研究生: |
鄧俊彥 Teng, Chun-Yen |
---|---|
論文名稱: |
以直方圖重新量化為基礎之資訊藏匿演算法 A Data Hiding Algorithm Based on Histogram Re-quantization |
指導教授: |
陳朝欽
Chen, Chaur-Chin |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2009 |
畢業學年度: | 97 |
語文別: | 英文 |
論文頁數: | 20 |
中文關鍵詞: | 資訊隱藏 、藏密學 |
外文關鍵詞: | steganography |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
藏密學是用於資訊隱藏的一種技術,隨著網路通訊的持續成長,
愈益凸顯它的重要性。最近幾年,陸續有各種不同的藏密演算法被提
出。例如,Ni 等人就提出了一種基於修改直方圖上的無失真資料隱
藏演算法。
為了增加隱密性和資訊能夠嵌入的容量,我們用亂數排列與直方
圖重新量化的方式來延伸Ni 所提出的演算法。藉著亂數排列,它不
再容易被暴力法所破解;藉由直方圖重新量化,我們可以增加三倍的
資訊嵌入量。同時,在我們的方法下,視覺無法分辨圖像在嵌入資訊
前後的差異性。
Steganography is a technique of information hiding. It is more and more
important while the internet communication grows up. Various steganographic
algorithms have been proposed in recent years. For example, Ni et al. have proposed a
lossless data-hiding algorithm based on the histogram modification.
To have more security and more information embedding capacity, we extend the
Ni’s algorithm with a random permutation and a histogram re-quantization. With a
random permutation, it is not easy to be broken by a brute-force attack. With a
histogram re-quantization, we increase the embedding capacity about 3 times. In our
approach, it is visually indistinguishable between a cover image and a stego-image
with a large embedding capacity.
[Blun2002] C. Blundo, A. D. Santis, and M. Naor, "Visual Cryptography for Gray
Level Images," Information Processing Letters, 75, 255–259, 2002.
[Bris2002] G. Brisbane, R. Safavi-Naini, and P. Ogunbona, "An Algorithm for Data
Hiding Using Median Cut Segmentation," Proceedings of the Third
IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia
Information Processing, 89–96, 2002.
[Celi2002] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, ─Reversible Data
Hiding,∥ Proceedings. International Conf. on Image Processing, Vol. 2,
157-160, 2002.
[Chen2002] C.C. Chen, ─Watermarking Experiments Based on Wavelet Transforms,∥
The Proceedings of SPIE: Int'l Conference on Electronic Imaging and
Multimedia Technology III, Vol. 4925, 60-68, 2002.
[Cori2005] L. Coria-Mendoza, P. Nasiopoulos, and R. Ward, "A Robust
Watermarking Scheme Based on Informed Coding and Informed
Embedding," IEEE International Conference on Image Processing,
681–684, 2005.
[Cox1996] I. Cox, J. Kilian, T. Leighton, and T. Shamoon, ─A Secure, Robust
Watermark for Multimedia,∥ Proceedings of First International
Workshop on Information Hiding, Lecture Notes in Computer Science
No. 1174, Springer-Verlag, Berlin, 185-206, 1996.
[Fall2007] M. Fallahpour and M. H. Sedaaghi, ─High Capacity Lossless Data
Hiding Based on Histogram Modification,∥ IEICE Electron. Express,
Vol. 4, No. 7, 205-210, 2007.
[Hsu1999] C.T. Hsu and J.L. Wu, ─Hidden Digital Watermarks in Images,∥ IEEE
Transactions on Image Processing, Vol. 8, 58–68, Jan. 1999.
19
[John1998] N. F. Johnson and S. Jajodia, ─Exploring Steganography: Seeing the
Unseen,∥ IEEE Computer, 26-34, 1998.
[Kawa1998] E. Kawaguchi and R.O. Eason, ─Principle and Applications of
BPCS-steganography,∥ Proceedings SPIE 3528, 464–473, 1998.
[Kund1999] D. Kundur and D. Hatzinakos, ─Digital Watermarks for Telltale
Tamper,∥ Proofing and Authentication, Proceedings of the IEEE, Vol. 87,
No. 7, 1167-1180, 1999.
[Lees2003] A. van Leest, M. van der Veen, and F. Bruekers, ─Reversible Image
Watermarking,∥ Proceedings of IEEE International Conf. on Image
Processing, Vol. 2, 731-734, 2003.
[Liu2000] R. Liu and T. Tan, ─A New SVD-Based Image Watermarking
Method,─ Proceedings of ACCV, 63-67, 2000.
[Lu2000] C.S. Lu and H.Y. Liao, ─Cocktail Watermarking for Digital Image
Protection,∥ IEEE Transactions on Multimedia, Vol. 2, No. 4, 209-224,
2000
[Naor1995] M. Naor and A. Shamir, ─Visual Cryptography,∥ Advances in
Cryptology: EUROCRYPT (A. De Santis, ed.), Vol. 950 of Lecture
Notes in Computer Science, 1–12, 1995.
[Ni2006] Z. Ni, Y. Shi, N. Ansari, and W. Su, ─Reversible Data Hiding,∥ IEEE
Transactions on Circuits and System for Video Technology, Vol. 16, No.
3, 354-362, 2006.
[Peti1999] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ─Information
Hiding—A Survey,∥ Proceedings of the IEEE, Vol. 87, No. 7,
1062-1078, 1999.
[Piva1999] A. Piva, F. Bartonlini, V. Cappellini, and M. Barnni, ─Exploiting the
Cross-correlation of RGB-channels for Robust Watermarking of Color
Image,∥ Proceedings of the IEEE International Conference on Image
20
Processing, Vol. 1, 306–310, 1999.
[Pita1998] I. Pitas, ─A Method for Watermark Casting on Digital Images,∥ IEEE
Trans. Image Processing, Vol. 8, No.6, 775-780, 1998.
[Sepp2000] T. Seppanen, K. Makela, and A. Keskinarkaus, ─Hiding Information in
Color Images Using Small Color Palettes,∥ Proceedings of the Third
International Workshop on Information Security, 69-81, 2000.
[web01] http://en.wikipedia.org/wiki/Steganography
[web02] http://www.securityfocus.com/infocus/1684