Web09] http://www.whitehouse.gov/blog/inaugural-address, last access on May 31, 2012.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top