簡易檢索 / 詳目顯示

研究生: 陳宗猷
Tsung-Yu Chen
論文名稱: 資訊隱藏在彩色影像中
Data Hiding in Color Images
指導教授: 張隆紋
Long-Wen Chang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2004
畢業學年度: 92
語文別: 英文
論文頁數: 41
中文關鍵詞: 資訊隱藏隱像學空間域頻率域修改量化表
外文關鍵詞: Data Hiding, Steganography, Spatial Domain, Frequency Domain, modify quantization table
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 資訊嵌入或資料隱藏的技術,都是能夠使我們秘密嵌入額外資料在數位檔案的方法,而這些數位檔案包括了影像檔、電影檔、以及聲音檔等。一般來講我們將資訊嵌入或資料隱藏的技術分成兩大類的應用,一則是應用在數位版權的保護方面,也就是數位浮水印;一則是應用在秘密通訊方面,也就是隱像學。這兩大類的主要分別在於它們對所藏入資訊強調的重點不同,在數位浮水印裡,我們所著重的是藏入資料(數位浮水印)的強韌性,這樣才能確保當數位檔案遭受惡意修改、攻擊時,依舊能夠從中取出我們的數位浮水印來證明這個數位檔案是屬於我們所有;而在秘密通訊裡,我們所著重的則是在不影響原始影像下可藏入資料量的多寡。在秘密通訊裡我們若將所藏入資訊改為是對影像或數位檔案的註解或註釋的話,則可用來做資料管理。本篇論文則是著重於在不影響原始影像下使可藏入資料量更多。
    近年來,在資料隱藏的技術上,通常是藉由修改一些在原始影像裡面中較不重要的資訊,以達到所求並不影響原始的影像,目前最主要的研究領域可分成兩類:一則是在Spatial domain下對影像資料作處理;一則是在Frequency domain下對影像資料作處理。在Spatial domain中最常用的方法是去修改影像裡面的least significant bits(LSB),以減少對影像品質的影響;在Frequency domain中則是在頻率域中選擇人眼較不敏感的高頻去嵌入我們所要藏入的資訊。一般圖檔分為黑白圖、灰階圖、與彩色圖,在本篇論文我只針對彩色圖檔來做探討與研究,因為彩色圖檔是一般較常被使用的圖檔,並且由於其本身的資料量大,相對可嵌入的資料量也會比較大。
    本篇論文分別對常用的彩色圖檔BMP檔與JPEG檔提出可在Spatial Domain與Frequency Domain下嵌入相當資訊量並且保持一定品質的方法。在Spatial Domain中的作法,會利用像素區域的影像特性來決定所藏的資料量多寡在搭配所使用的小技巧,減少影像的失真度;而在Frequency Domain中的作法主要會依據原本標準量化表的特性去做修改,進而得到可藏入資料的空間。


    In this paper, two simple information hiding techniques for color images in the spatial domain and the frequency domain are proposed. In the spatial domain, we divide the original image into 2x2 sub-blocks and check each sub-block if it has an edge point. If yes, we embed more data in this sub-block and blue channel. In the frequency domain, the proposed mechanism modifies the standard quantization table first. Then the data is hidden in the cover-image with its quantized DCT coefficients modified. We compare our method with other methods and a JPEG hiding-tool Jpeg–Jsteg. From the experimental results, we obtain that the proposed methods has a larger data hiding capacity than other methods and Jpeg–Jsteg, and the quality of the stego-images of our methods is acceptable.

    Acknowledgements i Abstract (in Chinese) ii Abstract (in English) iii List of Contents iv List of Figures v List of Tables viii Chapter 1 Introduction 1 Chapter 2 Review of Data Hiding Techniques 3 2.1 Data hiding method in the spatial domain 3 2.1 Data hiding method in the frequency domain 3 Chapter 3 The Proposed Methods for Data Hiding in Color Images 5 Chapter 4 Experimental Results and Discussions 17 Chapter 5 Conclusions 39 References 40

    [1] W. Bender, D.Gruhl and N. Morimoto, "Technique for data hiding", IBM System Journal, Vol.35, NOS 3&$, 1996.
    [2] E. Franz, A. Jerichow, S. Moeller, A. Pfitzmann and I. Stierand, "Computer Based Steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best", in: Information Hiding, First Int. workshop, Cambridge, UK, May, June, 1996, Springer, Lecture Notes in Computer Science, No. 1174, pp. 7-21
    [3] C Kurak, J McHugh, "A Cautionary Note on Image Downgrading", Computer Security Applications Conference, (IEEE, 1992) pp 153—159
    [4] Gruhl, D., A. Lu, and W. Bender, “Echo Hiding,” in Information Hiding: First International Workshop, Proceedings, vol.1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 295-316.
    [5] Van Schyndel, R. G., A. Tirkel, and C. F. Osborne, “A Digital Watermark,” in Proceedings of the IEEE International Conferences on Image Processing, vol. 2, 1994, pp.86-90
    [6] E. H. Adelson, “Digital signal encoding and decoding apparatus,” U.S. Patent 4939515, 1990.
    [7] "StegoDos-Black Wolf's Picture Encoder v0.90B," ftp://ftp.csua.berkely.edu/pub/cypherpunks/steganography/stegodos.zip, 1993
    [8] Brown, A., "S-Tools for Windows," ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip, 1996.
    [9] Machado,R.,"Ezstego,Stego Online,Stego,"http://www.stego.com,1997.
    [10] Repp, H., "Hide4PGP," http://www.rugeley.demon.co.uk/security/hide4pgp.zip, 1996.
    [11] Hansmann, F., "Steganos, Deus Ex Machina Communications," http://www.steganography.com/, 1996.
    [12] H. Y. Chang, “Data hiding and watermarking in color images by wavelet transforms,” Master thesis, Department of Computer and Information Science, National Chiao Tung University, Taiwan, Republic of China, 1999.
    [13] Kobayashi, H., Y. Noguchi and H. Kiya (1999). A method of embedding binary data into JPEG bitstreams. IEICE Trans. Information and Systems, J83-D-II, 1469-1476
    [14] D. Upham, Jpeg–Jsteg, http://www.tiac.net/users/korejwa.
    [15] Chin-Chen Chang, Tung-Shou Chen, Lou-Zo Chung, A steganographic method based upon JPEG and quantization table modification, Information Sciences 141 (2002) 123–138
    [16] USC-SIPI image database

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE