(44.192.112.123) 您好!臺灣時間:2021/03/06 06:34
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:張祐昇
研究生(外文):Yo-Sheng Zhang
論文名稱:利用模數運算及多階段藏密提高資訊隱藏量之研究
論文名稱(外文):A Study on Capacity Improvement for Information Hiding Using Modulus and Multi-Stage Hiding Approaches
指導教授:游源惠
指導教授(外文):Yuan-Hui Yu
學位類別:碩士
校院名稱:健行科技大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:37
中文關鍵詞:資訊隱藏高藏密量預測編碼
外文關鍵詞:Information HidingHigh CapacityPredictive Coding
相關次數:
  • 被引用被引用:0
  • 點閱點閱:149
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
資訊隱藏技術用意在保護訊息傳遞的安全性,主要先將訊息進行加密產生機密訊息後,再將機密訊息藏入多媒體之中;而近年不斷有研究者提出更高藏密量之各種新技術,但在過往技術中,如區塊分割、相鄰像素差異值等方法,在進行運算時,均因還原或者取密需求,難免出現其計算用之對照點(參考點)無法藏密的缺憾。為解決此一問題,並且有效提高藏密量,本論文提出以影像之相鄰像素值差異甚小以及多次運算後像素互補的特性,成功利用簡單的模數運算搭配預測誤差編碼技術,創造出更高的藏密量並維持不錯的影像品質。實驗結果顯示,本論文提供的龐大藏密空間,相當適合用於大量資料傳遞時的保護,更具有許多延展與發展性。

Information hiding technique is intended to protect the security of messaging. Generally, secure confidential information transmission is via encrypting and hiding. In recent years, a variety of new technologies have been proposed in order to achieve better hiding capacity. However, techniques with reference points involved, such as Block Segmentation and Pixel-Value Differencing methods, usually face the problem of limited capacity because those points cannot be used to hide secret message. To improve this problem, we propose an approach based on modulus and multi-stage hiding approaches to increase the hiding capacity, meanwhile, keep high image quality. Due to the use of pixel value correction technique and the characteristic of a natural image that the pixel values of neighboring pixel are closed, we are able to achieve the goal. According to our experimental results, the capacity is effectively increased and high image quality is also retained. The proposed approach is suitable for those applications that need a great amount of hiding capacity.

中文摘要 i
英文摘要 ii
誌謝 iii
目錄 v
表目錄 vi
圖目錄 vii
第一章 緒論 1
1.1 研究背景 1
1.2 研究方法 2
1.3 資訊隱藏技術 3
1.4 論文結構 5
第二章 相關文獻探討 6
2.1差異像素擴張技術 6
2.2邊緣吻合技術 7
2.3區塊分割技術 8
2.4直方圖位移技術 12
2.5 相關文獻之討論與分析 14
第三章 研究方法 15
3.1 本論文提出之藏密演算法 15
3.2 本論文提出之藏密演算法範例 18
3.3 像素溢位控制機制 22
3.4 本論文提出之取密演算法 25
第四章 實驗結果 28
4.1 實驗數據與比較 28
4.2 討論與分析 31
第五章 結論 33
5.1 本論文研究貢獻 33
5.2 未來研究方向 33
參考文獻 35
簡歷 37


[1]呂慈純、陸哲明、張真誠。多媒體安全技術。全華圖書股份有限公司,台北,民國九十六年。
[2]呂慈純、陳培倫、廖湘如,「植基於灰階影像區塊分割之隱藏技術」,資訊安全通訊,第三卷第十五期,103 ~ 115頁,民國九十八年。
[3]巫家源,「以特徵位置關係隱藏關鍵資訊並抵抗社交網站之破壞性壓縮的方法」,清雲科技大學電腦通訊與系統工程研究所,碩士論文,民國一百零一年。
[4]林凱均,「適用於彩色影像的容忍失真壓縮資訊隱藏技術之研究」,淡江大學資訊工程學系,碩士論文,民國九十四年。
[5]葉秀蓮,「植基於預測編碼之可回復式資訊隱藏技術」,靜宜大學資訊管理系,碩士論文,民國九十六年。
[6]劉江龍、李建中,「植基於預測編碼誤差之無失真影像藏密技術」,中正嶺學報,第三十八卷第一期,71~84頁,民國九十八年。
[7]A. M. Alattar,“ Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156, Aug. 2004.
[8]Bender, W. , Gruhl, D. , Morimoto, N. and Lu, A. , “Techniques for Data Hiding,” IBM System Journal, Vol. 35, No. 3&4, pp. 313-336, 1996.
[9]C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, No. 3, pp.469-474, 2004.
[10]C. C. Thien and J. C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit in Images Based on Modulus Function, ”Pattern Recognition, Vol.36, No.3, pp.2875-2881, 2003.
[11]C. H. Tzeng, Z. F. Yang and W. H. Tsai, “Adaptive Data Hiding in Palette Image by Color Ordering and Mapping with Security Protection,” IEEE Transactions on Communications, Vol. 52, No. 5, pp. 791-800, 2004.
[12]C. C. Chang and H. W. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, Vol. 25, No.12, pp.1431-1437, 2004.
[13]D. Kohn(1996), The Code breakers : The Story of Secret Writing. New York : Scribner.
[14]Duke, D., “Image Is Everything,” Network Security, Vol. 2002, No. 4, pp. 4-5, Apr. 2002.
[15]D. C. Wu and W. H. Tsai, “Image Hiding in Spatial Domain Using an Image Differencing Approach,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 147, No. 1, pp.29-37, 2000.
[16]D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, No.9-10, pp. 1613-1626, 2003.
[17]H. K. Pan, Y. Y. Chen and Y. C. Tseng, “A Secure Data Hiding Scheme for Two-Color Images,” Proceedings of the IEEE Fifth Symposium on Computers and Communications (ISCC2000), pp. 750-755, 2000.
[18]ISO/IEC 15544-1, Information Technology – JPEG2000 Image Coding System – Part1: Core Coding System, 2000.
[19]J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006.
[20]Jung, K. H. and Yoo, K.Y., “Data HidingMethod Using Image Interpolation,” ComputerStandards & Interfaces, Vol. 31, No. 2, pp.465-470, 2009.
[21]M. Jo and H. Kim, “A Digital Image Watermarking Scheme Based on Vector Quantization,” IEICE Transactions on Information and System, E85-D, pp. 1054-1056, 2002.
[22]Petitcolas, F.A.P., Anderson, R. J., and Kuhn, M. G., “Information Hiding-A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, Jul. 1999.
[23]P. Y. Tsai, Y. C. Hu and C. C. Chang, “An Image Hiding Technique Using Block Truncation Coding,” Proceedings of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, pp. 54-64, 2002.
[24]S. D. Lin and C. F. Chen, “A Rocust DCT-Based Watermarking for Copyright Propection, ”IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415-421, 2000.
[25]W. Stallings(1999), Cryptography and Network Security. New Jersey : Prentice Hall.
[26]Y. Linde, A. Buzo, and R. M. Gray, “An Algorithm for Vector Quantizer Design,” IEEE Transactions on Communications, Vol. 28, No.1, pp. 84-95, 1980.
[27]Z. M. Lu and S. H. Sun, “Digital Image Watermarking Technique Based on Vector Quantisation,” Electronic Letters, Vol. 36, No. 4, pp. 303-305, 2000.
[28]Z. Yang, C. Patrizio, and K. Deepa, “Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,” IEEE Transactions on Image Processing, Vol. 13, No. 3, pp. 430-448, 2004.
[29]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No.3, pp. 354-362, 2006.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔