簡易檢索 / 詳目顯示

研究生: 鄧俊彥
Teng, Chun-Yen
論文名稱: 以直方圖重新量化為基礎之資訊藏匿演算法
A Data Hiding Algorithm Based on Histogram Re-quantization
指導教授: 陳朝欽
Chen, Chaur-Chin
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 20
中文關鍵詞: 資訊隱藏藏密學
外文關鍵詞: steganography
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 藏密學是用於資訊隱藏的一種技術,隨著網路通訊的持續成長,
    愈益凸顯它的重要性。最近幾年,陸續有各種不同的藏密演算法被提
    出。例如,Ni 等人就提出了一種基於修改直方圖上的無失真資料隱
    藏演算法。
    為了增加隱密性和資訊能夠嵌入的容量,我們用亂數排列與直方
    圖重新量化的方式來延伸Ni 所提出的演算法。藉著亂數排列,它不
    再容易被暴力法所破解;藉由直方圖重新量化,我們可以增加三倍的
    資訊嵌入量。同時,在我們的方法下,視覺無法分辨圖像在嵌入資訊
    前後的差異性。


    Steganography is a technique of information hiding. It is more and more
    important while the internet communication grows up. Various steganographic
    algorithms have been proposed in recent years. For example, Ni et al. have proposed a
    lossless data-hiding algorithm based on the histogram modification.
    To have more security and more information embedding capacity, we extend the
    Ni’s algorithm with a random permutation and a histogram re-quantization. With a
    random permutation, it is not easy to be broken by a brute-force attack. With a
    histogram re-quantization, we increase the embedding capacity about 3 times. In our
    approach, it is visually indistinguishable between a cover image and a stego-image
    with a large embedding capacity.

    Chapter 1 Introduction……………………………………………..……………1 Chapter 2 Data Hiding Algorithm Based on the Histogram Modification…….4 2.1 Methodology……………..…………………………………………….…..4 2.1.1 Seeking the peak/zero point in the histogram…………………………4 2.1.2 Embedding……………………….……………………………………5 2.1.3 Extraction……………………………………………………………...7 2.2 Analysis…………………………………………………………………….7 2.2.1 Image quality………………………………………………………….7 2.2.2 Security……………………….….……………………………………7 2.2.3 Embedding Capacity………………………………………………...8 2.2.4 Reversibility………………...…………………………………………8 Chapter 3 Proposed Data Hiding Methods…………...…………………………9 3.1 Improvement of security………………………………………………...…9 3.2 Improvement of capacity…………………………………………………11 3.3 Reversibility…………………………………………………………..….12 Chapter 4 Experimental Results…………………………………………………13 Chapter 5 Conclusion and Future work………………………………...………17 References…………………………...…………………………………………….18

    [Blun2002] C. Blundo, A. D. Santis, and M. Naor, "Visual Cryptography for Gray
    Level Images," Information Processing Letters, 75, 255–259, 2002.
    [Bris2002] G. Brisbane, R. Safavi-Naini, and P. Ogunbona, "An Algorithm for Data
    Hiding Using Median Cut Segmentation," Proceedings of the Third
    IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia
    Information Processing, 89–96, 2002.
    [Celi2002] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, ─Reversible Data
    Hiding,∥ Proceedings. International Conf. on Image Processing, Vol. 2,
    157-160, 2002.
    [Chen2002] C.C. Chen, ─Watermarking Experiments Based on Wavelet Transforms,∥
    The Proceedings of SPIE: Int'l Conference on Electronic Imaging and
    Multimedia Technology III, Vol. 4925, 60-68, 2002.
    [Cori2005] L. Coria-Mendoza, P. Nasiopoulos, and R. Ward, "A Robust
    Watermarking Scheme Based on Informed Coding and Informed
    Embedding," IEEE International Conference on Image Processing,
    681–684, 2005.
    [Cox1996] I. Cox, J. Kilian, T. Leighton, and T. Shamoon, ─A Secure, Robust
    Watermark for Multimedia,∥ Proceedings of First International
    Workshop on Information Hiding, Lecture Notes in Computer Science
    No. 1174, Springer-Verlag, Berlin, 185-206, 1996.
    [Fall2007] M. Fallahpour and M. H. Sedaaghi, ─High Capacity Lossless Data
    Hiding Based on Histogram Modification,∥ IEICE Electron. Express,
    Vol. 4, No. 7, 205-210, 2007.
    [Hsu1999] C.T. Hsu and J.L. Wu, ─Hidden Digital Watermarks in Images,∥ IEEE
    Transactions on Image Processing, Vol. 8, 58–68, Jan. 1999.
    19
    [John1998] N. F. Johnson and S. Jajodia, ─Exploring Steganography: Seeing the
    Unseen,∥ IEEE Computer, 26-34, 1998.
    [Kawa1998] E. Kawaguchi and R.O. Eason, ─Principle and Applications of
    BPCS-steganography,∥ Proceedings SPIE 3528, 464–473, 1998.
    [Kund1999] D. Kundur and D. Hatzinakos, ─Digital Watermarks for Telltale
    Tamper,∥ Proofing and Authentication, Proceedings of the IEEE, Vol. 87,
    No. 7, 1167-1180, 1999.
    [Lees2003] A. van Leest, M. van der Veen, and F. Bruekers, ─Reversible Image
    Watermarking,∥ Proceedings of IEEE International Conf. on Image
    Processing, Vol. 2, 731-734, 2003.
    [Liu2000] R. Liu and T. Tan, ─A New SVD-Based Image Watermarking
    Method,─ Proceedings of ACCV, 63-67, 2000.
    [Lu2000] C.S. Lu and H.Y. Liao, ─Cocktail Watermarking for Digital Image
    Protection,∥ IEEE Transactions on Multimedia, Vol. 2, No. 4, 209-224,
    2000
    [Naor1995] M. Naor and A. Shamir, ─Visual Cryptography,∥ Advances in
    Cryptology: EUROCRYPT (A. De Santis, ed.), Vol. 950 of Lecture
    Notes in Computer Science, 1–12, 1995.
    [Ni2006] Z. Ni, Y. Shi, N. Ansari, and W. Su, ─Reversible Data Hiding,∥ IEEE
    Transactions on Circuits and System for Video Technology, Vol. 16, No.
    3, 354-362, 2006.
    [Peti1999] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ─Information
    Hiding—A Survey,∥ Proceedings of the IEEE, Vol. 87, No. 7,
    1062-1078, 1999.
    [Piva1999] A. Piva, F. Bartonlini, V. Cappellini, and M. Barnni, ─Exploiting the
    Cross-correlation of RGB-channels for Robust Watermarking of Color
    Image,∥ Proceedings of the IEEE International Conference on Image
    20
    Processing, Vol. 1, 306–310, 1999.
    [Pita1998] I. Pitas, ─A Method for Watermark Casting on Digital Images,∥ IEEE
    Trans. Image Processing, Vol. 8, No.6, 775-780, 1998.
    [Sepp2000] T. Seppanen, K. Makela, and A. Keskinarkaus, ─Hiding Information in
    Color Images Using Small Color Palettes,∥ Proceedings of the Third
    International Workshop on Information Security, 69-81, 2000.
    [web01] http://en.wikipedia.org/wiki/Steganography
    [web02] http://www.securityfocus.com/infocus/1684

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE