Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/24394
標題: 竄改攻擊下強韌性資訊隱藏方法之研究
A Study of Robust Information Hiding Scheme Under Tampering Attacks
作者: 王志昭
Wang, Chih-Chao
關鍵字: 影像竄改
Image tamper
強韌性資訊隱藏
竄改偵測
向量量化
浮水印技術
robust information hiding
tamper detection
vector quantization
watermarking
出版社: 資訊管理學系所
引用: [1] S. Katzenbeisser and F. A. P. Petitcolas, “Information Hiding Techniques for Steganography and Digital Watermarking,” Boston:Artech House, pp. 45-47, 2000. [2] C. C. Chang, Y. C. Chou, and T. D. Kieu, “Information Hiding in Dual Images with Reversibility,” Proceedings of Third International Conference on Multimedia and Ubiquitous Engineering (MUE2009), pp. 145-152, Jun. 2009. [3] C. C. Chang, C. Y. Lin, and Y. H. Fan, “Lossless Data Hiding for Color Images Based on Block Truncation Coding,” Pattern Recognition, Vol. 41, No. 7, pp. 2347-2357, Jul. 2008. [4] J. Tian, 2003, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896. [5] H. C. Huang, F. H. Wang and J. S. Pan, “Efficient and robust watermarking algorithm with vector quantization,” Electronics Letters, vol. 37, no. 13, pp. 826-828, Jun. 2001. [6] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, no. 3, pp. 385-403, May 1998. [7] W. Y. Chen and C. H. Chen, “A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection,” Pattern Recognition, vol. 38, no. 4, pp. 587-598, Apr. 2005. [8] X. Kang, J. Huang, Y. Q. Shi and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 776-786, Aug. 2003. [9] C.S. Lu, H.Y.M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Trans. Image Process. 10 (2001) 435-439. [10] J. Fridrich, “Image watermarking for tamper detection,” in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, 1998, pp. 404-408. [11] J. Fridrich, M. Goljan, A.C. Baldoza, “New fragile authentication watermark for images,” in: Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, 2000, pp. 10-13. [12] M.U. Celik, G. Sharma, E. Saber, A.M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Trans. Image Process. 11 (6) (2002) 585-594. [13] M.U. Celik, G. Sharma, A.M. Tekalp, “Lossless watermarking for image authentication: a new framework and an implementation,” IEEE Trans. Image Process. 15 (4) (2006) 1042-1049. [14] C.Y. Lin, S.F. Chang, “Semi-fragile watermarking for authenticating JPEG visual content,” in: SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, no. 13, EI ’00, San Jose, USA, January 2000. [15] J. Fridrich, “A hybrid watermark for tamper detection in digital images,” in: International Symposium on Signal Processing and Its Applications, vol 1, 1999, pp. 301-304. [16] K. Maeno, Q. Sun, S.F. Chang, “New semi-fragile images authentication watermarking techniques using random bias and nonuniform quantization,” IEEE Trans. Multimed. 8 (1) (2006) 32-45. [17] Lu Z-M, Liu C-H, Xu D-G, “Semi-fragile image watermarking method based on index constrained vector quantization.” Electron Lett 39 (1) (2003): 35-36. [18] Lin ET, Christine I, Podilchuk B, Delp EJ, “Detection of image alterations using semi-fragile watermarks.” In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol 3971, San Jose, CA, USA (2000). [19] P.W. Wong, “A public key watermark for image verification and authentication,” in: Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, 1998, pp. 455-459. [20] P.W. Wong, N. Memon, “Secret an public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Process. 10 (10) (2001) 1593-1601. [21] R.M. Gray, “Vector Quantization,” IEEE ASSP Magazine, 1984, pp. 4-29. [22] P.W. Wong, N. Memon, “Secret an public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Process. 10 (10) (2001) 1593-1601. [23] W. Bender, D. Gruh, N. Morimoto, and A. Lu, 1996, “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no.3-4, pp. 313-336. [24] Ni, Z., Shi, Y. Q., Ansari, N., and Su, W., Reversible Data Hiding”, IEEE Transcations on Circuits and Systems for Video Technology, Vol.16, No. 3, pp. 354-362, Mar. 2006. [25] 張 真 誠 、 黃 國 峰 、 陳 同 孝 , 電 子 影 像 技 術(Electronic Imaging Techniques),松崗電腦圖書資料股份有限公司,2000年12月。 [26] 陳 同 孝 、 張 真 誠 、 黃 國 峰 , 數 位 影 像 處 理 技 術(Digital Image Processing Techniques),松崗電腦圖書資料股份有限公司,2001年1月。 [27] 陳同孝、張真誠及黃國峰,數位影像處理技術(Digital Image Processing Techniques),旗標出版股份有限公司,2003 年5 月。 [28] S. Walton, “Information authentication for a slippery new age,” Dr Dobb’s J vol. 20(4), pp. 18–26, 1995. [29] M. Yeung, F. Mintzer, “An invisible watermarking technique for image verification,” In Proceedings of the ICIP, 1997. [30] R. L. Rivest, “The MD5 message digest algorithm,” Tech. Rep., 1992. [31] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, pp. 120-126, Feb. 1978. [32] Chun-Wei Yang and Jau-Ji Shen, “Recover the Tampered Image Based on VQ Indexing,” Signal Processing, vol. 90, pp. 331–343, 2010. [33] R. L. Rivest, “The MD5 message digest algorithm,” Tech. Rep., 1992. [34] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, pp. 120-126, Feb. 1978. [35] Y. Linde, A. Buzo and R.M. Gray, An algorithm for vector quantizer design, IEEE Transactions on Communication, vol. 28, no. 1, Jan. 1980, 84-95. [36] R. L. Rivest, The MD5 message digest algorithm, Tech. Rep., 1992.MD5 [37] Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, Apr. 2004.
摘要: 在現今的資訊隱藏技術下,當偽裝影像遭受攻擊時,無法將藏匿其中的機密資訊還原。本論文提出了一個新的方法,首先將機密資訊位元轉換成二元影像之後,應用VQ演算法建立二元影像的索引表,並且將索引表做為機密資訊代碼重複地藏入影像當中。在機密資訊擷取時,應用易碎形浮水印技術進行竄改偵測,當影像遭受攻擊時,只要重新編碼過後的機密資訊之索引表沒有被破壞,就能在原始影像被竄改的情形之下,仍能完整取回機密資訊。實驗結果說明,機密資訊在載體影像遭受嚴重攻擊時仍可以完整地還原。進一步地,目前大多數的資訊隱藏技術大多專以灰階影像發展設計,但在我們的日常生活當中有越來越多的彩色影像。當我們接收到一張彩色影像時,可能在彩色影像上已進行了一些常見的影像處理技術如明亮度、銳利化微調,甚至是JPEG壓縮。而目前的資訊隱藏方法,當載體影像已經被影像處理動作而被更動時,並無法將機密資訊完整地還原。所以本論文也提出另一種應用在彩色影像的強韌性資訊隱藏技術,在載體影像遭受竄改或常見的影像處理動作時,機密資訊仍可還原。利用彩色影像的三種顏色層面,將機密資訊以數值區間編碼方式藏入若干的機密資訊複本於彩色影像當中藍色層面。並且也利用浮水印技術偵測影像遭竄改區域,使得藏在未遭竄改區的機密資訊可以順利取回。實驗結果顯示,當接收到的影像進行明亮化以及銳利化時,本實驗的方法仍可以完全地還原機密位元;當影像被JPEG壓縮後,仍可還原部分的機密資訊。
In reviewing the existent information hiding schemes, they cannot restore the secret information completely when its cover image has been tampered. A new scheme is proposed in this thesis that translates the secret information bits into binary image at first, and an index table of this binary image is built by applying VQ algorithm. The index table is then hidden into its cover image as the secret information codes. For the secret extraction, the fragile watermarking scheme is applied for tamper detection, and the secret codes are extracted from the non-tampered area. The experiment shows that the secret information still can be restored completely as when the cover image is seriously tampered. In further, most of the current information hiding techniques are designed for gray scale images. But, there are more color images in our daily life now. A fine tune of brightness, sharpness or even JPEG compression for colorful image is a usual image processing when we received an image. The current information hiding schemes cannot recover the secret information completely when images have been adjusted by such an image processing operation. So, a robust information hiding scheme for color image is also proposed in this thesis. By using the color image''s three color plans, several copies of secret information encoded by numerical intervals are embedded into the blue plane of a color image. The fragile watermarking scheme is also employed to perform tampered area detection in order to extract the secret information from the non-tampered areas. The experiment shows that our method can restore all the secret bits when the received image is brightened or sharpened, and partially recovered when the received image has been JEPG compressed.
URI: http://hdl.handle.net/11455/24394
其他識別: U0005-2107201215461800
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-2107201215461800
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.