Please use this identifier to cite or link to this item:
標題: 使用同位查核碼作二元與灰階影像之資料藏匿
A Data Hiding Scheme for Binary and Gray Images Using Parity Check Codes
作者: 黃厚淳
Huang, Hou-Chun
關鍵字: Data hiding
Syndrome code
Parity check code
出版社: 電機工程學系所
引用: [1] S. S. Pradhan, K. Ramchandran, “Distributed source coding using syndromes (DISCUS): design and construction," IEEE Trans. Inform. Theory, vol. 49, pp. 626-643, March 2003. [2] P. Moulin, R. Koetter, “Data-Hiding Codes," Proc. IEEE, vol. 93, pp. 2083-2126, Dec. 2005. [3] R. G. Gallager, “Low Density Parity Check Codes," IRE Trans. Inform. Theory, January 1962. [4] M. J. Wainwright, “Sparse Graph Codes for Side Information and Binning," IEEE Signal Processing Mag., vol. 24, pp. 47-57, Sept. 2007. [5] M. J. Wainwright, E. Martinian, “Low-Density Graph Codes That Are Optimal for Binning and Coding With Side Information," IEEE Trans. Inform. Theory, vol. 55, pp. 1061-1079, March 2009. [6] H. W. Tseng, F. R. Wu, C. P. Hsieh, “Data Hiding for Binary Images Using Weight Mechanism," Intelligent Information Hiding and Multimedia Signal Processing 2007, vol.1, pp.307-310, Nov. 2007. [7] M. Venkatesan, P. MeenakshiDevi, K. Duraiswamy, and K. Thiagarajah, “A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity," Information Assurance and Security 2007, pp.468-471, Aug. 2007. [8] J. A. Bloom, I. J. Cox, T. Kalker, J. P. M. G. Linnartz, M. L. Miller, and C. B. S. Traw, “Copy protection for digital video," Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information), vol. 87, no. 7, pp. 1267-1276, Jul. 1999. [9] D. Boneh, J. Shaw, “Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, 1998. [10] D. Kundur, D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999. [11] E. Martinian, G. W. Wornell, “Authentication with distortion constraints," Proc. IEEE Int. Conf. Image Processing 2002, pp. II.17-II.20. [12] J. Chen, T. S. Chen, M. W. Cheng, “A New Data Hiding Method in Binary Image" Multimedia Software Engineering, 2003. Proceedings. Fifth International Symposium on2003, pp. 88-93,2003. [13] Y. Y. Meng, B. J. Gao, Y. Qiang, F. G. Yu, C. Wang, “A Novel Steganalysis of Data Hiding in Binary Text Images," Communication Systems, 2008. ICCS 2008. 11th IEEE Singapore International Conference, pp. 247-251, Nov. 2008. [14] V. Patrecu, “Gray Level Image Enhamement Using Piecewise Linear Functions," Signals, Circuits and Systems, 2005. ISSCS 2005. International Symposium, vol. 1, pp. 211-214, July 2005. [15] C. H. Huang, C. C. Lee , H. C. Wu, C. M. Wang, “Lossless Data Hiding for Color Images," Intelligent Systems Design and Applications, vol. 3, pp. 632-637, 2008. [16] L. Long, A. Nishihara, “Data Hiding for Digital Halftoned Color Images," IEEE Region 10 Conference, pp. 1-4, Nov. 2006. [17] H. Luo, F. Yu (Correspondence author), J. S. Pan, Z. M. Lu, “Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding," Intelligent Systems Design and Applications, vol. 3, pp. 431-436, Nov. 2008. [18] C. Wang, J. Wang, M. Zhou, G. Chen, D. Li, “ATBaM: An Arnold Transform Based Method onWatermarking Relational Data," Multimedia and Ubiquitous Engineering, pp. 263-270, 2008. [19] J. Y. Byun, K. H. Jung, K. Y. Yoo, “Improve Data Hiding Method by Block Parity for Binary Images," Computer Science and Software Engineering, vol. 3, pp. 931-934, 2008. [20] H. Q. Liang, W. B. Ran, X. X. Niu, “A Secure and High Capacity Data Hiding Scheme for Binary Images," Wavelet Analysis and Pattern Recognition, vol. 1, pp. 224-229, 2007. [21] H. Ajetrao, P. J. Kulkarni, “A Novel Scheme of Data Hiding in Binary Images," Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 70-77, 2007. [22] J. Bierbrauer, J. Fridrich, “Constructing Good Covering Codes for Application in Steganography", Springer Berlin, 2008. [23] Y. C. Tseng, H. K. Pan, “Data Hiding in 2-Color Images," Computers IEEE Transactions}, vol. 51, pp. 873-878, 2002. [24] Y. C. Tseng, H. K. Pan, “Secure and Invisible Data Hiding in 2-Color Images," Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 887-896, 2001. [25] Y. C. Tseng, Y. Y. Chen, H. K. Pan, “A Secure Data Hiding Scheme for Binary Images," Communications IEEE Transactions, vol. 50, pp. 1227-1231, 2002. [26] R. Y. M. Li, O. C. Au, K. K. Lai, C. K. Yuk, S. Y. Lam, “Data Hiding with Tree Based Parity Check," Multimedia and Expo 2007 IEEE International Conference, pp. 635-638, 2007. [27] S. F. Ming, O. C. Au, “Data Hiding Watermarking for Halftone Images," Image Processing IEEE Transactions, vol. 11, pp. 477-484, 2002. [28] R. Y. M. Li, O. C. Au, C. K. M. Yuk, S. K. Yip, S. Y. Lam, “Hlaftone Image Data Hiding with Block-Overlapping Parity Check," Speech and Signal Processing, vol. 2, pp. II-193-II-196, 2007. [29] S. F. Ming, O. C. Au, “Halftone Image Data Hiding with Intensity Selection and Connection Selection," Circuits and Systems, vol. 5, pp. 243-246, 2001. [30] S. F. Ming, O. C. Au, “Data Hiding in Halftone Images by Stochastic Error Diffusion," Acoustics Speech and Signal Processing, vol. 3, pp. 1965-1968, 2001. [31] C. C. Chang, T. D. Kieu, Y. C. Chou, “A High Payload Steganographic Scheme Based on (7,4) Hamming Code for Digital Images," Electronic Commerce and Security, pp. 16-21, 2008. [32] Z. X. Yin, C. C. Chang, Y. P. Zhang, “A High Embedding Efficiency Steganography Scheme for Wet Paper Codes," Information Assurance and Security, vol. 2, pp. 611-614, 2009. [33] W. Y. Chen, C. C. Liu, “Robust Watermarking Scheme for Binary Images Using a Slice-Based Large-Cluster Algorithm with a Hamming Code," Optical Engineering, vol. 45, pp. 1-10, 2006. [34] S. Lin, D. J. Costello. Jr, “Error Control Coding, 2nded", Prentice Hall, 2004.
摘要: 本篇論文提出兩個二元影像的資料藏匿方法。一張二元影像被切割成數個區塊,藉由改變像素值來藏匿浮水印至每個區塊中。計算二元影像的權重來找出影像空間域中適合藏匿的位置,藉此使得浮水印較不易被發現。我們提出區塊徵狀碼來降低失真度。 另外,文中亦提出了利用人類視覺靈敏度較低的灰階影像空間當作藏匿區域的方法。為了讓失真度可以更小,因此在文中亦提出區塊徵狀碼的資料藏匿法。利用這個方法配合兩階量化技術可使載體的失真度變小。文中藉由影像強化技術控制灰階影像隱敝空間的大小可調整藏匿的資料容量。最後我們亦提出一種估測人類對低灰階不敏感度的影像品質判斷方式,此方法可應用在本文中所提出之藏匿方式。
This paper proposed two data hiding approaches for binary images. The binary image is partitioned into many blocks and the watermark will be embedded into blocks by flipping pixels. The weight method is also proposed to find the most suitable pixel for flipping. Thus, the watermark in the image is difficult to detect. We proposed syndrome code to obtain low fidelity. Further, we proposed a method which considers the gray level image space with low human visual sensitivity to be embedding area. For lower fidelity, we also proposed syndrome code to be the embedding algorithm. The image enhanced technique controlled the available embedding space for the data hiding capacity. Eventually, we also proposed a way to decide the image quality.
其他識別: U0005-1507201016094300
Appears in Collections:電機工程學系所



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.