# 臺灣博碩士論文加值系統

(44.200.169.3) 您好！臺灣時間：2022/12/04 10:03

:::

### 詳目顯示

:

• 被引用:0
• 點閱:257
• 評分:
• 下載:6
• 書目收藏:0
 在本論文中我們提出了應用在二元影像中的高容量資訊隱藏方法。二元影像所擁有的資訊太少所以不能隱藏太多的資料，因為它只有兩種顏色，黑色或白色。資訊隱藏的多少與眼睛察覺存在之間互相取捨。在隱藏前我們用擬亂數產生器打亂機密資訊以確保資訊更安全。首先，我們將掩護影像分成不重疊的5×5區塊。然後，我們將每個5×5的區塊分割成四個重疊的3×3子區塊。我們跳過所有全黑或全白的5×5區塊以及3×3子區塊。我們考慮其他3×3子區塊，並檢查左上角像素和第一子區塊中心像素；右上角像素和第二子區塊中心像素；右下角像素和第三子區塊中心像素；左下角像素和第四子區塊中心像素之間以XOR運算來隱藏機密資訊。提取的方法是檢測每個3×3子區塊中心和四個角落的3個像素之間的XOR運算。收集所有嵌入的位元然後還原成原來的順序。實驗結果表示，該方法提供了較大的嵌入量，而且難以察覺。
 In this thesis we propose a high capacity data hiding method applying on binary images. The information of a binary image is too little to hide a lot of data, since it has only two colours, black or white. The data hiding has a trade-off between capacities and imperceptions. We shuffle the secret data by a pseudo-random number generator before hiding to keep more secure. We divide the host image into non-overlapping five by five sub-blocks, which the secret data will be camouflaged. Then we partition each five by five sub-block into four overlapping three by three sub-blocks. We skip the all blacks or all whites in five by five sub-blocks and three by three sub-block. We consider others three by three sub-block to check the XOR between upper left and centre, upper right and centre, bottom right and centre or bottom left and centre, then embed three bits in each three by three sub-block. The extraction way is simply to test the XOR between the four corner pixels with their right and down pixels and the centre of each three by three sub-block. All embedding bits are collected and shuffled back to the original order. The experimental results show that the method provides the large embedding capacity and keeps imperceptible and reveal the host image lossless.
 中文摘要 ................... I英文摘要 ................... III致謝 ....................... V目錄 ....................... VI表目錄 ..................... VIII圖目錄 ..................... IX第一章 序論 ................ 011.1 研究背景與動機 .......... 011.2 研究目的 ............... 011.3 論文架構 ............... 02第二章 文獻回顧 ............. 032.1 資訊隱藏 ............... 032.2 文獻探討 ............... 04第三章 本文提出的方法 ........ 093.1 嵌入規則與方法 .......... 103.2 嵌入流程與演算法 ........ 163.3 提取方法 ............... 193.4 提取流程與演算法 ........ 20第四章 實驗結果 ............. 22第五章 結論與未來工作 ........ 34參考文獻 .................... 35
 [1]Asif, A. M. A. M., Hannan, S. A., Manza, R. R., & Ramteke, R. J. (2010, December). Conversion of bitmap text images for data hiding. In Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on (pp. 1-4). IEEE.[2]Byun, J. Y., Jung, K. H., & Yoo, K. Y. (2008, December). Improved Data Hiding Method by Block Parity for Binary Images. In Computer Science and Software Engineering, 2008 International Conference on (Vol. 3, pp. 931-934). IEEE.[3]Cao, H., & Kot, A. C. (2012). EAG: Edge adaptive grid data hiding for binary image authentication. In Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, Dec (pp. 3-6).[4]Chan, C. S., & Chang, C. Y. (2010, January). Hiding data in parity check bit. InProceedings of the 4th International Conference on Uniquitous Information Management and Communication (p. 52). ACM.[5]Chao, R. M., Ho, Y. A., & Chu, Y. P. (2008, December). Data hiding scheme using covering codes in halftone images based on error diffusion. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE (pp. 1483-1488). IEEE.[6]Gao, T., & Su, M. (2010, August). Topology based fragile watermark for binary image. In Digital Content, Multimedia Technology and its Applications (IDC), 2010 6th International Conference on (pp. 290-295). IEEE.[7]Guo, M., & Zhang, H. (2010, August). High capacity data hiding for binary image authentication. In Pattern Recognition (ICPR), 2010 20th International Conference on (pp. 1441-1444). IEEE.[8]Huy, P. T., & Kim, C. (2013). Binary Image Data Hiding Using Matrix Encoding Technique in Sensors. International Journal of Distributed Sensor Networks,2013.[9]Jung, K. H., Ha, K. S., & Yoo, K. Y. (2008, August). Data hiding in binary images by pixel-value weighting. In Convergence and Hybrid Information Technology, 2008. ICHIT'08. International Conference on (pp. 262-265). IEEE.[10]Lin, K. T. (2012, July). Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012 Eighth International Conference on (pp. 59-62). IEEE.[11]Lo, C. C., Lee, C. M., Liao, B. Y., & Pan, J. S. (2008, August). Halftone Image Data Hiding with Reference to Original Multitone Image. In Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP'08 International Conference on (pp. 265-268). IEEE.[12]Naskar, R., & Chakraborty, R. S. (2011, November). Lossless data hiding for halftone images. In Image Information Processing (ICIIP), 2011 International Conference on (pp. 1-6). IEEE.[13]Tirandaz, H., Davarzani, R., Monemizadeh, M., & Haddadnia, J. (2009, May). Invisible and high capacity data hiding in binary text images based on use of edge pixels. In 2009 International Conference on Signal Processing Systems(pp. 130-134). IEEE.[14]Wu, X., & Sun, W. (2010, November). Visual data hiding in dot diffusion images. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on (pp. 588-593). IEEE.[15]Yang, C. H., & Liu, S. Y. (2009). A Novel High Capacity Data Hiding Method Based on Exclusive-OR in Binary Images. In 2009 International Conference on Advanced Information Technologies (AIT).[16]Yang, H., & Kot, A. C. (2008, May). Backward-forward distortion minimization for binary images data hiding. In Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on (pp. 404-407). IEEE.[17]Yu, X. Y., & Wang, A. (2009, September). Chain coding based data hiding in binary images. In Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth International Conference on (pp. 933-936). IEEE.[18]Zhang, H. B., & Man, L. (2008, August). Data hiding in binary line drawing images. In Wavelet Analysis and Pattern Recognition, 2008. ICWAPR'08. International Conference on (Vol. 1, pp. 134-140). IEEE.[19]Zhang, W., Chen, B., & Yu, N. (2012). Improving various reversible data hiding schemes via optimal codes for binary covers. Image Processing, IEEE Transactions on, 21(6), 2991-3003.
 電子全文
 國圖紙本論文
 推文當script無法執行時可按︰推文 網路書籤當script無法執行時可按︰網路書籤 推薦當script無法執行時可按︰推薦 評分當script無法執行時可按︰評分 引用網址當script無法執行時可按︰引用網址 轉寄當script無法執行時可按︰轉寄

 1 在影像中隱藏資料的研究 2 利用仿射變換將資訊隱藏在SVG中之研究 3 向量地圖資料隱藏演算法 4 使用最小誤差嵌入演算法之浮水印硬體實現 5 植基於調整亂數之資訊隱藏技術 6 發展可逆式向量地圖資訊隱藏系統 7 基於2D插補法具適應性的資訊隱藏技術 8 基於MP3上的資訊隱藏方法 9 在灰階影像中利用區塊分析的資訊隱藏法 10 資訊隱藏在彩色影像中 11 數位影像之隱藏及浮水印技術之研究 12 非對稱式資訊隱藏技術之研究 13 資料隱藏與安全共享機制之設計 14 具有高隱藏量與低失真性的資料隱藏技術研究 15 應用最小誤差嵌入技術在JPEG2000資料串流中嵌入多位元浮水印

 無相關期刊

 1 基於應用XOR於交錯位元位置的視覺秘密影像分享機制 2 自動化檢視核對信用卡編號系統 3 基於消失點與景色資訊的單張深度影像生成法 4 基於形態學運算之立體影像生成的破洞填補法 5 在不同亮度下基於YIQ中Y頻道梯度變化的彩色影像比對法 6 以兩張掩護影像和基於可變動區塊大小與互斥或運算的可逆二元影像資訊隱藏法 7 大量角色行動對遊戲效能影響之研究 8 世界大學網路排名之研究-以玄奘大學為例 9 利用影像融合方法之雜訊虹膜辨識 10 以多媒體學習認知理論與擴增實境技術建置人體骨骼學習系統 11 從《世說新語》德行言語看魏晉名士 12 利用Open GL進行3D影像漸變之研究與實作 13 利用概念圖與自然語言處理於歷史資料分析 14 高雄市議會議員選民服務系統建置 -以樹狀結構探討會員人數變化與造勢活動的關係 15 應用四元樹結構的視覺影像秘密分享

 簡易查詢 | 進階查詢 | 熱門排行 | 我的研究室