簡易檢索 / 詳目顯示

研究生: 游然琇
You, Ran-Shiou
論文名稱: 植基於離散餘弦轉換之藏密演算法
On DCT-Based Algorithms for Steganography
指導教授: 陳朝欽
Chen, Chaur-Chin
口試委員: 李建興
Lee, Chang-Hsing
陳朝欽
Chen, Chaur-Chin
朱學亭
Chu, Hsueh-Ting
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2012
畢業學年度: 100
語文別: 英文
論文頁數: 26
中文關鍵詞: 隱寫術離散餘弦轉換JPEG
外文關鍵詞: steganography, DCT, JPEG
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,隨著科技的高度發展,網路已成為生活中不可或缺的一部份,所以我們要更重視網路安全的問題。
    在2008年,劉教授提出Complementary Embedding Strategy (CES),是一種具備高嵌入量的JPEG藏密演算法,此藏密演算法也可以抵禦幾種攻擊,諸如:卡方攻擊和S系列攻擊等。而JPEG影像格式被廣泛應用於網路傳輸和數位相機。鑒於此,我們選擇這方法來做些微的修改,並更進一步提升可嵌入的容量。
    在本論文中,我們先複習藏密學的概念,以及幾個現存知名的藏密法。然後,呈現我們提出的方法,並進一步做實驗與討論。由於CES之E1演算法最後的步驟會對qDCT係數做出從-2到1的過度修改,所以我們用影像前處理來取代CES之E1演算法最後步驟的係數修改,來改進藏密影像的PSNR。這部分被稱為修改後的CES。此外,若我們的機密訊息位元數量大於修改後的CES之可嵌入量,在執行完修改的CES後,我們會執行增加嵌入量的方法。這方法可增加令人滿意的嵌入量,而PSNR會稍微降低。我們藉由六張512×512的256灰階影像來測試不同藏密法的PSNR和可嵌入量。


    In recent years, the Internet has become an indispensable part of life with the highly developed technology, so we cannot ignore the issue about network security.
    In 2008, Liu proposed a JPEG steganographic algorithm of higher capacity, Complementary Embedding Strategy (CES), and this algorithm can resist several steganographic attacks, such as χ2 attack and S family attacks. And JPEG image format is widely used in a digital camera and in the Internet transmission. In view of this, we choose CES to slightly modify and further increase capacity.
    In this thesis, we review the concept of steganography and several well-known existing steganographic algorithms first. Then, we present our proposed method, the experimental results and conclusion. Because E1 algorithm of CES may over-modify the selected quantized Discrete Cosine Transform (qDCT) coefficient in the last step to fix the qDCT distribution, we replace the coefficient modification in last step of E1 algorithm of CES with image pre-processing to slightly improve the PSNR value of the stego-image. This section is called modified CES. In addition, if the number of bits of the secret message is larger than the available capacity of modified CES, we will execute a method of raising embedding capacity to increase the available capacity of the cover-image. This method, while it satisfactorily increases the capacity, incurs a slight tradeoff of decreased PSNR value. We test different steganographic algorithms by six 512×512 images with 256 gray levels and show these images’ experimental results of PSNR value and capacity.

    Chapter 1 Introduction 1 Chapter 2 Reviews of Existing JPEG-Based Steganographic Methods 4 2.1 JPEG Image Compression System 4 2.2 Existing JPEG-Based Steganographic Methods 6 2.2.1 J-Steg Algorithm 6 2.2.2 OutGuess Algorithm 8 2.2.3 F5 algorithm 9 2.2.4 CES 10 2.3 Steganalysis 11 2.3.1 χ2 attack 11 2.3.2 S family attack 11 Chapter 3 The Proposed Method 14 3.1 Image Pre-processing 14 3.2 The Method of Raising Capacity 16 3.3 The Diagram of the Proposed Method 19 Chapter 4 Experimental Results 20 Chapter 5 Conclusion 24 References 25

    [Chen2006] C. Chen, “A Secure Steganographic Technique for JPEG Images”, Master Thesis, Department of Communications Engineering, Feng Chia University, Taiwan, 2006.
    [Frid2002a] J. Fridrich, M. Goljan and D. Hogea, “Attacking the OutGuess,” Proc. ACM Workshop Multimedia Security, Juan-Pins, France, Dec. 2002, http://wwwiti.cs.uni-magdeburg.de/iti_amsl/acm/acm02/outguess.pdf.
    [Frid2002b] J. Fridrich , M. Goljan and D. Hogea, “Steganalysis of JPEG Images: Breaking the F5 Algorithm,” Proceedings of the 5th International Workshop on Information Hiding, Springer-Verlag, 310-323, 2002.
    [Frid2003] J. Fridrich, M. Goljan, and D. Hogea, “New methodology for breaking steganographic techniques for JPEGs,” Proceedings of the SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, 143-155, 2003.
    [John1998] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, 26-34, Feb. 1998.
    [Liu2008] C.L. Liu and S.R. Liao, “High-performance JPEG steganography using complementary embedding strategy,” Pattern Recognition, vol. 41, 2945-2955, 2008.
    [Penn1992] W. B. Pennebaker and J. L. Mitchell, “JPEG: Still Image Data Compression Standard,” New York: Van Nostrand Reinhold, 1992.
    [Prov2001] N. Provos, “Defending Against Statistical Steganalysis,” The 10th USENIX Security Symposium, 323-335, 2001.
    [Prov2003] N. Provos, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, 65-44, 2003.
    [West2000] A. Westfeld and A. Pfitzmann,“Attacks on Steganographic Systems,” Proceedings of the 3rd International Workshop on Information Hiding, Springer-Verlag, 61-76, 2000.
    [West2001] A. Westfeld, “F5─A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Proceedings of the 4th International Workshop on Information Hiding, Springer-Verlag, 289-302, 2001.
    [Zhan2003] T. Zhang and X. Ping, “A Fast and Effective Steganalytic Technique Against JSteg-like Algorithm”, Proceedings of the ACM Symposium on Applied Computing, ACM Press, 307-311, 2003.
    [Web01] http://en.wikipedia.org/wiki/Steganography, last access on June 5, 2012.
    [Web02] http://www.impulseadventure.com/photo/jpeg-quantization.html, last access on June 5, 2012
    [Web03] http://www.faqs.org/rfcs/rfc2035.html, last access on Jun. 5, 2012
    [Web04] http://freeworld.thc.org/root/phun/stego-challenge/jpeg-jsteg-v4.diff, last access on June 5, 2012.
    [Web05] http://en.wikipedia.org/wiki/Pseudorandom_number_generator, last access on June 5, 2012.
    [Web06] http://www.codeforge.cn/article/103157, last access on June 5, 2012.
    [Web07] http://www.eecs.qmul.ac.uk/~phao/CIP/Images/, last access on June 5, 2012.
    [Web08] http://news.stanford.edu/news/2005/june15/jobs-061505.html, last access on June 5, 2012.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE