(18.204.227.34) 您好!臺灣時間:2021/05/19 07:27
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳奕廷
研究生(外文):Yi-Ting Chen
論文名稱:使用風格化影像與組合數字系統之資訊隱藏演算法
論文名稱(外文):A Data Hiding Algorithm Using Stylized Images and the Combinatorial Number System
指導教授:王宗銘王宗銘引用關係
口試委員:蔡淵裕王鵬程
口試日期:2016-07-11
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學與工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:中文
論文頁數:51
中文關鍵詞:風格化影像組合數字系統資訊隱藏演算法二次嵌入程序高動態範圍影像訊息轉換
外文關鍵詞:image stylizationcombinatorial number systemdata hiding algorithmtwice embedding processinghigh dynamic range imagesmessage conversion
相關次數:
  • 被引用被引用:0
  • 點閱點閱:123
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本篇論文提出一個風格化影像嵌入演算法,我們將風格化影像作為我們的掩護影像,演算法以組合數字系統公式作為核心,進行嵌入秘密訊息的工作。
風格化影像嵌入演算法的執行步驟,首先將已風格化的影像做影像分析,分析出邊界像素的數量與位置,主要是為了方便之後的嵌入工作。接下來以使用者自訂C(N, K)參數進行秘密訊息轉換,方便使用組合數字系統公式。利用組合數字系統公式開始進行嵌入工作,將邊界像素每個通道均嵌滿,即完成嵌入工作。擷取方面則先尋找所有邊界像素位置,觀察變動位置利用組合數字系統公式即可解出秘密訊息,所以接收端僅需偽裝影像與C(N, K)參數,便能解出秘密訊息,傳送端不需要傳送而外的解密資訊。低動態風格畫偽裝影像經實驗發現,其嵌入量必須降低才能躲避偽裝偵測,而高動態風格畫偽裝影像則不須降低嵌入量,便能躲避偵測,所以我們進行嵌入第二層秘密訊息增加藏量,其嵌入量最高能到2.2 bpp,經量化工具量化結果,偽裝影像品質良好,偽裝影像與掩護影像幾乎無差異。
本文主要貢獻為首創將風格化影像作為掩護影像,並參考組合數字系統公式創造新的嵌入演算法,我們認為此演算法對資訊隱藏提供具體貢獻。


This thesis proposes an image stylization data hiding algorithm, where stylized images are used as our cover images. We embed secret messages making use of the combinatorial number system.
The message concealment in our algorithm contains several phases. In the first phase, we analyze stylized images to derive their quantity and positions of black boundaries. In the second phase, users present the parameters, C(N, K), to transform a binary secret messages into a secret digit in a target notational system. The final stage phase employs the combinatorial number system to convey secret message in black boundaries. The extraction of secret messages is in the reverse order. First, we determine all of black boundaries revealed in the stego image. Next, we check each pixel in the back boundaries to determine whether it is being altered. Finally, we adopt the combinatorial number system with the same embedding parameter, C(N, K), to retrieve our secret image from the stego image.
We conduct our experiments using both high dynamic range (HDR) and low dynamic range images (LDR). Experimental results demonstrate that our scheme can offer the embedding rate of 2.2 bits per pixel. In addition, when using the LDR styled image, our scheme can resist the steganalytic attacks form the EC-MV and LRT steganalyzer. The image quantization results using HDR-VDP-2 indicate that there is no visual difference between the cover and the stego images.
In conclusion, we propose a novel data hiding algorithm using stylized images and the combinatorial number system. Our algorithm offers a high embedding rate and produces stego images with a high quality. We believe our proposed scheme extends the feasibility of steganographic applications.


致謝 i
摘 要 ii
Abstract iii
目錄 iv
圖目錄 vi
表目錄 vii
第一章 緒論 1
1.1研究動機與目的 1
1.2論文架構 2
第二章 相關文獻探討 3
2.1 高動態範圍影像格式 3
2.2 影像風格化 4
2.3 組合數字系統 5
第三章 風格化影像嵌入演算法 6
3.1進制與組合數字系統 6
3.2低動態風格化影像嵌入演算法 7
3.2.1演算法介紹 7
3.2.2演算法嵌入流程 8
3.2.3演算法擷取流程 9
3.3高動態風格化影像嵌入演算法 10
3.3.1演算法介紹 10
3.3.2演算法嵌入流程 11
3.3.3演算法擷取流程 12
3.3小結 13
第四章 實驗結果與數據 14
4.1低動態風格化影像嵌入量與偽裝偵測的關係 14
4.2低動態風格化影像嵌入實驗結果 16
4.3高動態風格化影像嵌入實驗結果 27
4.4小結 40
第五章 結論與未來工作 42
5.1結論 42
5.2未來工作 43
參考文獻 44
中英對照表 49
英中對照表 51



[Beck1964]
E. F. Beckenbach, Applied Combinatorial Mathematics, Krieger Publishing Co., New York, 1964.

[Borg2008]
P. Borges, J. Mayer, and E. Izquierdo, “Robust and Transparent Color Modulation for Text Data Hiding,” IEEE Transactions on Multimedia, Vol. 10, No. 8, pp. 1479-1489, 2008.

[Chan2004]
C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition Letters, Vol. 37, No. 3, pp. 469-474, 2004.

[Chen2016]
W. S. Chen, Y. K. Liao, Y. T. Lin, and C. M. Wang, “A novel general multiple-base data embedding algorithm,” Information Sciences, Vol. 358-359, pp. 164-190, September 2016.

[Cogr2015]
R. Cogranne and J. Fridrich, “Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory,” IEEE Transactions on Information Forensics Security, Vol. 10, No. 12, pp. 432-444, December 2015.

[Gopa2009]
K. Gopalan, “A Unified Audio and Image Steganography by Spectrum Modification,” in Proceedings of the 2009 IEEE International Conference on Industrial Technology, pp.1-5, 2009.

[Guo2011]
J. M. Guo and J. J. Tsai, “Data-Hiding in Halftone Image Using Adaptive Noise-Balanced Error Diffusion,” IEEE Multimedia, Vol. 18, No. 2, pp. 48-60, 2011.

[Huan2009]
N. C. Huang, M. T. Li, and C. M. Wang, “Toward Optimal Embedding Capacity for Permutation Steganography,” IEEE Signal Processing Letters, Vol. 16, No. 9, pp. 802-805, 2009.

[Huss2011]
A. Hussein, “Data Hiding in Motion Vector of Compressed Video Based on Their Associated Prediction Error,” IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 95-98, 2011.

[Kodo2012]
J. Kodovský, J. Fridrich, and V. Holub, “Ensemble Classifiers for Steganalysis of Digital Media,” IEEE Transactions on Information Forensics Security, Vol. 7, No. 2, pp. 432-444, April 2012.

[Lee2012]
Y. P. Lee, J. C. Lee, W. K. Chen, K. C. Chang, I. J. Su, and C. P. Chang, “High-payload Image Hiding with Quality Recovery Using Tri-way Pixel-value Differencing,” Information Sciences, Vol. 191, pp. 214-225, 2012.

[Li2009]
M. T. Li, N. C. Huang, K. C. Wu, C. K. Jan, and C. M. Wang, “An Effective Message Embedding Scheme for 3D Models,” Fundamenta Informaticae, Vol. 97, No. 1-2, pp. 93-109, 2009.

[Li2011]
M. T. Li, N. C. Huang, and C. M. Wang, “A Data Hiding Scheme for High Dynamic Range Images,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 5(A), pp. 2021-2035, 2011.

[Mali2007]
H. M. A. Malik, R. Ansari, and A. A. Khokhar, “Robust Data Hiding in Audio Using Allpass Filters,” IEEE Transactions on Audio, Speech, and Language Processing, Vol. 15, No. 4, pp. 1296-1304, May 2007.

[Narw2015]
M. Narwaria, R. K. Mantiuk, M. P. Da Silva, and P. Le Callet, “HDR-VDP-2.2: A calibrated method for objective quality prediction of high-dynamic range and standard images,” Journal of Electronic Imaging, Vol. 24, No. 1, 010501, January 2015.

[Peti1999]
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999.

[Prov2003]
N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, pp. 32-44, 2003.

[Rein2002a]
E. Reinhard, M. Stark, P. Shirley, and J. Ferwerda,“Photographic Tone Reproduction for Digital Images,” ACM Transactions on Graphics (Proceedings of ACM SIGGRAPH 2002), Vol. 21, No. 3, pp. 267-276, 2002.

[Rein2002b]
E. Reinhard, “Parameter estimation for photographic tone reproduction,” Journal of Graphics Tools, Vol. 7, No. 1, pp. 45-52, November 2002.

[Rein2003]
E. Reinhard, “Parameter Estimation for Photographic Tone Reproduction,” Journal of Graphics Tools, Vol. 7, No. 1, pp. 45-51, 2003.

[Rein2005]
E. Reinhard, G. Ward, S. Pattanaik, and P. Debevec, High Dynamic Range Imaging, Morgan Kaufmann Publishers, 2005.

[Shir2008]
M. Shirali-Shahreza and M. H. Shirali-Shahreza, “An Improved Version of Persian/Arabic Text Steganography Using ‘La’ Word,” in Proceedings of the 6th National Conference on Telecommunication Technology, pp. 372-376, Putrajaya, Malaysia, 2008.

[Toma1998]
C. Tomasi and R. Manduchi, “Bilateral Filtering for Gray and Color Images,” in Proceedings of the 1998 IEEE International Conference on Computer Vision, pp. 836-846, 1998.

[Wang2002]
Z. Wang and A. C. Bovik, “A Universal Image Quality Index,” IEEE Signal Processing Letters, Vol. 9, No. 3, pp. 81-84, 2002.

[Wang2004]
Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image Quality Assessment: From Error Visibility to Structural Similarity,” IEEE Transactions on Image Processing, Vol. 13, No. 4, pp. 600-612, 2004.

[Wang2011]
Z. Wang and Q. Li, “Information Content Weighting for Perceptual Image Quality Assessment,” IEEE Transactions on Image Processing, Vol. 20, No. 5, pp. 1185-1197, 2011.

[Ward1991]
G. Ward, “Real Pixels,” in Graphics Gems II, edited by J. Arvo, Academic Press, San Diego, 1991.

[Wayn2002]
Z. Wang and A. C. Bovik, “A Universal Image Quality Index,” IEEE Signal Processing Letters, Vol. 9, No. 3, pp. 81-84, 2002.

[Winn2006]
H. Winnemöller, S. C. Olsen, and B. Gooch, “Real-Time Video Abstraction,” ACM Transactions on Graphics (Proceedings of ACM SIGGRAPH 2006), Vol. 25, No. 3, pp.1221-1226, 2006.

[Wong2009]
K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete Video Quality-preserving Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 10, pp. 1499-1512, 2009.

[Wu2015]
K. C. Wu and C. M. Wang, “Steganography Using Reversible Texture Synthesis,” IEEE Transactions on Image Processing, Vol. 24,No. 1, pp. 130-139, January 2015.

[Zhan2005]
X. Zhang and S. Wang, “Steganography Using Multiple-base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, No. 1, pp. 67-70, 2005.

[Zhan2014]
L. Zhang, Y. Shen, and H. Li, “VSI: A Visual Saliency-Induced Index for Perceptual Image Quality Assessment,” IEEE Trans. Image Process, Vol. 23, No. 10, pp. 4270-4281, October 2014.

[Zhou2008]
Y. C. Zhou and C. M. Wang, “A Study of Image Stylization Algorithms for High Dynamic Range Images,” Journal of Engineering, National Chung Hsing University, 2008.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
無相關期刊
 
無相關點閱論文