(3.227.235.183) 您好!臺灣時間:2021/04/14 18:16
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:劉冠良
研究生(外文):Liu, Kuan-Liang
論文名稱:以多種預測法配合變異數提升直方圖式可逆資訊隱藏技術之品質與藏量
論文名稱(外文):Histogram Based Reversible Information Hiding Improved by Multiple Prediction Methods with the Variance to Enhance Image Quality and Capacity
指導教授:楊政興楊政興引用關係
指導教授(外文):Yang, Cheng-Hsing
口試委員:林義凱黃河銓
口試委員(外文):Lin, Yih-KaiHuang, Ho-Chuan
口試日期:2014-06-25
學位類別:碩士
校院名稱:國立屏東教育大學
系所名稱:資訊科學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:29
中文關鍵詞:資訊隱藏可逆式變異數影像品質直方圖
外文關鍵詞:Data hidingReversibleVarianceImage qualityHistogram
相關次數:
  • 被引用被引用:0
  • 點閱點閱:112
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:2
  • 收藏至我的研究室書目清單書目收藏:0
在可逆式資訊隱藏中,預先預測是一個很好的方法可以有效的將機密訊息藏入影像中。在本論文中,我們提出一個可逆式的資訊隱藏基於多種預測方法以及使用變異數的方法。我們的方法中,每一層在藏入機密訊息之前我們會有兩種策略以及四種預測方式。首先,如果我們的目標是高藏量便計算各種預測方式的藏量;另外,如果我們的目標是高品質便計算各種預測方式的效率比以選擇該使用那種預測方式。當確定選擇哪種預測方式之後,基於變異數所算出的門檻值將用來確定那些像素應該加入位移和嵌入。如果該區域複雜度小於門檻值,則像素將參加機密藏入或者位移;反之,則像素不會參與嵌入及位移的過程。因此,某些像素將避免執行位移的過程,這會減少影像的失真。經由實驗結果可以發現我們的藏量及品質都高於其他的研究。
Reversible data hiding based on prediction methods is a good technique that can hide secret bits into cover images efficiently. In this study, we propose a reversible data hiding method based on multiple prediction methods and local complexity. In our proposed method, before we embed the secret message in one level, we evaluate four prediction methods by two ways to decide which prediction method will be used. First, if we want to achieve high-capacity, the prediction methods’ capacities are calculated. Second, if we want to achieve high-quality, the prediction methods’ efficiency ratios are calculated. When the selected prediction method is applied, a threshold based on local complexity is used to determine which pixel should join the shifting and embedding process. If the local complexity is smaller than the threshold, the pixel will be taken for message hiding or pixel shifting; otherwise, the pixel will quit joining the process of data concealing and pixel shifting. Therefore, more pixels will avoid executing the process of pixel shifting. It results to the stego-images with lower distortion. The experimental results show that our embedding capacity and quality are superior to other approaches.
Acknowledgements i
中文摘要 ii
Abstract iii
Contents iv
List of Figures v
Table of Contents vi
Chapter 1 Introduction to Reversible Data Hiding Techniques 1
1.1 Background 1
1.2 Organization of Thesis 2
Chapter 2 Literature Review 4
2.1 Yang-Tsai’s interleaving prediction method 4
2.2 Lee et al.’s prediction-error expansion method 6
2.3 Li et al.’s general framework method 7
Chapter 3 Our proposed method 9
3.1 Data Hiding Algorithm 9
3.2 Data Extracting and Recovering Algorithm 15
3.3 Overflow/Underflow 16
Chapter 4 Experimental results 18
Chapter 5 Conclusions 26
References 27

[1]J. B. Feng, I. C. Lin, C. S. Tsai, and Y. P. Chu, “Reversible watermarking: Current status and key issues,” International Journal of Networks and Security, vol. 2, no. 3, pp. 161-170, 2006.
[2]Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, “Lossless data hiding: Fundamentals, algorithms, and applications,” in Proc. IEEE ISCAS, 2004, pp. 33-36.
[3]D. C. Lou, M. C. Hu, and C. Li Liu, “Multiple-layer data hiding scheme for medical image,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 329-335, 2010.
[4]Q. M. Al-Qershi and B. E. Khoo, “High capacity data hiding schemes for medical images based on difference expansion, ”Journal of Systems and Software, vol. 31, no. 4, pp. 787-794, 2011.
[5]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits Systems for Video Technology, vol. 16, no. 3, pp. 890-896, 2003.
[6]A. M. Alttar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. on Image Processing, vol. 13, no. 8, pp. 1147-1156, 2004.
[7]C. C. Lee, H. C. Wu, C. S. Tsai, and Y. P. Chu, “Adaptive lossless steganography with centralized difference expansion,” Pattern Recognition, vol. 141, no. 6, pp. 2097-2106, 2008.
[8]Z. Ni, Y. Q. Shi, N. Ansar, and W. Su, “Reversible data hiding,” IEEE Trans. on Circuits Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006.
[9]S. Yousefl, H. Rablee, E. Yousefl, and M. Ghanbarl, “Reversible data hiding using histogram sorting and integer transform,” in Proc. IEEE DEST, 2007, pp. 487-490.
[10]C. C. Lin, W. L. Tai, C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, vol. 41, no. 12, pp. 3582-3591, 2008.
[11]P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding,” Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009.
[12]C. H. Yang and M. H. Tsai, “Improving histogram-based reversible data hiding by interleaving prediction,” IET Image Processing, vol. 4, no. 4, pp. 223-234, 2010.
[13]C. F. Lee, H. L. Chen, and H. K. Tso, “Embedding capacity raising in reversible data hiding based on prediction of difference expansion,” Journal of Systems and Software, vol. 83, no. 10, pp. 1864-1872, 2010.
[14]A. Zhao, H. Luo, Z. M. Lu, J. S. Pan, “Reversible data hiding based on multilevel histogram modification and sequential recovery,” AEU-International Journal of Electronics and Communication, vol. 65, no. 10, pp. 814-826, 2011.
[15]H. J. Hwang, H. J . Kim, V. Sachnev, and S. H. Joo, “Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting,” KSII Trans. on Internet and Information Systems, vol. 4, no. 4, pp. 555-670, 2010.
[16]X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. on Image Processing, vol. 20, no. 12, pp. 3524-3533, 2011.
[17]W. L. Tai, C. M. Yeh, and C. C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Trans. on Circuits Systems for Video Technology, vol. 19, no. 6, pp. 906-910, 2009.
[18]Z. Zhao, H. Luo, Z.M. Lu, J.S. Pan, “Reversible data hiding base on multilevel histogram modification and sequential recovery” International Journal of Electronics and Communications (AEU), Int. J. Electron. Commun. (AEU) 65 814–826, 2011.
[19]X. Li, B. Li, B. Yang, and T. Zeng, “General framework to histogram-shifting-based reversible data hiding” IEEE Transactions on image processing, vol. 22, no. 6, June 2013.
[20]C. Y. Weng, C. H. Yang, C. I. Fan, K. L. Liu, and H. M. Sun, “Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality,” in The 8th Asia Joint Conference on Information Security, Seoul, Korea, July 25-26, 2013.
[21]C.C. Lin and N.L. Hsueh, “A lossless data hiding scheme based on three-pixel block differences,” Pattern Recognition, 2008, Vol. 41, No. 4, pp. 1415-1425.
[22]J.Y. Hsiao, K.F. Chan, and J.M. Chang, “Block-based reversible data embedding,” Signal Processing, 2009, Vol. 89, Issue 4, pp. 556-569.
[23]Y. Hu, H. K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, pp. 250–260, Feb. 2009.
[24]L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forens. Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.
[25]W. Hong, “Adaptive reversible data hiding method based on error energy control and histogram shifting,” Opt. Commun., vol. 285, no. 2, pp. 101–108, 2012.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔