研究生: |
王歆綺 Wang, Hsin-Chi |
---|---|
論文名稱: |
嵌入機密訊息於影像壓縮檔案和多元影像檔案之研究 Embedding Secret Information in a Condensed Image and Multiple Image Files |
指導教授: |
張真誠
Chang, Chin-Chen |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2009 |
畢業學年度: | 97 |
語文別: | 英文 |
論文頁數: | 44 |
中文關鍵詞: | 機密分享 、認證 、視覺特性 、補救能力 、向量編碼壓縮 、循序搜尋分辨法 、資料隱藏 |
外文關鍵詞: | Secret-sharing, authentication, visual quality, remedy ability, VQ compress domain, searching order coding, steganography |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在這篇論文,提出了二種嵌入機密資料的方法,其中一種是在壓縮影像中嵌入資料,另一種是在多元影像中嵌入資料。許多資訊隱藏的技術被應用在向量量化編碼所需的索引表中。然而將機密資料嵌入到索引表中會嚴重影響到原始影像在向量編碼時所造成嚴重的失真。在現今機密分享的技術中,都只擁有認證的能力,卻沒有容錯的能力,這種情況會導致如果在分享的影像中有資料被破壞及損毀,將會造成回復時機密影像的呈現不可辨識或是過度失真。
在第一個方法,我們試著在嵌入機密訊息於索引表時,增加可以藏入的資料量,維持索引表是零失真的狀態和減少壓縮率。在這個方法有效運用了循序搜尋分辨法(SOC)去找到向量索引表與其鄰居之間的關聯性。因為適當的索引值之間擁有很高的相似性,所以在索引表中隱藏資訊以及在對已經嵌入資料的索引表做編碼可以運用較少的位元數。
在第二個方法,我們提出了一個有效的機密分享技術而且它不只包含了認證的能力而且還有補救及容錯的能力。當分享出去的其中一張機密影像在收到時,已經有部份資料遺失或損毀,可以運用這個方法提出來的機制去補救它,而使它在合成原來機密資料的結果更加精準,擁有較高的視覺效果。
In this thesis, two types of embedding techniques are proposed. One is that of embedding secret data into condensed images while and the other applies to multiple images. Many steganographic techniques are currently exploited for the VQ index table. However, the embedding strategies require longer compression codes and decrease visual quality. Secret-sharing is a technique first invented by Shamir. It is used to split a secret into n shares and then distribute them to n users. Later, t shares can cooperate to reconstruct the secret, called the (t,n)-threshold. Recently, many meaningful secret sharing schemes have yielded authentication mechanisms, yet none included a remedy ability, which may mean that the secret image will not be obtained completely, while some information about stego images is lost.
In the first method, we tried to satisfy the essentials of increasing the secret payload, preserve the VQ index table without loss, and reduce the compression rate. The proposed scheme utilizes search order coding to determine the correlation between the VQ indices and neighboring indices. Because of the similarity among adjacent indices, the new method can embed the secret bits into the index table and encode the embedded index table using fewer bits.
In the second method, we proposed a meaningful secret sharing scheme to include the authentication and remedy abilities that allow for some data loss in the secret image. This approach has the ability to repair the secret image with reasonable visual quality.
[1] Y. Linde, A. Buzo and R. M. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, vol. 28, no. 1, 1980, pp. 84-95.
[2] R. M. Gray, “Vector quantization,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 1, no. 1, 1984, pp. 4-29.
[3] Z. M. Lu; D. G. Xu and S. H. Sun, “Multipurpose image watermarking algorithm based on multistage vector quantization,” IEEE Transactions on Image Processing, vol. 14, no. 6, 2005, pp. 822-831.
[4] C. C. Chang and W. C. Wu, “Hiding secret data adaptively in vector quantization index tables,” IEE Proceedings Vision, Image, and Signal Processing, vol. 153, no. 5, 2006, pp. 589-597.
[5] Y. P. Hsieh, C. C. Chang and L. J. Liu, “A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity,” Pattern Recognition, vol. 41, no. 10, 2008, pp. 3104-3113.
[6] C. C. Lin, S. C. Chen and N. L. Hsueh, “Adaptive embedding techniques for VQ-compressed images,” Information Sciences, vol. 179, no. 1-2, 2009, pp. 140-149.
[7] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath and S. Chandrasekaran, “Robust image-adaptive data hiding using erasure and error correction,” IEEE Transactions on Image Processing, vol. 13, no. 12, 2004, pp. 1627-1639.
[8] C. C. Lee, H. C. Wu, C. S. Tsai and Y. P. Chu, “Adaptive lossless steganographic scheme with centralized difference expansion,” Pattern Recognition, vol. 41, no. 6, 2008, pp. 2097-2106.
[9] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, 1997, pp. 1673-1687.
[10] G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni and W. Su, “Distortionless data hiding based on integer wavelet transform,” Electronics Letters, vol. 38, no. 25, 2002, pp. 1646-1648.
[11] A. A. Reddy and B. N. Chatterji, “A new wavelet based logo-watermarking scheme,” Pattern Recognition Letters, vol. 26, no. 7, 2005, pp. 1019-1027.
[12] Z. M. Lu and S. H. Sun, “Digital image watermarking technique based on vector quantization,” Electronics Letters, vol. 36, no. 4, 2000, pp. 303-305.
[13] M. Jo and K. D. Kim, “A digital image watermarking scheme based on vector quantization,” IEICE Transactions on Information and Systems, vol. E85-D, no. 6, 2002, pp. 1054-1056.
[14] H. C. Huang, F. H. Wang and J. S. Pan, “A VQ-based robust multi-watermarking algorithm,” IEICE Transactions on Fundamentals, vol. E85-A, no. 7, 2002, pp. 1719-1726.
[15] W. C. Du and W. J. Hsu, “Adaptive data hiding based on VQ compressed image,” IEE Proceedings on Vision, Image, and Signal Processing, vol. 150, no. 4, 2003, pp. 233-238.
[16] H. C. Wu and C. C. Chang, “Embedding invisible watermarks into digital image based on side-match vector quantization,” Fundamenta Informaticae, vol. 63, no. 1, 2004, pp. 89-106.
[17] C. C. Chang, G. M. Chen and M. H. Lin, “Information hiding based on search-order coding for VQ indices,” Pattern Recognition Letters, vol. 25, no. 11, 2004, pp. 1253-1261.
[18] B. Yang, Z. M. Lu and S. H. Sun, “Reversible watermarking in the VQ-compressed domain,” Proceedings of the Fifth IASTED International Conference on Visualization, Imaging, and Image Processing, Benidorm, Spain, 2005, pp. 298-303.
[19] C. Y. Lin and C. C. Chang, “Hiding data in VQ-compressed images using dissimilar pairs,” Journal of Computers, vol. 17, no. 2, 2006, pp. 3-10.
[20] C. C. Chang, T. D. Dieu and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, 2008, doi: 10.1016/j.patcog.2008.11.040.
[21] C. H. Hsieh and J. C. Tsai, “Lossless compression of VQ index with search-order coding,” IEEE Transactions on Image Processing, vol. 5, no. 11, 1996, pp. 1579-1582.
[22] Y. F. Chen, Y. K. Chan, C. C. Huang, M. H. Tsai and Y. P. Chu, A multiple-level visual secret-sharing scheme without image size expansion, Information Sciences, vol. 177, no. 21, 2007, pp. 4696-4710.
[23] C. C. Chang, C. C. Lin, C. H. Lin and Y. H. Chen, A novel secret image sharing scheme in color images using small shadow images, Information Sciences, vol. 178, no. 11, 2008, pp. 2433-2447.
[24] C. C. Chang, C. Y. Lin and C. S. Tseng, Secret image hiding and sharing based on the (t, n)-threshold, Fundamenta Informaticae, vol. 76, no. 4, 2007, pp. 399-411.
[25] C. C. Chang, Y. P. Hsieh and C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognition, vol. 141, no. 10, 2008, pp. 3130-3137.
[26] J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu, A new multi-secret images sharing scheme using Lagrange’s interpolation, Journal of Systems and Software, vol. 76, no. 3, 2005, pp. 327-339.
[27] W. P. Fang, Friendly progressive visual secret sharing, Pattern Recognition, vol. 41, no. 4, 2008, pp. 1410-1414.
[28] C. C. Lin and W. H. Tsai, Secret image sharing with steganography and authentication, Journal of Systems and Software, vol. 73, no. 3, 2004, pp. 405-414.
[29] D. C. Lou, H. K. Tso and J. L. Liu, A copyright protection scheme for digital images using visual cryptography technique, Computer Standards and Interfaces, vol. 29, no. 1, 2007, pp. 125-131.
[30] R. Lukac and K. N. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognition, vol. 38, no. 5, 2005, pp. 767-772.
[31] M. Naor and A. Shamir, Visual cryptography, Advances in Cryptology -EuroCrypt’94, In: LNCS, vol. 950, Springer, Berlin, 1995, pp. 1-2.
[32] A. Shamir, How to share a secret, Communications of the Association for Computing Machinery, 1979, pp. 612-613.
[33] S. J. Shyu, S. Y. Huang, Y. K. Lee, R. Z. Wang and K. Chen, Sharing multiple secrets in visual cryptography, Pattern Recognition, vol. 40, no. 12, 2007, pp. 3633-3651.
[34] C. C. Thien and J. C. Lin, Secret image sharing, Computers and Graphics, vol. 26, no. 1, 2002, pp. 765-770.
[35] C. S. Tsai, C. C. Chang and T. S. Chen, Sharing multiple secrets in digital images, Journal of Systems and Software, vol. 64, no. 2, 2002, pp. 163-170.
[36] C. N. Yang, T. S. Chen, K. H. Yu and C. C. Wang, Improvements of image sharing with steganography and authentication, Journal of Systems and Software, vol. 80, no. 7, 2007, pp. 1070-1076.