跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.90) 您好!臺灣時間:2025/01/21 18:51
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:江嫚書
研究生(外文):Man-Shu Chiang
論文名稱:針對加密音訊之藉由改進直方圖位移技術的幾乎可逆式資料隱藏方法
論文名稱(外文):Nearly Reversible Data Hiding for Encrypted Audios by Modified Histogram Shifting
指導教授:吳家麟
口試委員:朱威達陳文進胡敏君鄭文皇
口試日期:2016-04-21
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊網路與多媒體研究所
學門:電算機學門
學類:網路學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:英文
論文頁數:30
中文關鍵詞:資訊隱藏加密音訊直方圖位移
外文關鍵詞:Data HidingaudiosHistogram shifting
相關次數:
  • 被引用被引用:0
  • 點閱點閱:218
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
這篇論文針對加密的音訊提出一個幾乎可逆式且高容量的資訊隱藏方法。有鑑於傳統方法: 從經過加密的音訊中挪出空間來存放額外的資訊,可能對還原後訊號的品質造成一定程度的影響,由於原始音訊具有連續的特性,我們以一半數量的取樣去預測另外一半的取樣,進而得到預測誤差,再從這些誤差中騰出空間,以利於音訊加密後將資訊藏入。內容擁有者需採取一套特定的加密技術去加密這些誤差,而其餘一半的取樣則可以使用任一種加密機制,如: AES 或位元exclusive OR 運算子。資訊隱藏者使用資訊隱藏金鑰加密資訊,並將其藏入經過加密的音訊中。在接收端,擁有資訊隱藏金鑰者可以正確無誤地取出藏入的資訊;並且,本方法支援兩種機制: 先解密音訊再取出藏入資訊或是先取出藏入資訊再解密音訊,使用者可以根據不同的應用採取不同的順序;最後,實驗結果指出我們提出的方法可以讓藏有大量資訊的音訊達到較好的品質,並且還原回來的音訊幾乎能被完全還原,其分段式訊號雜訊比的值可以超過或接近60 分貝。

A nearly reversible and high capacity data hiding mechanism on encrypted audios is proposed in this thesis. In the first phase, instead of vacating room for embedding additional data from the encrypted audios, which may lead to inferior qualities of recovered signals, we exploit the continuity of original audio to estimate half of the samples and embed bits into their estimating errors. A content owner can encrypt the estimating errors with a specific encryption scheme. Note that any one of the existing encryption schemes, such as AES or bitwise exclusive OR, is allowed to be applied to the rest half of samples. With the data hiding key, a data hider can embed data in the encryption version of the audio. At the receiver side, those who have no knowledge about the encryption key are able to extract concealing bits without errors. Moreover, the order of signal decryption and data extraction can be exchanged depending on the requirements of applications. Furthermore, experimental results demonstrate that the proposed work achieved a superior imperceptibility of
marked audios with large amount of embedding data and, more importantly, the recovered audios are also nearly totally reversible with segSNR higher than or equal to 60 dB.

Contents
口試委員會審定書.........................................i
誌謝.................................................. ii
摘要................................................. iii
Abstract ..............................................iv
List of Figures ...................................... vi
List of Tables ...................................... vii
Introduction .......................................... 1
The proposed RDH Scheme and Algorithms................. 6
2.1 Pre-processing .................................... 7
2.2 Vacating room for embedding bits .................. 7
2.3 Encrypting the cover audio ....................... 10
2.4 Hiding additional data in the encryption domain .. 11
2.5 Audio recovering and Data extracting ............. 12
2.5.1 SchemeⅠ:Data extraction before audio decryption.12
2.5.2 Scheme-Ⅱ:Audio decryption before data extraction13
Experiments .......................................... 16
3.1 The relationship between quantization factor N and capacities of embedding bits.................... ..... 18
3.2 The importance of the two exactly highest bins
[1] M. Wu and B. Liu, “Data hiding in image and video .I. fundamental issues and solutions,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 685–695, Jun. 2003.
[2] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video .II. designs and applications,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 696–705, Jun. 2003.
[3] J. M. Barton, “Method and apparatus for embedding authentication information within digital data," U.S. Patent 5646997, 1997.
[4] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Reversible data hiding", Proc. Int. Conf. Image Processing, vol. II, pp. 157-160, 2002
[5] Z.Ni, Y.Q. Shi, N. Ansari and W. Su, “Reversible Data Hiding”, IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 3 , pp. 354-362,Mar 2006.
[6] J. Tian, Reversible data embedding using a difference expansion, IEEE Transactions on Circuits System and Video Technology 13(8) (2003)890–896.
[7] X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image
Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.
[8] P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009.
[9] F. Wang, Z. Xie, and Z. Chen, “High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion," The Scientific World Journal, vol. 2014, Article ID 656251, 2014.
[10] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
[11] D. Q. Yan, and R. D. Wang, “Reversible Data Hiding for Audio Based on Pre-diction Error Expansion," Intelligent Information Hiding and Multimedia Signal Processing, pp. 249-252, 2008.
[12] X. Zhang, “Reversible data hiding in encrypted images," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, 2011. 30
[13] W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. no. 4, pp. 199–202, Apr.2012.
[14] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
[15] K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013.
[16] Weiming Zhang, “Reversibility improved data hiding in encrypted images,” Signal Processing, Volume 94, January 2014, Pages 118–127
[17] Shuang Yi, Yicong Zhou, “An improved reversible data hiding in encrypted images,” Signal and Information Processing (ChinaSIP), 2015 IEEE China Summit and International Conference on, pp. 225 – 229, 2015
[18] Jing-Yong Qiu, Yu-Hsun Lin and Ja-Ling Wu, “Reversible Data Hiding for Encrypted Audios by High Order Smoothness,” International Workshop on Digital-forensics and Watermarking (IWDW 2015), 2015
[19] “VOICEBOX: Speech Processing Toolbox for MATLAB,"
http://www.ee.ic.ac.uk/hp/sta_/dmb/voicebox/voicebox.html
[20] P. Kabal, “An examination and interpretation of ITU-R BS.1387: Perceptual evaluation of audio quality," TSP Lab Technical Report, Dept. Electrical & Computer Engineering, McGill University, pp. 189, 2002.
[21] H. S. Hou and H. C. Andrews, “Cubic splines for image interpolation and digital filtering,” IEEE Trans. Acoust., Speech, Signal Processing, vol. ASSP-26, pp.
508–517, Dec. 1978.
[22] I. S. Reed and A. Yu, “Optimal spline interpolation for image compression,” U.S. Patent 5 822 456, Oct. 13, 1998.
[23] M. Goto, H. Hashiguchi, T. Nishimura, and R. Oka, “RWC Music Database: Music Genre Database and Musical Instrument Sound Database," Proceedings of the 4th International Conference on Music Information Retrieval (ISMIR), pp.229-230, 2003.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top