研究生: |
袁龍飛 Yuan, Long-Fei |
---|---|
論文名稱: |
基於插值與變型數獨矩陣之視覺效果增強的可逆資料隱藏之研究 Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics |
指導教授: |
張真誠
Chang, Chin-Chen |
口試委員: |
詹永寬
Chan, Yung-Kuan 李金鳳 Lee, Chin-Feng |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2024 |
畢業學年度: | 112 |
語文別: | 中文 |
論文頁數: | 38 |
中文關鍵詞: | 可逆資料隱藏 、插值法 、數獨矩陣 、增強視覺品質 |
外文關鍵詞: | Reversible data hiding (RDH), Interpolation, Sudoku matrices, Enhanced visual quality |
相關次數: | 點閱:20 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在可逆資料隱藏演算法中利用插值技術具有強大的嵌入容量的優勢。然而,流行的演算法通常直接將機密資料嵌入到非參考像素中,而不考慮相鄰像素之間的關係。這種做法會導致隱寫影像的視覺品質不佳。為了解決這個問題,我們引入了增強和修改插值。此外,我們設計了變型數獨矩陣,以針對不同類型的參考像素自訂不同的資料隱藏策略:單一類型和配對類型。透過結合這些創新設計,插值操作保留了原始影像中區塊的圖案級訊息,而不是僅僅關注像素級。在評估我們提出的方案的有效性時,我們利用兩個代表性圖像資料集進行了實驗。這些實驗的結果顯示我們的方案獲得了 44.11 dB 的平均峰值信噪比(PSNR)和1.63每像素比特的隱藏能力。因此,可以肯定的是,我們提出的方案所提供的優勢非常適合需要高品質隱寫影像的場景。
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confidential data into non-reference pixels without accounting for the relationships between neighboring pixels. This practice results in suboptimal visual quality in the stego images. To rectify this issue, we have introduced the augmentation and modification interpolation (AMI). Additionally, we have devised variant Sudoku matrix to facilitate distinct data-hiding strategies tailored for different types of reference pixels: Single type and Paired type. By incorporating these innovative designs, the interpolation operation now preserves the pattern-level information of the block in the original image, rather than focusing solely on the pixel level. In assessing the effectiveness of our proposed scheme, we performed experiments utilizing two representative image datasets. The outcomes of these experiments validate that our scheme attains an average PSNR of 44.11 dB and an average hiding capacity of 1.63 bpp. Consequently, it is affirmed that the advantage offered by our proposed scheme is well-suited for scenarios demanding high-quality stego images.
References
[1] Chi-Kwong Chan, L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, Mar. 2004.
[2] Jun Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003.
[3] Xiaolong Li, Bin Yang and Tieyong Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Transactions on Image Processing, vol. 20, no. 12, pp. 3524-3533, Dec. 2011.
[4] Ioan-Catalin Dragoi, Dinu Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1779-1790, Apr. 2014.
[5] Diljith M. Thodi, Jeffrey J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, Mar. 2007.
[6] Dinu Coltuc, “Improved embedding for prediction-based reversible watermarking,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 873-882, Sept. 2011.
[7] Heng Yao, Xiaokai Liu, Zhenjun Tang, Yu-Chen Hu, Chuan Qin, “An improved image camouflage technique using color difference channel transformation and optimal prediction-error expansion,” IEEE Access, vol. 6, pp. 40569-40584, 2018.
[8] M. Fallahpour and M. H. Sedaaghi, “High capacity lossless data hiding based on histogram modification,” IEICE Electronics Express, vol. 4, no. 7, pp. 205–210, 2007.
[9] Xiaolong Li, Bin Li, Bin Yang, Tieyong Zeng, “General framework to histogram-shifting-based reversible data hiding,” IEEE Transactions on Image Processing, vol. 22, no. 6, pp. 2181-2191.
[10] Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, vol 41, issue 12, pp. 3582-3591, Dec. 2008.
[11] Zhicheng Ni, Yun-Qing Shi, N. Ansari and Wei Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.
[12] Reza Moradi Rad, KokSheik Wong, Jing-Ming Guo, “Reversible data hiding by adaptive group modification on histogram of prediction errors,” Signal Processing, vol. 125, pp. 315-328, Aug.2016.
[13] Piyu Tsai, Yu-Chen Hu, Hsiu-Lien Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, no. 6, pp. 1129-1143, Jun. 2009.
[14] Ki-Hyun Jung, Kee-Young Yoo, “Data hiding method using image interpolation,” Computer Standards & Interfaces, vol. 31, no. 2, pp. 465–470, Feb. 2009.
[15] Ki-Hyun Jung and Kee-Young Yoo, “Steganographic method based on interpolation and LSB substitution of digital images,” Multimed Tools Appl, vol. 74, no. 6, pp. 2143–2155, 2015.
[16] Chin-Feng Lee, Yu-Lin Huang, “An efficient image interpolation increasing payload in reversible data hiding,” Expert Systems with Applications, vol. 39, no. 8, pp. 6712–6719, Jun. 2012.
[17] Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee and Shiuh-Jeng Wang, “Image interpolating based data hiding in conjunction with pixel-shifting of histogram,” J. Supercomput, vol. 66, no. 2, pp. 1093–1110, Sept. 2013.
[18] Aruna Malik, Geeta Sikka and Harsh K Verma, “A reversible data hiding scheme for interpolated images based on pixel intensity range,” Multimedia Tools Appl, vol. 79, no. 25, pp. 18005–18031, Feb. 2020.
[19] Fatuma Saeid Hassan and Adnan Gutub, “Efficient reversible data hiding multimedia technique based on smart image interpolation,” Multimedia Tools Appl, vol. 79, no. 39, pp. 30087–30109, Aug. 2020.
[20] Fatuma Saeid Hassan and Adnan Gutub, “Efficient image reversible data hiding technique based on interpolation optimization,” Arabian Journal for Science and Engineering, vol. 46, no. 9, pp. 8441–8456, Sept.2021.
[21] R. Geetha. and S. Geetha., “Efficient rhombus mean interpolation for reversible data hiding,”2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, Bangalore, India, pp. 1007-1012, 2018.
[22] Jie Hu, Tianrui Li, “Reversible steganography using extended image interpolation technique,” Computers & Electrical Engineering, vol. 46, pp. 447-455, Aug. 2015.
[23] Manasi Jana and Biswapati Jana, “An improved data hiding scheme through image interpolation,” Computational Intelligence in Pattern Recognition, vol 999, pp. 157–169, Aug. 2019.
[24] Tzu-Chuen Lu, “Interpolation-based hiding scheme using the modulus function and re-encoding strategy,” Signal Processing, vol. 142, pp. 244-259, Jan. 2018.
[25] Zhiyun Huang, Yu Lin and Xiaofeng Chen, “A block-based adaptive high fidelity reversible data hiding scheme in interpolation domain,” Multimed Tools Appl, Mar. 2023.
[26] Mohammad AA, Al-Haj A, Farfoura M, “An improved capacity data hiding technique based on image interpolation,” Multimed Tools Appl, vol. 78, pp.7181–7205, Mar. 2019.
[27] Yuan-Yu Tsai, Jian-Ting Chen, Yin-Chi Kuo and Chi-Shiang Chan, “A generalized image interpolation-based reversible data hiding scheme with high embedding capacity and image quality,” KSII Trans Internet Inf Syst, vol. 8, no. 9, Sept. 2014.
[28] Xiangguang Xiong, Lihui Wang, Zhi Li, Chen Ye, Yi Chen, Mengting Fan, Yuemin Zhu, “An adaptive high capacity reversible data hiding algorithm in interpolation domain,” Signal Processing, vol. 194, pp.108458, 2022.
[29] Akshika Verma and Khushil Kumar Saini, “Refined neighbor mean interpolation algorithm for reversible data-hiding techniques,”2019 6th International Conference on Computing for Sustainable Global Development, New Delhi, India, pp. 774-778,2019.
[30] Md. Abdul Wahed and Hussain Nyeem, “Efficient data embedding for interpolation based reversible data hiding scheme,”2017 2nd International Conference on Electrical & Electronic Engineering, Rajshahi, Bangladesh, pp. 1-4, 2017.
[31] Bas, P.; Furon, T. Image Database of BOWS-2. Available online: http://bows2.ec-lille.fr,Accessed: Jun. 20, 2017.
[32] Patrick Bas, Tomáš Filler and Tomáš Pevný, “Break our steganographic system: The ins and outs of organizing BOSS,” IH 2011: Information Hiding, vol 6958, pp 59–70, doi: 10.1007/978-3-642-24178-9_5.
[33] Alain Horé and Djemel Ziou, “Image Quality Metrics: PSNR vs. SSIM,” 2010 20th International Conference on Pattern Recognition, Istanbul, Turkey, 2010, pp. 2366-2369, doi: 10.1109/ICPR.2010.579.
[34] H.J. Kim a, C. Kim b, Y. Choi a, S. Wang c, X. Zhang, “Improved modification direction methods” Computers & Mathematics with Applications, vol. 60, pp. 319-325, July. 2010.