簡易檢索 / 詳目顯示

研究生: 劉姵菱
論文名稱: 植基於JPEG格式的資訊隱藏演算法
JPEG-Based Steganographic Algorithms
指導教授: 陳朝欽
口試委員: 林慧珍
顏淑惠
陳建彰
陳朝欽
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2012
畢業學年度: 100
語文別: 英文
論文頁數: 25
中文關鍵詞: 資訊隱藏
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 藏密學是用於資訊隱藏的一種方法,隨著網路通訊的持續成長,愈益凸顯它的重要性。現在,已經有非常多的藏密演算法或藏密軟體已經被開發出來了,其中也包括了把資訊藏入於JPEG 影像之隱藏技術。JPEG是數位相機常使用的影像格式並廣泛應用在網路上。
    這篇論文提供了兩個方法改進F5資訊隱藏演算法的藏密容量。第一個方法屬於前處理的方法,在F5資訊隱藏演算法執行前,我們會隨機修改量化後的DCT係數去得到更多的非零的量化後的DCT係數來藏訊息。第二個方法裡,在F5資訊隱藏演算法執行後,我們在JPEG影像裡會稍微修改每個DCT區塊的結束位置的資訊去增加藏密容量。我們只要在量化後的DCT 8×8 區塊內修改一個DCT係數就能多儲存三位元的資料。縱使PSNR的數值有一點降低,我們提出的演算法跟許多經典的資訊隱藏演算法相比,藏密容量卻有顯著的進步。


    Steganography is a method of data hiding. It is more and more important while the Internet communication grows up. Now, many steganographic algorithms or software have already been developed including image hiding techniques for JPEG images. JPEG is the most common image format used by digital cameras and transmitted in the Internet.
    This thesis proposes two methods to increase the capacity of F5 embedding algorithm. The first method is a pre-processing method, we randomly modifies the qDCT coefficients before the F5 embedding algorithm to get more nonzero qDCT coefficients to embed message. In the second method, we slightly modify the end of block (EOB) information in a JPEG image to increase the capacity of embedding after the F5 embedding algorithm. We change a qDCT coefficient on each qDCT 8×8 block to embed 3 more bits of message. Although the PSNR value is slightly decreased, our proposed algorithm significantly increases the capacity of embedding compared with many classical steganographic algorithms.

    Chapter 1 Introduction 1 Chapter 2 Review of DCT-Based Steganographic Algorithms 3 2.1 The JPEG Image Format 3 2.2 Some Classical Steganographic Algorithms 5 2.2.1 J-Steg 5 2.2.2 JPhide 6 2.2.3 F5 6 2.2.4 OutGuess 8 2.2.5 JPEG-CES 8 2.3 Steganalysis 10 2.3.1 χ^2-test 10 2.3.2 S1 attack 11 2.3.3 S2 attack 12 Chapter 3 Proposed Data Hiding Method 13 3.1 Method 1: Random Modification of DCT Coefficients 13 3.2 Method 2: Adding One More Coefficient 15 3.3 Embedding and Extraction 16 Chapter 4 Experimental Results 18 4.1 Image Quality 18 4.2 S1 attack test 22 Chapter 5 Conclusion and Future Work 23 References 24

    [Frid2003] J. Fridrich, M. Goljan, and D. Hogea, “New methodology for breaking steganographic techniques for JPEGs,” Proceedings of SPIE: Security and Watermarking of Multimedia Contents, Vol. 5020, 143-155, 2003.
    [Jain1989] A. K. Jain, “Fundamentals of digital image processing. Englewood Cliffs,” NJ: Prentice Hall, new Jersey, 1989.
    [John1998] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, 26-34, 1998.
    [Liu2008] C. L. Liu, and S. R. Liao, “High-Performance JPEG Steganography using complementary embedding strategy,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008.
    [Penn1992] W. B. Pennebaker, and J. L. Mitchell, “JPEG still image data compression standard,” New York: Van Nostrand Reinhold, 1992.
    [Prov2001a] N. Provos, “Defending Against Statistical Steganalysis,” Proceedings of the 10th USENIX Security Symposium, 323-335, 2001.
    [Prov2001b] N. Provos, and P. Honeyman, “Detecting Steganographic Content on the Internet,” CITI Technical Report, Vol. 1, 1-11, 2001.
    [Prov2003] N. Provos, and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, 32-44, 2003.
    [West1999] A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proceedings of the 3rd International Workshop on Information Hiding, Springer-Verlag, 61-76, 1999.
    [West2001] A. Westfeld, “F5—A Steganographic Algorithm:High Capacity Despite Better Steganalysis,” The 4th International Workshop on Information Hiding, Springer-Verlag, 289-302, 2001.
    [Web01] http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt, last access on May 31, 2012.
    [Web02] http://en.wikipedia.org/wiki/Steganography, last access on May 31, 2012.
    [Web03] http://en.wikipedia.org/wiki/Histiaeus, last access on May 31, 2012.
    [Web04] http://linux01.gwdg.de/~alatham/stego.html, last access on May 31, 2012.
    [Web05] http://www2.htw-dresden.de/~westfeld/publikationen/f5r11.zip, last access on May 31, 2012.
    [Web06] http://www.outguess.org/, last access on May 31, 2012.
    [Web07] http://www.laps.ufpa.br/zampolo/portugues/engBiomedPDS2.html, last access on May 31, 2012.
    [Web08] http://www.cns.nyu.edu/~zwang/files/research/quality_index/demo_jpg.html, last access on May 31, 2012.
    [Web09] http://www.whitehouse.gov/blog/inaugural-address, last access on May 31, 2012.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE