跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.171) 您好!臺灣時間:2024/12/13 21:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:許勝傑
研究生(外文):Shen-Chieh Hsu
論文名稱:植基於影像插值運算技術之資訊隱藏機制
論文名稱(外文):Data Hiding Schemes Using Image Interpolation Technique
指導教授:楊慶隆楊慶隆引用關係
指導教授(外文):Ching-Nung Yang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
論文頁數:35
中文關鍵詞:資訊隱藏可逆式資訊隱藏不可逆式資訊隱藏封面影像隱藏影像影像插值運算
外文關鍵詞:data hiding (DH)reversible DHirreversible DHcover imagestego imageimage interpolation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:224
  • 評分評分:
  • 下載下載:34
  • 收藏至我的研究室書目清單書目收藏:0
資訊隱藏 (Data Hiding; DH) 機制在密碼學與資訊安全中是一個重要的研究課題。資訊隱藏是將秘密資訊藏入封面影像 (Cover Image),而得到所謂的隱藏影像 (Stego Image)。好的資訊隱藏技術應該要能有好的隱藏影像品質,同時能抵抗隱藏分析攻擊(Steganalysis)。資訊隱藏可以分為兩大類:不可逆式資訊隱藏與可逆式資訊隱藏。一般的資訊隱藏技術大多是不可逆式的資訊隱藏,提取出秘密資訊後,封面影像會有損失。不同於不可逆式的資訊隱藏,可逆式的資訊隱藏從隱藏影像提取秘密後,可還原失真的封面影像。
近來,Jung和Yoo提出了一種影像插值運算的資訊隱藏技術 (Image Interpolation based Data Hiding; IIDH)。Jung和Yoo的IIDH機制是使用鄰近均值插值運算 (Neighbor Mean Interpolation; NMI),先得到一個擴張的封面影像。接下來,作者定計算像素值的差異,以隱藏秘密資訊。Jung和Yoo設計了可逆式與不可逆式的兩種IIDH機制。但是,Jung和Yoo的IIDH機制,作者只採用了簡單的方法,將秘密資訊的十進制的數值,直接加入封面影像的像素中。即使NMI運算是非常有效益的影像插值運算方法,但Jung和Yoo的IIDH機制並沒有得到非常高解析度的隱藏影像。在本篇論文中,我們一樣使用NMI技術,但是使用了最低有效位元隱藏技術 (Least Significant Bit; LSB),以及最佳像素調整處理 技術(Optimal Pixel Adjustment Process; OPAP),以改善隱藏影像的品質。
總結而言,本論文主要貢獻是:(1) 我們仍然使用NMI運算,但採用LSB 與OPAP來取代原本的簡單加法運算,以提高隱藏影像的視覺品質 (2) 理論證明我們的隱藏影像有更好的影像品質 (3) 我的IIDH的仍然適用於可逆式與不可逆式的資訊隱藏。
Data hiding (DH) scheme is an important research subject in cryptography and information security. Via embedding secret information into a cover image by DH technology, we may produce a stego image. A good DH technology should have high imperceptibility and may be against the steganalysis. In general, DH has two types: one is irreversible DH scheme (the original image cannot be obtained), and the other is reversible DH scheme (the original image can be obtained).
Recently, Jung and Yoo proposed a new image interpolation method, neighbor mean interpolation (NMI), on which they constructed image interpolation based data hiding (IIDH) schemes. There are two types of Jung and Yoo’s schemes: reversible IIDH scheme and irreversible IIDH scheme However, the authors only adopted a simple method by adding the decimal value of secret into pixels in cover image. Therefore, even though neighbor mean interpolation method is very cost effective, Jung and Yoo's IIDH scheme does not have very high-resolution stego image. In this thesis, we still use neighbor mean interpolation (NMI) to generate cover image, but adopt least significant (LSB) substitution and optimal pixel adjustment process (OPAP) instead of simple addition to improve visual quality of stego image.
The main contributions of this thesis are: (i) we still use NMI to generate cover image, but adopt LSB substitution and OPAP instead of simple addition to improve visual quality of stego image, (ii) we theoretically to prove that our IIDH schemes have the better stego image quality than Jung and Yoo’s IIDH scheme, and (iii) the new framework still can be used in both reversible and irreversible schemes.
Chapter 1 Introduction 1
1.1 Background 1
Chapter 2 Previous Work 5
2.1 Jung and Yoo’s IIDH Scheme 5
Chapter 3 The Proposed IIDH Scheme 9
3.1 The Proposed IIDH Scheme 9
3.1.1 The Proposed IIDH Scheme Using LSB 9
3.1.2 The Proposed IIDH Scheme Using OPAP 10
3.1.3 Theoretical Estimation of PSNR 11
Chapter 4 Experiment and Comparison 17
4.1 Experiment Result 17
4.2 Comparison 20
Chapter 5 Conclusion and Future Work 25
Appendix 27
References 33
[CHAN03] C.C. Chang, J.Y. Hsiao, and C.S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, vol. 36, 2003, pp. 1583–1595.
[CHAN04a] C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, 2004, pp. 469–474.
[CHAN04b] C.C. Chang and W.H. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, vol. 25, 2004, pp. 1434–1437.
[FAN13] L. Fan, T. Gao, Y. Cao, “Improving the embedding efficiency of weight matrix-based steganography for grayscale images”, Comput. Elect. Eng. 39 (2013) 873–881.
[FRID01] J. Fridrich, M. Goljan, R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, vol. 8, 2001, pp. 22–28.
[JANA16] B. Jana, “High payload reversible data hiding scheme using weighted matrix”, Optik 127 (2016) 3347–3358.
[JUNG09] K.H. Jung and K.Y. Yoo, “Data hiding method using image interpolation,” Computer Standards & Interfaces, vol. 31, 2009, pp. 465–470.
[KIM14a] C. Kim and C.N. Yang, “Steganography based on grayscale images using (5, 3) Hamming code,” 13-th International Workshop on Digital-forensics and Watermarking (IWDW 2014), vol. LNCS 9023, 2014, pp. 588–598.
[KIM14b] C. Kim and C.N. Yang, “Data hiding based on overlapped pixels using hamming code,” Multimedia Tools and Applications, 2014, doi: 10.1007 /s11042-014-2355-x.
[LIN11] H.F. Lin, J.H. Chang, C.Y. Gun, and C.Y. Chen, “A low distortion information hiding method based on (5, 3) Code,” Inter. journal of innovative computing, and information control, 2011, pp. 1–10.
[NGUY15] T.S. Nguyen, C.C. Chang, “A reversible data hiding scheme based on the Sudoku technique”, Displays 39 (2015) 109–116.
[RAD16] R.M. Rad, K. Wong, J.M. Guo, “Reversible data hiding by adaptive group modification on histogram of prediction errors”, Signal Process. 125 (2016) 315–328.
[WANG00] R.Z. Wang, C.F. Lin, and J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 11, 2000, pp. 671–683.
[WU03] D.C. Wu and W.H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, 2003, pp. 1613–1626.
[XIA14a] Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools and Applications, 2014, doi: 10.1007/s11042-014-2381-8.
[XIA14b] Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of least significant bit matching using multi-order differences,” Security and Communication Networks, vol. 7, 2014, pp. 1283–1291.
[YANG06a] C.H. Yang and S.J. Wang, “Weighted bipartite graph for locating optimal LSB substitution for secret embedding,” Journal of Discrete Mathematical Sciences & Cryptography, vol. 9, 2006, pp. 153–164.
[YANG06b] C.H. Yang and C.Y. Weng, “A steganographic method for digital images by multi-pixel differencing. International Computer Symposium 2006 (ICS2006), 2006, pp. 831–836.
[YANG13] C.N. Yang, C.C. Lin, and C.C. Chang, “Steganography and watermarking,” Nova Science Publishers Inc., ISBN: 978-1-62618-317-9, 2013.
[ZHAN07] W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Commun. Lett., vol. 11, 2007, pp. 680–682.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊