簡易檢索 / 詳目顯示

研究生: 王厚文
Hou-Wen Wang
論文名稱: 基於最小擴張樹著色之影像資訊隱藏之研究
The Research of Image Data Hiding Based on Coloring in Minimum Spanning Tree
指導教授: 孫宏民
Hung-Min Sun
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2006
畢業學年度: 94
語文別: 英文
論文頁數: 49
中文關鍵詞: 向量量化資訊隱藏
外文關鍵詞: vector quantization, data hiding
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 影像資訊隱藏主要透過附屬秘密通道來傳輸隱藏資訊。兩個互相衝突的特性:影像品質和資訊隱藏量是在影像資訊隱藏領域中主要的考量因素。在本篇研究論文中,我們利用vector quantization(VQ)來實作影像資訊隱藏。在過去的文獻資料中,用來資訊隱藏的編碼書(codebook)在分割的時候並未將分割的編碼書差異最小化。所以,當編碼書之間的差異越大,為了藏入資訊的代價越高。
    藉由最小著色擴張樹,我們提出兩個方法以達到較高的影像品質和較多的資訊隱藏量。藉此,我們可以讓分割的編碼書之間的差異最小化。另外,我們也結合discrete cosine transform(DCT)來實作資訊隱藏。為了要降低因為資訊隱藏造成的失真,我們只在頻率較高的DCT係數區域藏入資訊。藉由結合JPEG和VQ兩方法的優點,相對於傳統的VQ方法,我們可以得到較好的影像品質和較大的資訊隱藏量。透過實驗結果得知,我們提出的方法明顯優於之前所提出的資訊隱藏方法。在研究討論中,也藉由數學證明來印證我們提出的方法具有較佳的影像品質。


    Image data hiding is mainly served as transmitting secret information via side channel. The two conflicting properties: image quality and data capacity are the two major concerns to image data hiding. We study image data hiding using vector quantization (VQ) in this thesis. In previous literatures, the difference of separated codebooks are not minimized in which will degrade the image quality.
    Two approaches have been proposed to achieve a high image quality and data capacity by coloring in a minimum spanning tree. This will minimize the difference between separated codebooks.
    These approaches are also implemented on frequency domain. In order to decrease distortion when embed secret data in images, only the high-band coefficients will be modified. The combined DCT-VQ gets much better image quality and more data capacity than traditional VQ.
    One of our VQ schemes is shown to be the best theoretic heuristic solution. Our results have significant advantages over the others with experiments support.

    Content list IV Figure List VI Table List VII Chapter 1 1 Introduction 1 1.1 Motivations of the Research 1 1.2 Background 1 1.3 Overview of the Thesis 3 Chapter 2 4 Review of Data Hiding 4 2.1 Vector Quantization 4 2.1.1 Codebook Generation by LBG Algorithm 4 2.1.2 Image Compress by Vector Quantization 5 2.2 Codebook Labeling Data Hiding 5 2.2.1 Mean-Gray-Level Embedding Method (MGLE) 6 2.2.2 Pair-wise Nearest-Neighbor Embedding Method (PNNE) 7 2.2.3 Principle Component Analysis (PCA) 7 2.3 Least Significant Bits substitution 8 2.4 Data Hiding in Frequency Domain 8 2.4.1 Kobayashi et al.’s Method 9 2.4.2 Jpeg-Jsteg 10 2.4.3 Chang et al.’s Method 10 Chapter 3 12 The Proposed Approach 12 3.1 Motivation 12 3.2 Proposed Scheme 14 3.3 Extension Scheme 16 Chapter 4 18 VQ on JPEG 18 4.1 JPEG 18 4.1.1 Discrete Cosine Transform (DCT) 18 4.1.2 Quantization 21 4.1.3 DPCM and RLC Codind 22 4.1.4 Huffman Encoding 24 4.2 Extension of VQ on JPEG 26 4.3 JPEG-VQ Data Hiding 26 Chapter 5 29 Performance Analysis 29 5.1 VQ Data Hiding Performance Analyses 29 5.2 Codebook Analysis 32 5.3 The Factor of Tree Coloring 34 5.4 Time Consumption 35 5.5 JPEG-VQ Data Hiding Evaluation 36 Chapter 6 40 Conclusions 40 6.1 Brief Review of Main Contributions 40 6.2 Further Research Topics and Directions 40 Bibliography 42 Appendix 45 Figure List Figure 1 The MGLE encoding procedure 7 Figure 2 Traditional DCT data hiding procedure 9 Figure 3 Kobayashi et al.’s encoding method 9 Figure 4 Illustrate the importance of codeword classification in data hiding 13 Figure 5 Basis matrices for the DCT 21 Figure 6 Zig-zag traversal order 24 Figure 7 JPEG-VQ encoding procedure 28 Figure 8 Two 512 □ 512 gray-level images for testing 30 Figure 9 Experimental results for embedding single bit per block 30 Figure 10 Experimental results for embedding more than one bit per block 31 Figure 11 The codebook analysis of PNNE 33 Figure 12 The codebook analysis of our method 33 Figure 13 An example of the factor by coloring 34 Figure 14 Two 512 □ 512 gray-level images for testing 38 Figure 15 JPEG-VQ Results of Lenna image where r means the hided bits/block. 39 Figure 16 JPEG-VQ Results of Baboon image where r means the hided bits/block. 39 Table List Table 1 Chang et al.’s modified quantization table 11 Table 2 Default DCT quantization table 22 Table 3 JPEG coefficient coding categories 23 Table 4 DC Huffman table 25 Table 5 AC Huffman table 25 Table 6 Hide 16384 bits (r =1) in two testing images 30 Table 7 Hide bits = r □ 16384 (bits) in two testing images 30 Table 8 Compare to PNNE and MGLE in 1287 result with different codebook 32 Table 9 Time consumption evaluation (unit = second) 35 Table 10 r = 0, codebook size=256 37 Table 11 Codebook size = 256 38

    1. JPEG-JSteg-V4,http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz
    2. Y. Lined, A. Bozo, and R. M. Gray, “An algorithm for vector quantizer design,” IEEE Trans. on Communications, vol. 28, pp. 84-95, Jan. 1980.
    3. R. M. Grey, “Vector quantization”, IEEE ASSP Magazine, pp. 4-29, Apr. 1984.
    4. I. T. Jolliffe, “Principle Component Analysis,” New York: Springer-Verlag, 1986.
    5. G. K. Wallace, “The JPEG Still Picture Compression Standard,” CACM, 34(4):31-44, Apr. 1991.
    6. R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” in Proc. IEEE Int. Conf. Images Processing, Lausanne, Switzerland, pp. 219-222, Sept. 1996.
    7. T. O., D. N., and N. Y., “Data Embedding into Pictorial Images with Less Distortion Using Discrete Cosine Transform,” Proc. Of Int. Conf. On Pattern Recognition, pp. 675-679, 1996.
    8. C. C. Chang, D. C. Lin, and T. S. Chen, “An improved VQ codebook search algorithm using principal component analysis,” Journal of Visual Communication and Image Represent, vol. 8, pp. 27-37, Mar. 1997.
    9. N. F. Johnson and S. Jajodia, “Steganalysis: The investigation of hidden information,” IEEE Proc., Inf. Tech. Conf., Syracuse, 1998.
    10. F. A. P. Petitcolas, R. J. Arderson, and M. G. Kuhn, “Information hiding – A survey,” IEEE Proc., special issue on protection of multimedia content, vol. 87, pp. 1062-1078, July 1999.
    11. W. N. Lie, L. C. Chang, “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” IEEE Proc. Int. Conf. on Image Processing, vol. 1, pp. 286–290, 1999.
    12. C.-T. Hsu. And J.-L. Wu, “Hidden digital watermarks in images,” IEEE Trans. Image Processing, vol. 8, pp. 58-68, Jan. 1999.
    13. G. Strang, “The discrete cosine transform,” SIAM Rev., 41, pp. 135-147, 1999.
    14. O. H. Kwan, Y. S. Kim, R. H. Park, “Watermarking for Still Image Using the Human Visual System in the DCT Domain,” IEEE Proc., Int. Symposium on Circuits and Systems, 4:76~79, 1999.
    15. J. S. Pan, “A training approach for efficient VQ codeword search,” Journal of Information Science and Engineering, vol. 15, no. 3, pp. 375-382, 1999.
    16. Kim, W. G., Lee, J. C., Lee, W. D., “An Image Watermarking Scheme with Hidden Signatures,” Int. Conf. on Image Process., pp. 206-210, Oct. 1999.
    17. E. T. Lin and E. J. Delp, “A review of data hiding in digital images,” Proc. Image Processing, Image Quality, Image Capture and Systems Conf. (PICS), Savannah, GA, pp. 274-278, Apr. 25-28, 1999.
    18. Noguchi, Y. H. Kobayashi and H. Kiya, “A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder,” IEEE Proc., Int. Conf. on Image Processing, vol. 1, pp. 577–580, 2000.
    19. Niu, X. M., Lu, Z. M., and Sun, S. H. (2000), “Digital Watermarking of Still Image with Gray-level Digital Watermarks,” IEEE Trans. on Consumer Electronics, 46(1): 137- 45, 2000.
    20. Z. M. Lu, C. H. Liu, and S. H. Sun, “VQ-based digital image watermarking method,” Electron. Lett., vol. 36, no. 14, pp. 1201-1202, Jul. 2000.
    21. P. H. W. Wong and O. C. Au, “Data hiding and watermarking in JPEG compressed domain by DC coefficient modification,” Proc. SPIE security and Watermarking of Multimedia Contents, vol. 3971, pp. 237-244, Jan. 2000.
    22. P. H. W. Wong, O. C. Au, J. W. C. Wong, “A Data Hiding Technique in JPEG Compressed Domain,” Proc. Of SPIE Conference on Security and Watermarking of Multimedia Contents III, Vol. 4314, pp. 309-320, Jan. 2001.
    23. Chang, C.C., T.S. Chen and L.Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol. 141, pp.123-138, 2002.
    24. P. Moulin and M. Mihcak, “A framework of evaluating the data-hiding capacity of images sources,” IEEE Trans. Image Processing, vol. 11, pp. 1092-1024, Sept. 2002.
    25. W. C. Du, and W. J. Hsu, “Adaptive data hiding based on VQ compressed images,” IEEE Proc., Vis. Image Signal process, vol. 150, No. 4, pp. 233-238, Aug. 2003.
    26. Y. C. Hu, “Grey-level image hiding scheme based on vector quantization,” IEE Electronic Letter, vol. 39, No. 2, pp. 203-203, Jan. 2003.
    27. Z. M. Lu, W. Xing, D. G. Xu, and S. H. Sun, “Digital image watermarking method based on vector quantization with labeled codeword,” IEICE trans. on information and systems, vol. E86-D, pp. 2786-2789 , Dec. 2003.
    28. J. S. Pan, Z. M. Lu, and S. H. Sun, “An efficient encoding algorithm for vector quantization based on sub-vector technique,” IEEE Trans. Image Processing, vol. 12, pp. 265-270, Mar. 2003.
    29. Shieh, C.-S., Huang, H.-C., and Wang, F.-H, “An embedding algorithm for multiple watermarks,” Journal of Information Science and Engineering, 381-395, Mar. 2003.
    30. F. H. Wang, J. S. Pan, L. C. Jain, H. C. Huang, “A VQ-based image-in-image data hiding scheme,” ICME:2191-2194, 2004.
    31. C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, pp. 469-474, Mar. 2004.
    32. Liu Shaohui, Chen Tianhang, Yao Hongxun, Gao Wen, “A variable depth LSB dat hiding technique in images,” Int. Conf. on Machine Learning and Cybernetics, vol. 1-7 : 3990-3994, 2004.
    33. Chu. S. C, Roddick J. F, Lu Z. M, et al., “A digital image watermarking method based on labeled bisecting clustering algorithm,” IECICE Transactions on Fundamentals, 87(1):282-285, 2004.
    34. C. C. Chang, and P. Y. Lin, “A compression-based data hiding scheme using vector quantization and principle component analysis,” 3rd International Conference on Cyberworlds (CW 2004), pp. 369-375, 2004.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE