跳到主要內容

臺灣博碩士論文加值系統

(44.200.169.3) 您好!臺灣時間:2022/12/04 10:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張芷芸
研究生(外文):Tzu -Yun Chang
論文名稱:基於區塊分割與XOR的二元影像高容量資訊隱藏法
論文名稱(外文):A High Capacity Data Hiding Method by Block-Based and XOR in Binary Image
指導教授:楊權輝楊權輝引用關係
指導教授(外文):Chyuan-Huei Yang
口試委員:張欽智林瑞盛楊權輝
口試委員(外文):Chin-Chih ChangRey-Sern LinChyuan-Huei Yang
口試日期:2014-07-18
學位類別:碩士
校院名稱:玄奘大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:48
中文關鍵詞:資訊隱藏隱匿學互斥運算不可察覺
外文關鍵詞:data hidingsteganographyXORimperceptible
相關次數:
  • 被引用被引用:0
  • 點閱點閱:257
  • 評分評分:
  • 下載下載:6
  • 收藏至我的研究室書目清單書目收藏:0
在本論文中我們提出了應用在二元影像中的高容量資訊隱藏方法。二元影像所擁有的資訊太少所以不能隱藏太多的資料,因為它只有兩種顏色,黑色或白色。資訊隱藏的多少與眼睛察覺存在之間互相取捨。在隱藏前我們用擬亂數產生器打亂機密資訊以確保資訊更安全。首先,我們將掩護影像分成不重疊的5×5區塊。然後,我們將每個5×5的區塊分割成四個重疊的3×3子區塊。我們跳過所有全黑或全白的5×5區塊以及3×3子區塊。我們考慮其他3×3子區塊,並檢查左上角像素和第一子區塊中心像素;右上角像素和第二子區塊中心像素;右下角像素和第三子區塊中心像素;左下角像素和第四子區塊中心像素之間以XOR運算來隱藏機密資訊。提取的方法是檢測每個3×3子區塊中心和四個角落的3個像素之間的XOR運算。收集所有嵌入的位元然後還原成原來的順序。實驗結果表示,該方法提供了較大的嵌入量,而且難以察覺。
In this thesis we propose a high capacity data hiding method applying on binary images. The information of a binary image is too little to hide a lot of data, since it has only two colours, black or white. The data hiding has a trade-off between capacities and imperceptions. We shuffle the secret data by a pseudo-random number generator before hiding to keep more secure. We divide the host image into non-overlapping five by five sub-blocks, which the secret data will be camouflaged. Then we partition each five by five sub-block into four overlapping three by three sub-blocks. We skip the all blacks or all whites in five by five sub-blocks and three by three sub-block. We consider others three by three sub-block to check the XOR between upper left and centre, upper right and centre, bottom right and centre or bottom left and centre, then embed three bits in each three by three sub-block. The extraction way is simply to test the XOR between the four corner pixels with their right and down pixels and the centre of each three by three sub-block. All embedding bits are collected and shuffled back to the original order. The experimental results show that the method provides the large embedding capacity and keeps imperceptible and reveal the host image lossless.
中文摘要 ................... I
英文摘要 ................... III
致謝 ....................... V
目錄 ....................... VI
表目錄 ..................... VIII
圖目錄 ..................... IX
第一章 序論 ................ 01
1.1 研究背景與動機 .......... 01
1.2 研究目的 ............... 01
1.3 論文架構 ............... 02
第二章 文獻回顧 ............. 03
2.1 資訊隱藏 ............... 03
2.2 文獻探討 ............... 04
第三章 本文提出的方法 ........ 09
3.1 嵌入規則與方法 .......... 10
3.2 嵌入流程與演算法 ........ 16
3.3 提取方法 ............... 19
3.4 提取流程與演算法 ........ 20
第四章 實驗結果 ............. 22
第五章 結論與未來工作 ........ 34
參考文獻 .................... 35

[1]Asif, A. M. A. M., Hannan, S. A., Manza, R. R., & Ramteke, R. J. (2010, December). Conversion of bitmap text images for data hiding. In Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on (pp. 1-4). IEEE.
[2]Byun, J. Y., Jung, K. H., & Yoo, K. Y. (2008, December). Improved Data Hiding Method by Block Parity for Binary Images. In Computer Science and Software Engineering, 2008 International Conference on (Vol. 3, pp. 931-934). IEEE.
[3]Cao, H., & Kot, A. C. (2012). EAG: Edge adaptive grid data hiding for binary image authentication. In Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, Dec (pp. 3-6).
[4]Chan, C. S., & Chang, C. Y. (2010, January). Hiding data in parity check bit. InProceedings of the 4th International Conference on Uniquitous Information Management and Communication (p. 52). ACM.
[5]Chao, R. M., Ho, Y. A., & Chu, Y. P. (2008, December). Data hiding scheme using covering codes in halftone images based on error diffusion. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE (pp. 1483-1488). IEEE.
[6]Gao, T., & Su, M. (2010, August). Topology based fragile watermark for binary image. In Digital Content, Multimedia Technology and its Applications (IDC), 2010 6th International Conference on (pp. 290-295). IEEE.
[7]Guo, M., & Zhang, H. (2010, August). High capacity data hiding for binary image authentication. In Pattern Recognition (ICPR), 2010 20th International Conference on (pp. 1441-1444). IEEE.
[8]Huy, P. T., & Kim, C. (2013). Binary Image Data Hiding Using Matrix Encoding Technique in Sensors. International Journal of Distributed Sensor Networks,2013.
[9]Jung, K. H., Ha, K. S., & Yoo, K. Y. (2008, August). Data hiding in binary images by pixel-value weighting. In Convergence and Hybrid Information Technology, 2008. ICHIT'08. International Conference on (pp. 262-265). IEEE.
[10]Lin, K. T. (2012, July). Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012 Eighth International Conference on (pp. 59-62). IEEE.
[11]Lo, C. C., Lee, C. M., Liao, B. Y., & Pan, J. S. (2008, August). Halftone Image Data Hiding with Reference to Original Multitone Image. In Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP'08 International Conference on (pp. 265-268). IEEE.
[12]Naskar, R., & Chakraborty, R. S. (2011, November). Lossless data hiding for halftone images. In Image Information Processing (ICIIP), 2011 International Conference on (pp. 1-6). IEEE.
[13]Tirandaz, H., Davarzani, R., Monemizadeh, M., & Haddadnia, J. (2009, May). Invisible and high capacity data hiding in binary text images based on use of edge pixels. In 2009 International Conference on Signal Processing Systems(pp. 130-134). IEEE.
[14]Wu, X., & Sun, W. (2010, November). Visual data hiding in dot diffusion images. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on (pp. 588-593). IEEE.
[15]Yang, C. H., & Liu, S. Y. (2009). A Novel High Capacity Data Hiding Method Based on Exclusive-OR in Binary Images. In 2009 International Conference on Advanced Information Technologies (AIT).
[16]Yang, H., & Kot, A. C. (2008, May). Backward-forward distortion minimization for binary images data hiding. In Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on (pp. 404-407). IEEE.
[17]Yu, X. Y., & Wang, A. (2009, September). Chain coding based data hiding in binary images. In Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth International Conference on (pp. 933-936). IEEE.
[18]Zhang, H. B., & Man, L. (2008, August). Data hiding in binary line drawing images. In Wavelet Analysis and Pattern Recognition, 2008. ICWAPR'08. International Conference on (Vol. 1, pp. 134-140). IEEE.
[19]Zhang, W., Chen, B., & Yu, N. (2012). Improving various reversible data hiding schemes via optimal codes for binary covers. Image Processing, IEEE Transactions on, 21(6), 2991-3003.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊