跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.170) 您好!臺灣時間:2024/12/02 16:00
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王友倫
研究生(外文):Yu-Lun Wang
論文名稱:向量量化編碼及動量絕對值區塊截短碼資料隱藏技術之研究
論文名稱(外文):The Study on Data Hiding Techniques in VQ and AMBTC
指導教授:沈肇基沈肇基引用關係黃明祥黃明祥引用關係
指導教授(外文):Jau-Ji ShenMin-Shiang Hwang
口試委員:楊政穎
口試委員(外文):Cheng-Ying Yang
口試日期:2017-07-07
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊管理學系所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:50
中文關鍵詞:隱寫術可逆式資訊隱藏向量量化編碼動量絕對值區塊截短碼
外文關鍵詞:Steganographyreversible data hidingVQ compressionAMBTC compression
相關次數:
  • 被引用被引用:0
  • 點閱點閱:158
  • 評分評分:
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:0
隨著最近幾年資訊科技的發展迅速、網路的速度越來越快,數位多媒體檔案像是影像檔在網路上的上傳量越來越多。源自於社群媒體的興起,導致現代人們越來越依賴社群媒體來分享自己的生活,而智慧型手機的盛行,讓隨手拍照隨手上傳照片與文字成為現實生活的一部份。這些上傳的檔案容易散播、盜用,甚至被拿來從事非法行為,因此將個人的名字、標誌等嵌入到隨手上傳的影像檔案可以透過擷取演算法證明這個影像檔案的所有權,且不同於浮水印的方法,影像不會被發現這張影像有經過資訊隱藏的處理。
壓縮影像已經是一個廣為人知的研究領域,各式各樣的壓縮法在20世紀就已經陸續被提出,在經過不斷的修改達到更佳的壓縮率,而現今社群媒體在影像上傳的時候,為了快速達到上傳的目的,通常會先將影像壓縮處理再上傳,因此若要適用於社群媒體,則將資訊隱藏於壓縮影像檔案是必要的。
這個研究將會提出適用於不同種的壓縮方法的資訊隱藏技術,並且滿足資訊隱藏於壓縮影像檔案中的標準,像是壓縮率以及隱藏量。
With the rapid development of information technology in recent years, and network faster and faster, more and more digital multimedia files such as images upload on the internet. Because of the rise of the social media, leading to modern people increasingly rely on social media to share their lives. And the popularity of smart mobile devices, make readily take pictures readily upload photos and textures possible. These uploaded files are easy to spread, misappropriation, and even be used to engage in illegal activities. Therefore, embedding personal name, logo etc. into the uploaded image file can prove ownership of the image file by and extraction algorithm. And different from the watermark method, the image will not be perceived this image has been data hidden processing.
Compressed image have become a well-known research field, and a variety of compression method have been proposed in the 20th century. After constant modification to achieve better compression rate, nowadays, social media in the image uploaded processing, in order to quickly achieve the purpose of uploading, usually compress the image first and then upload. Therefore, if we want to apply data hiding scheme to social media, it is necessary to hide the data in the compressed image file.
This proposal will propose data hiding techniques for different compression methods and meet criteria such as compression rates and the amount of data hidden in compressed image files.
致謝 i
中文摘要 ii
Abstract iii
List of Figures vi
List of Tables vii
Chapter 1 Introduction 1
1.1 Motivation 1
Chapter 2 An improved reversible data hiding based on referred frequency for VQ compressed index 5
2.1 Related Works 5
2.1.1 The VQ technique 5
2.1.2 Data hiding in VQ compressed images 6
2.1.2 Tu et al.’s scheme [44] 13
2.2 Proposed Scheme 15
2.2.1 Data hiding in VQ compressed images embedding procedure 15
2.2.2 Data hiding in VQ compressed images decompression and extracting secret information procedure 18
2.3 Experimental Results 19
2.3.1 Embedding performance 21
2.3.2 Comparison 22
Chapter 3 An Improved Reversible Data Hiding for Block Truncation Coding Compressed Images 23
3.1 Related Works 23
3.1.1 The AMBTC technique 23
3.1.2 Data hiding in AMBTC compressed images 25
3.1.3 Sun et al.’s scheme [47] 26
3.2 Proposed Scheme 29
3.2.1 Data hiding in AMBTC compressed images embedding algorithm 29
3.2.2 Data hiding in AMBTC compressed images decompression and extracting secret information algorithm 33
3.3 Experimental Results 35
3.3.1 Embedding performance 37
3.3.2 Comparisons 38
Chapter 4 Conclusions and Future Work 45
4.1 Conclusions 45
4.2 Future Work 45
Reference 47
[1]J. Tian, "Reversible data embedding using a difference expansion," IEEE transactions on circuits and systems for video technology, vol. 13, pp. 890-896, 2003.
[2]J. Mielikainen, "LSB matching revisited," IEEE signal processing letters, vol. 13, pp. 285-287, 2006.
[3]Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on circuits and systems for video technology, vol. 16, pp. 354-362, 2006.
[4]T.-C. Lu, C.-Y. Tseng, and J.-H. Wu, "Dual imaging-based reversible hiding technique using LSB matching," Signal Processing, vol. 108, pp. 77-89, 2015.
[5]T.-C. Lu, J.-H. Wu, and C.-C. Huang, "Dual-image-based reversible data hiding method using center folding strategy," Signal Processing, vol. 115, pp. 195-213, 2015.
[6]X. Zhang, "Reversible data hiding in encrypted image," IEEE signal processing letters, vol. 18, pp. 255-258, 2011.
[7]K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, "Reversible data hiding in encrypted images by reserving room before encryption," IEEE Transactions on Information Forensics and Security, vol. 8, pp. 553-562, 2013.
[8]Y.-C. Chen, C.-W. Shiu, and G. Horng, "Encrypted signal-based reversible data hiding with public key cryptosystem," Journal of Visual Communication and Image Representation, vol. 25, pp. 1164-1170, 2014.
[9]G. Xuan, Y. Shi, Z. Ni, P. Chai, X. Cui, and X. Tong, "Reversible data hiding for JPEG images based on histogram pairs," Image Analysis and Recognition, pp. 715-727, 2007.
[10]T. Efimushkina, K. Egiazarian, and M. Gabbouj, "Rate-distortion based reversible watermarking for JPEG images with quality factors selection," in Visual Information Processing (EUVIP), 2013 4th European Workshop on, 2013, pp. 94-99.
[11]Z. Qian and X. Zhang, "Lossless data hiding in JPEG bitstream," Journal of Systems and Software, vol. 85, pp. 309-313, 2012.
[12]R. Gray, "Vector quantization," IEEE Assp Magazine, vol. 1, pp. 4-29, 1984.
[13]E. Delp and O. Mitchell, "Image compression using block truncation coding," IEEE transactions on Communications, vol. 27, pp. 1335-1342, 1979.
[14]M. Lema and O. Mitchell, "Absolute moment block truncation coding and its application to color images," IEEE Transactions on communications, vol. 32, pp. 1148-1157, 1984.
[15]J. Ziv and A. Lempel, "A universal algorithm for sequential data compression," IEEE Transactions on information theory, vol. 23, pp. 337-343, 1977.
[16]A. Lempel, "Compression of individual sequences via variable-rate coding," IEEE Transactions on Information Theory, vol. 24, pp. 530-536, 1978.
[17]T. A. Welch, "A technique for high-performance data compression," Computer, vol. 6, pp. 8-19, 1984.
[18]Y. Linde, A. Buzo, and R. Gray, "An algorithm for vector quantizer design," IEEE Transactions on communications, vol. 28, pp. 84-95, 1980.
[19]C.-C. Chang, G.-M. Chen, and M.-H. Lin, "Information hiding based on search-order coding for VQ indices," Pattern Recognition Letters, vol. 25, pp. 1253-1261, 2004.
[20]C.-H. Hsieh and J.-C. Tsai, "Lossless compression of VQ index with search-order coding," IEEE Transactions on Image Processing, vol. 5, pp. 1579-1582, 1996.
[21]W.-J. Chen and W.-T. Huang, "VQ indexes compression and information hiding using hybrid lossless index coding," Digital Signal Processing, vol. 19, pp. 433-443, 2009.
[22]C.-C. Lee, W.-H. Ku, and S.-Y. Huang, "A new steganographic scheme based on vector quantisation and search-order coding," IET image processing, vol. 3, pp. 243-248, 2009.
[23]Z. Pan, X. Ma, X. Deng, and S. Hu, "Low bit-rate information hiding method based on search-order-coding technique," Journal of Systems and Software, vol. 86, pp. 2863-2869, 2013.
[24]C.-C. Chang, T. S. Nguyen, and C.-C. Lin, "A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies," Journal of Systems and Software, vol. 86, pp. 389-402, 2013.
[25]W.-J. Wang, C.-T. Huang, C.-M. Liu, P.-C. Su, and S.-J. Wang, "Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping," Information Sciences, vol. 246, pp. 69-82, 2013.
[26]C.-C. Lin, X.-L. Liu, and S.-M. Yuan, "Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping," Information Sciences, vol. 293, pp. 314-326, 2015.
[27]C. Qin and Y.-C. Hu, "Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism," Signal Processing, vol. 129, pp. 48-55, 2016.
[28]C.-C. Chang, W.-L. Tai, and C.-C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 1301-1308, 2006.
[29]T. Kim, "Side match and overlap match vector quantizers for images," IEEE Transactions on Image Processing, vol. 1, pp. 170-185, 1992.
[30]J.-D. Lee, Y.-H. Chiou, and J.-M. Guo, "Reversible data hiding based on histogram modification of SMVQ indices," IEEE Transactions on Information Forensics and Security, vol. 5, pp. 638-648, 2010.
[31]S.-C. Shie and J.-H. Jiang, "Reversible and high-payload image steganographic scheme based on side-match vector quantization," Signal Processing, vol. 92, pp. 2332-2338, 2012.
[32]C. Qin, C.-C. Chang, and Y.-C. Chen, "Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism," Signal Processing, vol. 93, pp. 2687-2695, 2013.
[33]C. Qin, C.-C. Chang, and Y.-P. Chiu, "A novel joint data-hiding and compression scheme based on SMVQ and image inpainting," IEEE transactions on image processing, vol. 23, pp. 969-978, 2014.
[34]C.-H. Yang and Y.-C. Lin, "Reversible data hiding of a VQ index table based on referred counts," Journal of Visual Communication and Image Representation, vol. 20, pp. 399-407, 2009.
[35]C.-C. Chang, T. D. Kieu, and W.-C. Wu, "A lossless data embedding technique by joint neighboring coding," Pattern Recognition, vol. 42, pp. 1597-1603, 2009.
[36]J.-X. Wang and Z.-M. Lu, "A path optional lossless data hiding scheme based on VQ joint neighboring coding," Information Sciences, vol. 179, pp. 3332-3348, 2009.
[37]T. D. Kieu and S. Ramroach, "A reversible steganographic scheme for VQ indices based on joint neighboring coding," Expert Systems with Applications, vol. 42, pp. 713-722, 2015.
[38]C.-C. Chang, T. D. Kieu, and Y.-C. Chou, "Reversible information hiding for VQ indices based on locally adaptive coding," Journal of Visual Communication and Image Representation, vol. 20, pp. 57-64, 2009.
[39]C.-H. Yang and Y.-C. Lin, "Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding," Journal of Visual Communication and Image Representation, vol. 21, pp. 334-342, 2010.
[40]C.-C. Chang, T. S. Nguyen, and C.-C. Lin, "A reversible data hiding scheme for VQ indices using locally adaptive coding," Journal of Visual Communication and Image Representation, vol. 22, pp. 664-672, 2011.
[41]X. Ma, Z. Pan, S. Hu, and L. Wang, "Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy," Journal of Visual Communication and Image Representation, vol. 28, pp. 60-70, 2015.
[42]X. Ma, Z. Pan, S. Hu, and L. Wang, "New high-performance reversible data hiding method for VQ indices based on improved locally adaptive coding scheme," Journal of Visual Communication and Image Representation, vol. 30, pp. 191-200, 2015.
[43]C.-C. Chang, W.-C. Wu, and Y.-C. Hu, "Lossless recovery of a VQ index table with embedded secret data," Journal of Visual Communication and Image Representation, vol. 18, pp. 207-216, 2007.
[44]T.-Y. Tu and C.-H. Wang, "Reversible data hiding with high payload based on referred frequency for VQ compressed codes index," Signal Processing, vol. 108, pp. 278-287, 2015.
[45]C.-C. Chang, C.-Y. Lin, and Y.-P. Hsieh, "Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity," Information Sciences, vol. 201, pp. 70-79, 2012.
[46]C.-C. Chang, C.-Y. Lin, and Y.-H. Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognition, vol. 41, pp. 2347-2357, 2008.
[47]W. Sun, Z.-M. Lu, Y.-C. Wen, F.-X. Yu, and R.-J. Shen, "High performance reversible data hiding for block truncation coding compressed images," Signal, Image and Video Processing, pp. 1-10, 2013.
[48]C.-C. Lo, Y.-C. Hu, W.-L. Chen, and C.-M. Wu, "Reversible data hiding scheme for BTC-compressed images based on histogram shifting," International Journal of Security and Its Applications, vol. 8, pp. 301-314, 2014.
[49]C.-C. Lin, X.-L. Liu, W.-L. Tai, and S.-M. Yuan, "A novel reversible data hiding scheme based on AMBTC compression technique," Multimedia Tools and Applications, vol. 74, p. 3823, 2015.
[50]M. Tang, S. Zeng, X. Chen, J. Hu, and Y. Du, "An adaptive image steganography using AMBTC compression and interpolation technique," Optik-International Journal for Light and Electron Optics, vol. 127, pp. 471-477, 2016.
[51]S. Zhang, T. Gao, and L. Yang, "A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images," IJ Network Security, vol. 18, pp. 718-727, 2016.
[52]F. Li, K. Bharanitharan, C.-C. Chang, and Q. Mao, "Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images," Multimedia Tools and Applications, vol. 75, pp. 16153-16171, 2016.
[53]C.-C. Lin, K. F. Hwang, S.-C. Chen, and C.-M. Yao, "A Reversible Data Hiding Scheme for BTC-Compressed Images," INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 7, pp. 386-390, 2016.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊