簡易檢索 / 詳目顯示

研究生: 梁志成
論文名稱: 針對向量資訊隱藏的偵察研究
A study of steganalysis over VQ steganography
指導教授: 孫宏民
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2008
畢業學年度: 96
語文別: 英文
論文頁數: 49
中文關鍵詞: 資訊隱藏向量資訊隱藏
外文關鍵詞: vq steganalysis, steganagraphy
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近十年來,資訊隱藏學受到許多電腦科學學者的重視。一個資訊隱藏
    法讓傳送者將秘密訊息放在媒體中,如數位影像,使其能夠在不被注
    意的情況下,送至一個特定的接受者。相對於資訊隱藏學,資訊隱藏
    偵測學的目標是檢驗是否一個媒體是否負載了秘密訊息。在學術文獻
    上己提出許多以向量壓縮的影像為媒體的資訊隱藏法,然而,卻尚未
    存在對於向量資訊隱藏的偵測法。 因此,在此論文中我們應用在非壓縮圖片上的RS 偵測法,提出一個有效率的向量資訊隱藏偵測法。此向量隱藏偵測法的效能表現將會以兩個常用的資訊隱藏法 MGLE 和
    PNNE 來評估。並藉由不同的參數調整,我們研究許多可變因素對於一個向量資訊隱藏法效能的影響。


    Table of Contents ......................................................................................................... I List of Figures............................................................................................................... IV List of Tables ................................................................................................................ VI Chapter 1 Introduction .............................................................................................. 1 1.1 Motivation..................................................................................................... 1 1.2 Overview ....................................................................................................... 1 1.3 Thesis Organization ...................................................................................... 2 Chapter 2 Background ............................................................................................... 4 2.1 Vector Quantization (VQ)............................................................................. 4 2.1.1 Codebook Generation ..................................................................... 4 2.1.2 Image Compression and Decompression ......................................... 5 2.2 Steganography............................................................................................... 6 2.2.1 VQ Steganography.......................................................................... 7 2.2.1.1 MGLE (Mean-Gray-Level Embedding Method) . . . . . . . 7 2.2.1.2 PNNE (Pair-wise Nearest-Neighbor Embedding Method) . 8 2.2.2 LSB Steganography ........................................................................ 9 2.2.2.1 LSB Replacement . . . . . . . . . . . . . . . . . . . . . . . 9 2.2.2.2 LSB Matching . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3 Steganalysis ................................................................................................... 11 2.3.1 LSB Steganalysis............................................................................. 12 2.3.1.1 Pairs-Of-Values E®ect(PoVs) . . . . . . . . . . . . . . . . . 12 2.3.1.2 HCF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.3.1.3 RS Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 I 2.4 Discuss .......................................................................................................... 16 Chapter 3 The Proposed Scheme ............................................................................... 22 Chapter 4 Simulation and Analysis............................................................................ 26 4.1 Samples and Notations.................................................................................. 26 4.2 Analysis of Experimental Results.................................................................. 27 4.2.1 Codebook Presort & Codebook Size............................................... 28 4.2.2 RS Mask ......................................................................................... 29 4.2.3 Discriminator .................................................................................. 30 4.2.4 Image Type..................................................................................... 31 4.3 Discuss .......................................................................................................... 32 Chapter 5 Analysis of RS Property............................................................................ 38 5.1 Property 1: R¡M > RM ................................................................................ 39 5.2 Property 2: SM > S¡M ................................................................................. 40 5.3 Combination of Property 1 and Property 2 .................................................. 41 5.4 Discuss .......................................................................................................... 42 Chapter 6 Conclusion and Future Work..................................................................... 44 6.1 Main Contribution ........................................................................................ 44 6.2 Future Work.................................................................................................. 45 Bibliography ................................................................................................................. 45 Appendix ...................................................................................................................... 49

    [1] J. Fridrich, M. Goljan, and R. Du, \Detecting lsb steganography in color and gray-
    scale images," IEEE MultiMedia, vol. 8, no. 4, pp. 22{28, 2001.
    [2] X. Zhang and S. Wang, \Steganography using multiple-base notational system and
    human vision sensitivity," Signal Processing Letters, IEEE, vol. 12, no. 1, pp. 67{70,
    Jan. 2005.
    [3] W. C. Du and W. J. Hsu, \Adaptive data hiding based on vq compressed images,"
    IEEE Proc. Vis. Image Signal process, vol. 150, no. 4, pp. 233{238, Aug. 2003.
    [4] C. C. Change and P. Y. Lin, \A compression-based data hiding scheme using vec-
    tor quantization and principle component analysis," 3rd International Conference on
    Cyberworlds(CW 2004), pp. 369{375, 2004.
    [5] R. M. Grey, \Vector quantization," IEEE ASSP Magazine, pp. 4{29, Apr. 1984.
    [6] J. S. Pan, \A training approach for e±cient vq codeword search," Journal of Infor-
    mation Science and Engineering, vol. 15, no. 3, pp. 375{382, 1999.
    [7] Z. M. L. J. S. Pan and S. H. Sun, \An e±cient encoding algorithm for vector quan-
    tization based on sub-vector technique," IEEE Trans. Image Processing, vol. 12, pp.
    265{270, Mar. 2003.
    [8] Y. Linde, A. Buzo, and R. Gray, \An algorithm for vector quantizer design," Com-
    munications, IEEE Transactions on [legacy, pre - 1988], vol. 28, no. 1, pp. 84{95,
    Jan 1980.
    46
    [9] Z.-M. Lu, J.-S. Pan, and S.-H. Sun, \Vq-based digital image watermarking method,"
    Electronics Letters, vol. 36, no. 14, pp. 1201{1202, 6 July 2000.
    [10] Y. C. Hu, \Grey-level image hiding scheme based on vector quantisation," Electronics
    Letters, vol. 39, no. 2, pp. 202{203, 23 Jan 2003.
    [11] Z.-M. LU, W. XING, D.-G. XU, and S.-H. SUN, \Digital image watermarking method
    based on vector quantization with labeled codewords(applications of information se-
    curity technipues)," IEICE transactions on information and systems, vol. 86, no. 12,
    pp. 2786{2789, 2003.
    [12] F.-H. Wang, J.-S. Pan, L. Jain, and H.-C. Huang, \A vq-based image-in-image data
    hiding scheme," Multimedia and Expo, 2004. ICME '04. 2004 IEEE International
    Conference on, vol. 3, pp. 2191{2194 Vol.3, 27-30 June 2004.
    [13] A. Westfeld and A. P‾tzmann, \Attacks on steganographic systems," in IH '99:
    Proceedings of the Third International Workshop on Information Hiding. London,
    UK: Springer-Verlag, 2000, pp. 61{76.
    [14] A. D. Ker, \Improved rs method for detection of lsb steganography," Lecture Notes in
    Computer Science, Computational Science and Its Applications VICCSA 2005, vol.
    3481/2005, pp. 508{516, 2005.
    [15] J. J. Harmsen and W. A. Pearlman, \Steganalysis of additive-noise modelable infor-
    mation hiding," in Security and Watermarking of Multimedia Contents V. Edited by
    Delp, Edward J., III; Wong, Ping W. Proceedings of the SPIE, Volume 5020, pp.
    131-142 (2003)., vol. 5020, Jun. 2003, pp. 131{142.
    [16] A. Ker, \Steganalysis of lsb matching in grayscale images," Signal Processing Letters,
    IEEE, vol. 12, no. 6, pp. 441{444, June 2005.
    [17] J. Fridrich, M. Goljan, and D. Soukal, \Higher-order statistical steganalysis of palette
    images," In Delp III, E.J., Wong, P.W., eds.: Security and Watermarking of Multi-
    media Contents V. Volume 5020 of Proc. SPIE., pp. 178{90, 2003.
    47
    [18] S. Dumitrescu, X. Wu, and Z. Wang, \Detection of lsb steganography via sample pair
    analysis," Signal Processing, IEEE Transactions on [see also Acoustics, Speech, and
    Signal Processing, IEEE Transactions on], vol. 51, no. 7, pp. 1995{2007, July 2003.
    [19] A. D. Ker, \Quantitative evaluation of pairs and RS steganalysis," in Security,
    Steganography, and Watermarking of Multimedia Contents VI. Edited by Delp, Ed-
    ward J., III; Wong, Ping W. Proceedings of the SPIE, Volume 5306, pp. 83-97
    (2004)., ser. Presented at the Society of Photo-Optical Instrumentation Engineers
    (SPIE) Conference, E. J. Delp, III and P. W. Wong, Eds., vol. 5306, Jun. 2004, pp.
    83{97.
    [20] H.-W. W. Hung-Min Sun, King-Hang Wang, \Data hiding in images using color-
    ing in minimum spanning tree," Cryptology and information Security Conference
    2006(CISC 2006), 2006.
    [21] J. Wang, J. Li, and G. Wiederhold, \Simplicity: Semantics-sensitive integrated
    matching for picture libraries," IEEE Transactions on Pattern Analysis and Machine
    Intelligence, vol. 23, no. 9, pp. 947{963, 2001.
    [22] K.-T. Lo and J. Feng, \Predictive mean search algorithms for fast vq encoding of
    images," Consumer Electronics, IEEE Transactions on, vol. 41, no. 2, pp. 327{331,
    May 1995.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE