簡易檢索 / 詳目顯示

研究生: 黃景煥
Ching-Huan Huang
論文名稱: 在灰階影像中利用區塊分析的資訊隱藏法
A Steganography Method by Block Analysis in Gray Level Images
指導教授: 張隆紋
Long-Wen Chang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2005
畢業學年度: 93
語文別: 中文
論文頁數: 36
中文關鍵詞: 隱像學資料隱藏
外文關鍵詞: Steganography, Data Hiding
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在這篇論文中,我們提出了一個新穎且安全,用於灰階影像中嵌入秘密資料的隱像學方法。嵌入的過程裡,影像首先被切割成多個不重疊的區塊。每個區塊中的像素,則被區分為不可改變像素和可改變像素。接著,計算每個區塊中的不可改變像素的平均灰階值: 。藉由計算可改變像素的灰階值與 之間的差值,來判斷此一可改變像素的變動量。較大的差值會嵌入較多的秘密資料。我們修改可改變像素的灰階值,並將其重新設定為含有秘密資料的灰階值。但是,並非所有的可改變像素皆可適用於我們的方式。有些可改變像素在經過修改之後,有可能會在解析時產生錯誤的結果。我們方法中的嵌入以及解析程序,可以自動的偵測並排除有可能發生錯誤的可改變像素。因此,並不需要多餘的空間來記錄會發生錯誤的可改變像素的位置。由實驗結果得知,我們的方式可以在影像中嵌入資料,但是並不會造成可被察覺的破壞。


    We have proposed a novel and secure steganographic method for embedding secret data into a gray scale image in this thesis. In the embedding process, the image is partitioned into non-overlapping blocks. The pixels in a block are classified into unchangeable pixels and changeable pixels. The average of the gray values of unchangeable pixels in each block is calculated as . The embedded amount of data for each changeable pixel is determined by the difference between and the gray value of the changeable pixel. A larger difference embeds a higher amount of secret data. We modify the gray value of a changeable pixel and reset a new gray value with secret data embedded. But, not all the changeable pixels are appropriated for embedding secret data. The gray values of some changeable pixels may cause wrong extraction if they were used in embedding. We have two fault potential checking processes which execute both embedding procedure and extracting procedure to automatically detect and discard fault potential changeable pixels. Therefore, no extra space is needed for recording the positions of the fault potential changeable pixels. The experimental results show that we can embed secret data into an image without noticeable distortion.

    Abstract (in Chinese).....................i Abstract (in English)....................ii Acknowledgements........................iii Contents.................................iv List of Figures...........................v List of Tables...........................vi 1.Introduction............................1 2.Related Works...........................3 3.Proposed Method.........................5 3.1 Proposed Method....................5 3.2 Examples..........................11 4.Discussions and Experimental Results...15 4.1 Discussions.......................15 4.2 Security Analysis.................32 4.3 Comparison........................34 5.Conclusions and Future Studies.........35 Bibliography.............................36

    [1] Bender, W., Gruhl, D., Morimoto, N., Lu, A., 1996. Techniques for data hiding. IBM Syst. J. 35(3-4), 313-316.
    [2] Ran-Zan Wang, Chi-Fang Lin and Ja-Chen Lin:” Hiding data in images by optimal moderately-significant-bit replacement”, Electron, Lett., 2000, 36(25),2069-2070
    [3] Chi-Kwong Chan and L.M. Cheng:” Improved hiding data in images by optimal moderately-significant-bit replacement”, Electron, Lett., 2001, 37(16),1017-1018
    [4] Wen-Nung Lie and Li-Chun Chang:” Data Hiding In Images With Adaptive Numbers Of Least Significant Bits Based On The Human Visual System”, ICIP99, (I:286-290)
    [5] Ran-Zan Wang, Chi-Fang Lin and Ja-Chen Lin:” Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition., 34(2001),671-683
    [6] Chi-Kwong Chan and L.M. Cheng:” Hiding data in images by simple LSB substitution”, Pattern Recognition., 37(2004),469-474
    [7] Da-Chun Wu and Wen-Hsiang Tsai:” A steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, 24(2003),1613-1626
    [8] Chin-Chen Chang and Hsien-Wen Tseng:” A steganographic method for digital images using side match”, Pattern Recognition Letters, 25(2004),1431-1437
    [9] T. Kim:” Side match and overlap match vector quantizers for images”, IEEE Transactions on Image Processing, Vol 1, Number 2, 1992,170-185
    [10] Hsien-Chung Wei, Pao-Chin Tasi, and Jia-Shung Wang:” Three sided side match and finite state vector quantizations”, IEEE Transactions On Circuit And System For Video Technology, Vol 10, Number 1 25, 2000,51-58
    [11] William Stallings:” Cryptography and Network Security”, Prentice Hall, 3rd (2003), P. 29

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE