帳號:guest(18.188.58.141)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:吳嵩裕
作者(英文):Song-Yu Wu
論文名稱:高偽裝影像品質與高容量的部分可逆式資料隱藏
論文名稱(英文):Partial Reversible Data Hiding with High Stego-image Quality and Embedding Capacity
指導教授:楊慶隆
指導教授(英文):Ching-Nung Yang
口試委員:郭文中
張道顧
口試委員(英文):Wen-Chung Kuo
Tao-Ku Chang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:610621220
出版年(民國):108
畢業學年度:107
語文別:中文
論文頁數:38
關鍵詞:資料隱藏可逆式資料隱藏部分可逆式資料隱藏錯誤糾正碼漢明碼徵狀最低有效位元更動
關鍵詞(英文):Data hidingReversible data hidingPartial reversible data hidingError correcting codeHamming codeSyndromeLeast significant bit
相關次數:
  • 推薦推薦:0
  • 點閱點閱:25
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:19
  • 收藏收藏:0
資訊隱藏技術是結合了密碼學技術與數位多媒體處理的重要研究領域。這些技術可廣泛應用於數位多媒體,特別是數位影像。其中基於錯誤改正碼的資訊隱藏技術,可以提高信息嵌入率並同時減少修改的位元數目。目前為止,基於錯誤改正碼的資訊隱藏技術的文獻已有很多,研究者們提出了大量有特定功能的各種方案。例如,使用漢明碼、BCH碼、Golay碼等錯誤改正碼的信息隱藏技術,其中部份是探討可逆式的資料隱藏。所謂可逆式資料隱藏,是取回隱藏資料後可同時將原載體恢復到原來的狀態。
最近,Jana等人提出了基於(7, 4)漢明碼的部分可逆數據隱藏(Partial Reversible Data Hiding)。Jana等人的機制有三個影像:原始影像(Original Image; OI),封面圖像(Cover Image; CI)和偽裝圖像(Stego Image; SI)。稍微修改OI獲得CI (註:CI與OI幾乎相同),之後將秘密藏入CI生成SI。所謂的部分可逆式資料隱藏是我們可以無損失地重建CI。然而,在Jana等人的PRDH中,作者僅通過使用具有偶數(或奇數)校驗的(7, 4)漢明碼來調整冗餘位元。這種簡單的方法在7個最低有效位元 (Least Significant Bit; LSB)中會最多會修改3個冗餘位元來從OI獲得CI,這嚴重降低了CI影像品質。
在本文,我們提出了兩個方案:第一個機制可增強CI的影像品質,從而提高了部分可逆性的效果。第二個機制則提高了嵌入高容量。另外,文中我們也對這些方案的均方差(Mean Square Error; MSE ) 做了理論估算,證明我們的機制比。Jana等人的機制有較佳的優勢。
Data hiding (DH) technology is an important research field that combines cryptography and digital multimedia processing. DH can be widely used in multimedia, especially digital images. Error correcting code (ECC) based DH can is increase embedding capacity, and meanwhile reduce the number of modified bits. Up to present, there were many researches on ECC based DHs, e.g., using Hamming code, BCH code, and Golay code. Some of these DHs are the reversible data hiding (RDH). RDH allows the recipient for extracting secret data and meantime restore the original cover media.
Recently, Jana et al. proposed a partial RDH (PRDH) based on (7, 4) Hamming code. Their scheme deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). The CI is generated by slightly modifying OI (both OI and CI have almost the same image quality). After that, one can embed secret into CI to generate SI. The so-called partial reversible capability is that we can reconstruct the CI without distortion. However, in Jana et al.’s PRDH, the authors only adjust redundant bits by using (7, 4) Hamming code with even (or odd) parity. This simple approach may modify 3 redundant bits at most in 7 least significant bit (LSBs) for generating CI from OI, and this degrades the CI quality seriously.
In this thesis, we construct two schemes: the proposed PRDH (PPRDH) and the modified PRDH (MPRDH). PPRDH enhances the partial reversible property that improves the visual quality of CI. On the other hand, MPRDH enhances PPRDH to achieve the high embedding capacity. Theoretical estimations of average mean square errors for these PRDH schemes are given to demonstrate the advantage of our PRDH schemes.
Chapter 1 Introduction 1
1.1 Background 1
1.2 Contribution of the Thesis 3
1.3 Organization of the Thesis 3
Chapter 2 Previous Works 5
2.1 Hamming Code 5
2.2 Jana et al.'s PRDH 6
Chapter 3 Design Concept and Observation 11
3.1 Design Concept 11
3.2 Observation 12
Chapter 4 The Proposed Schemes 15
4.1 The Proposed PRDH(PPRDH) 15
4.2 The Modified PRDH(MPRDH) 15
4.3 Theoretical Estimation of PSNR 18
Chapter 5 Experiment and Comparison 25
5.1 Experimental Results 25
5.2 Comparison 26
Chapter 6 Conclusion and Future Work 33
[FRID01]J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganog-raphy in grayscale and color images,” Proceedings of the ACM Workshop on Multimedia and Security, pp. 27-30, 2001.
[HWAN06]J. Hwang, J.W. Kim, and J.U. Choi, “A reversible watermarking based on histogram shifting,” International Workshop on Digital Watermarking, Vol. 4283, pp. 348-361, 2006.
[JANA17]B. Jana, D. Giri, and J.U. Choi, “Partial reversible data hiding scheme using (7, 4) hamming code,” Multimedia Tools and Applications, Vol. 6, pp. 21691-21706, 2017.
[KIM09] K.S. Kim, M.J. Lee, H.Y. Lee, and H.K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, Vol. 42, pp. 3083-3096, 2009.
[KIM16]C. Kim, and C.N. Yang, “Data hiding based on overlapped pixels using Hamming code,” Multimedia Tools and Applications, Vol. 75, pp. 15651-15663, 2016.
[KUO07]W.C. Kuo, D.J. Jiang, and Y.C. Huang, “Reversible data hiding based on histogram,” International Conference on Intelligent Computing, Vol. 4682, pp. 1152-1161, 2007.
[LIAO15]X. Liao, and C. Shu, “Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels,” Visual Communication and Image Representation, Vol. 28, pp. 21-27, 2015.
[MA13]K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transac-tions on Information Forensics and Security, Vol. 8, pp. 553-562, 2013.
[MIEL06]J. Mielikainen, “LSB Matching revisited,” IEEE Signal Processing Let-ters, Vol. 13, pp. 285-287, 2006.
[NI06]Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, pp. 354-362, 2006.
[RASH18]A. Rashid, N. Salamat, and V.B.S. Prasath, “An algorithm for data hiding in radiographic images and ePHI/R application,” Technologies, Vol. 6(1), pp. 1-12, 2018.
[TAI09]W.L. Tai, C.M. The, and C.C. Chang “Reversible data hiding based on histogram modification of pixel differences,” IEEE Transactions on Cir-cuits and Systems for Video Technology, Vol. 19, pp. 906-910, 2009.
[TIAN03]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 890-896, 2003.
[TSAI09]P. Tsai, Y.C. Hu, and H.L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol. 50, pp. 1227-1231, 2009
[VARS06]E. Varsaki, V. Fotopoulos, and A.N. Skodras, “A reversible data hiding technique embedding in the image histogram,” Technical Report HOU-CS-TR-2006-08-GR, 2006.
[WEB01]R. Crandall, Some notes on steganography, http://dde.binghamton.edu/ download/Crandall/matrix.pdf. (Accessed31 May 2017).
[WEB02]C.A. Rashid, Pairs of values and the chi-squared attack, https://orion. math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. (Ac-cessed 28 Jan 2019).
[WANG17]W. Wang, J. Ye, T. Wang, and W. Wang, “Reversible data hiding scheme based on significant-bit difference expansion,” IET Image Processing, Vol. 11, pp. 1002-1014, 2017.
[WEST01]A. Westfeld, “F5: a steganographic algorithm,” International Workshop on Information Hiding, Vol. 2137, pp. 289-302, 2001.
[WU14]X. Wu, and W. Sun, “High-capacity reversible data hiding in encrypted images by prediction error,” Signal Processing, Vol. 104, pp. 387-400, 2014.
[XIA16]Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools and Applications, Vol. 75, pp. 1947-1962, 2016.
[YANG17]C.N. Yang, S.C. Hsu, and C. Kim, “Improving stego image quality in im-age interpolation based data hiding,” Computer Standards & Interfaces, Vol. 50, pp. 209-215, 2017.
[ZHAN07A]X. Zhang, W. Zhang, and S. Wang, “Efficient double layered ste-gano-graphic embedding,” Electronics Letters, Vol. 43, pp. 482-483, 2007.
[ZHAN07B]W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Communications Letters, Vol. 11, pp.680-682, 2007.
[ZHAN12A]R. Zhang, V. Sachnev, M. Bakke Botnan, H.J. Kim, and J. Heo, “An effi-cient embedder for BCH coding for steganography,” IEEE Transactions on Information Theory, Vol. 58, pp. 7272-7279, 2012.
[ZHAN12B]X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, Vol. 7, pp. 826-832, 2012.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *