(3.236.231.14) 您好!臺灣時間:2021/04/11 23:50
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳莉雯
研究生(外文):Chen, Li-Wen
論文名稱:植基於加密影像上之可逆式資訊隱藏
論文名稱(外文):Reversible Data Hiding in Encrypted Image
指導教授:楊政興楊政興引用關係
指導教授(外文):Yang, Cheng-Hsing
口試委員:林義凱黃河銓
口試委員(外文):Lin, Yih-KaiHUANG, He-Cyuan
口試日期:2014-06-25
學位類別:碩士
校院名稱:國立屏東教育大學
系所名稱:資訊科學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:33
中文關鍵詞:可逆式資訊隱藏直方圖哈爾小波轉換影像加密
外文關鍵詞:Reversible data hidingHistogramHaar WaveletEncrypted image
相關次數:
  • 被引用被引用:0
  • 點閱點閱:352
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:4
  • 收藏至我的研究室書目清單書目收藏:0
隨著科技日新月異的蓬勃發展,多媒體資訊可藉由網路快速傳播,進而也衍生版權保護與資訊安全的問題。本論文針對灰階影像,提出加密結合可逆式資訊隱藏的技術。我們利用哈爾小波轉換,將影像從空間域轉換到頻率域,接著針對低頻子帶LL3的部分做加密,達到影像加密的效果,並且針對其他的中高頻子帶,使用直方圖式可逆式資訊隱藏技術來藏入訊息。實驗結果顯示,在一至三階的哈爾小波轉換中,我們的方法都可以呈現良好的加密效果,平均嵌入量約10萬位元左右。
As the growth of technology development, multimedia information can be transmitted quickly over the network. It also brings a lot of problems about copyright protection and information security. This thesis proposed a reversible data hiding method on encrypted grey images. We use the Haar Wavelet Transformation to transform images from the space domain to the frequency domain. Then, the low-frequency sub-band LL3 is encrypted to achieve the effect of the image encryption. On the other high-frequency sub-bands, we use the histogram-based reversible data hiding method to embedd message. The experimental results show that our method has good encrypted effect, when one to three stages of Harr Wavelet Transformation are used. The averaged embedding is capacity about one hundred thousand bits.
誌 謝 i
摘 要 ii
Abstract iii
目 錄 iv
圖 次 v
表 次 vi
第一章 緒論 1
1.1研究動機與目的 1
1.2背景介紹 1
1.3論文架構 2
第二章 文獻探討 3
2.1哈爾小波轉換 3
2.2 Ma等人的方法 7
2.3 Yang 等人的方法 9
2.4 Chang等人的方法 11
2.5 Zhang的方法 14
第三章 研究方法 15
3.1加密與嵌入演算法 16
3.2解密與萃取回復演算法 17
3.3 Overflow/Underflow的問題 21
第四章 實驗結果 22
第五章 結論與未來研究 30
參考文獻 31

[1]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and System for Video Technology, Vol. 13, No. 8, pp. 831-841, 2003.
[2] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol. 89, pp. 1129-1143, 2009.
[3] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, pp. 354-362, 2006.
[4] H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, “A novel difference expansion transform for reversible data embedding,” IEEE Transactions on Information Forensics and Security, Vol. 3, pp. 456-465, 2008.
[5] C. H. Yang and M.H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” IET Image Processing, Vol. 4, No. 4, pp. 223-234, 2010.
[6] C. H. Yang, Y. C. Lin, S. C. Wu, and M. H. Wu, “Reversible data hiding of a VQ index table based on referred counts,” 2008 International Computer Symposium (ICS 2008), 2008.
[7] C. C. Chang, P. Y. Pai, C. M. Yeh, and Y.K. Chan, “A high payload frequency-based reversible image hiding method,” Information Science, Vol. 180, pp. 2286-2298, 2010.
[8] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible Data Hiding in Encrypted Image by Reserving Room Before Encryption, ” IEEE Transactions on Information Forensics and Security, vol. 8, np. 3, pp. 553-562, 2013.
[9] S. P. Mohanty and B. K. Bhargava, “Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks,” Transactions on Multimedia Computing, Communications, and Applications, Vol. 5, pp. 1-24, 2008.
[10]W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted image using side match,” IEEE Signal Process. Lett. , vol.19, no. 4, pp. 199-202 , Apr. 2012.
[11]X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal process. Lett . , Vol. 18, no. 4, pp. 255-258, Apr. 2011.
[12]X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826-832, Apr. 2012
[13]W. Zhang, K. Ma, and N. Yu, “Reversibility improved data hiding in encrypted image,” Signal Processing 94(2014)118-127.
[14]N. K. Sreelaja, and G. A. V Pai, “Stream cipher for binary image encryption using Ant Colony Optimization based key generation,” Applied Soft Computing 12 (2012) 2879–2895.
[15]M. S. Chang, and S, J, Kim, “ Image encryption using modified exclusive-OR rules and phase-wrapping technique,” Optics Communications 254 (2005) 67–75.
[16].Z. Zhong, J. Chang, M. Shan, and B. Hao, “Double image encryption using double pixel scrambling and random phase encoding,” Optics Communications 285 (2012) 584–588
[17]L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Computers and Electrical Engineering 38 (2012) 1240–1248.
[18]M. Ono, S. Han, M. Fujiyoshi, and H. Kiya, “A location map-free reversible data hiding method for specific area embedding,” IEICE Electionics Express, vol, No 8, 483-489.
[19]G. Feng, and L. Fan, “Reversible data hiding of high payload using local edge sensing prediction,” The Journal of Systems and Software 85 (2012) 392– 399.
[20]C. C. Lin, W. L. Tai, and C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, 2008, vol. 41, pp. 3582-3591.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔