Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/90735
標題: 材質合成與風格轉移之藏密學研究
Steganography Using Texture Synthesis and Style Transfer
作者: Kuo-Chen Wu
吳國禎
關鍵字: Data embedding
steganography
texture synthesis
style transfer
資訊隱藏
藏密學
材質合成
風格轉移
引用: [Alat2006] A. M. Alattar, J. Stach, and J. Tian, 'Reversible Watermarking Using Expansion, Rate Control and Iterative Embedding,' United States Patent Application 20070053550, 2006. [Ashi2003] M. Ashikhmin, 'Fast Texture Transfer,' IEEE Computer Graphics and Applications, vol. 23, no. 4, pp. 38-43, 2003. [Bend1996] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, 'Techniques for data hiding,' IBM Systems Journal, vol. 35, no. 3&4, pp. 313-336, 1996. [Beck1964] Pólya, George, Derrick H. Lehmer, and Montgomery Phister, 'Applied Combinatorial Mathematics, ' Ed. Edwin F. Beckenbach. New York: Wiley, 1964. [Borg2008] P. Borges, J. Mayer, and E. Izquierdo, 'Robust and Transparent Color Modulation for Text Data Hiding,' IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1479-1489, 2008. [Celi2005] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, 'Lossless Generalized-LSB Data Embedding,' IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 157-160, 2005. [Chan2015] W. H. Chang, M. C. Cheng, C. M. Kuo, and G. D. Huang, 'Feature-Oriented Artistic Styles Transfer Based on Effective Texture Synthesis,' Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 1, pp. 29-46, 2015. [Chao2009] M. W. Chao, C. H. Lin, C. W. Yu, and T. Y. Lee, 'A High Capacity 3D Steganography Algorithm,' IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 2, pp. 274-284, 2009. [Chen2004] C. K. Chan and L. M. Cheng, 'Hiding data in images by simple LSB substitution,' Pattern Recognition, vol. 37, pp. 469-474, 2004. [Chen2006] Y.-M. Cheng and C.-M. Wang, 'A high-capacity steganographic approach for 3D polygonal meshes,' The Visual Computer, vol. 22, no. 9, pp. 845-855, 2006. [Chen2009] M. Cheng, Z. Chen, X. Zeng and Z. Xiong, 'Reversible Data Hiding Using Additive Prediction-Error Expansion,' in Proceedings of ACM multimedia and security '09, pp. 19-24, 2009. [Cohe2003] M. F. Cohen, J. Shade, S. Hiller, and O. Deussen, 'Wang Tiles for image and texture generation,' ACM Transactions on Graphics, vol. 22, no. 3, pp. 287-294, 2003. [Drag2014] I.-C. Dragoi and D. Coltuc, 'Local-prediction-based difference expansion reversible watermarking,' IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1779-1790, 2014. [Efro1999] A. A. Efros and T. K. Leung, 'Texture synthesis by non-parametric sampling,' in Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1033-1038. [Efro2001] A. A. Efros and W. T. Freeman, 'Image quilting for texture synthesis and transfer,' in Proceedings of the 28th Annual Conference on Computer Graphics and Interactive Techniques, 2001, pp. 341-346. [Frid2001] J. Fridrich, M. Goljan, and R. Du, 'Detecting LSB steganography in color, and gray-scale images,' IEEE MultiMedia, vol. 8, no. 4, pp. 22-28, 2001. [GMP2014] The GMP development team, 'The GNU Multiple Precision Arithmetic Library,' https://gmplib.org/, 2014.' [Guo2013] Y. Guo, G. Zhao, Z. Zhou, and M. Pietikäinen, 'Video texture synthesis with multi-frame LBP-TOP and diffeomorphic growth model,' IEEE Transactions on Image Processing, vol. 22, no. 10, pp. 3879-3891, 2013. [Han2008] C. Han, E. Risser, R. Ramamoorthi, and E. Grinspun, 'Multiscale texture synthesis,' ACM Transactions on Graphics, vol. 27, no. 3, pp. 1-8, 2008. [Helm1991] J. L. Helm and L. Hesselink, 'Visualizing Vector Field Topology in Fluid Flows,' IEEE Computer Graphics and Applications, Vol. 11, No. 3, pp. 36-46, 1991. [Hert2001] A. Hertzmann, C. E. Jacobs, N. Oliver, B. Curless, and D. H. Salesin, 'Image analogies,' in Proceedings of the 28th annual conference on Computer graphics and interactive techniques (SIGGRAPH'01), pp. 327-340, 2001. [Hu2008] Y. Hu, H. K. Lee, K. Chen, and J. Li, 'Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions,' IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1500-1512, 2008. [Hu2009] Y. Hu, H. K. Lee, and J. Li, 'DE-Based Reversible Data Hiding With Improved Overflow Location Map,' IEEE Transactions on Circuits and System for Video Technology, vol. 19, no. 2, pp. 250-260, 2009. [John1998] N. F. Johnson and S. Jajodia, 'Exploring steganography: Seeing the unseen,' Computer, vol. 31, no. 2, pp. 26-34, 1998. [Kams2005] L. Kamstra and H. J. A. M. Heijmans, 'Reversible Data Embedding into Images Using Wavelet Techniques and Sorting,' IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082-2090, 2005. [Kim2009] K. S. Kim, M. J. Lee, H. Y. Lee, and H. K. Lee, 'Reversible Data Hiding Exploiting Spatial Correlation between Sub-sampled Images,' Patten Recognition, vol. 42, no. 11, pp. 3083-3096, 2009. [Lee2007] S. Lee, C. D. Yoo, and T. Kaller, 'Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform,' IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 321-330, 2007. [Li2009] M. T. Li, N. C. Huang, K. C. Wu, C. K. Jan, and C. M. Wang, 'An Effective Message Embedding Scheme for 3D Models,' Fundamenta Informaticae, vol. 97, no. 1-2, pp. 93-109, 2009. [Li2013] X. Li, B. Li, B. Yang, and T. Zeng, 'General framework to histogram-shifting-based reversible data hiding,' IEEE Transactions on Image Processing, vol. 22, no. 6, pp. 2181-2191, 2013. [Lian2001] L. Liang, C. Liu, Y.-Q. Xu, B. Guo, and H.-Y. Shum, 'Real-time texture synthesis by patch-based sampling,' ACM Transactions on Graphics, vol. 20, no. 3, pp. 127-150, 2001. [Liu2012] S.-C. Liu and W.-H. Tsai, 'Line-based cubism-like image—A new type of art image and its application to lossless data hiding,' IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1448-1458, 2012. [MaCa2004] J. McCaffrey, 'Generating the mth Lexicographical Element of a Mathematical Combination', Microsoft Developer Network, https://msdn.microsoft.com/en-us/library/aa289166, 2014. [Mali2007] H. M. A. Malik, R. Ansari, and A. A. Khokhar, 'Robust Data Hiding in Audio Using Allpass Filters,' IEEE Transactions on Audio, Speech, and Language Processing, vol. 15, no. 4, pp. 1296-1304, 2007. [Ni2006] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, 'Reversible data hiding,' IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006. [Otor2007] H. Otori and S. Kuriyama, 'Data-embeddable texture synthesis,' in Proceedings of the 8th International Symposium on Smart Graphics, pp. 146-157, 2007. [Otor2009] H. Otori and S. Kuriyama, 'Texture synthesis for mobile data communications,' IEEE Computer Graphics and Applications, vol. 29, no. 6, pp. 74-81, 2009. [Paru2009] J. K. Paruchuri, S. C. Cheung, and M. Hail, 'Video Data Hiding for Managing Privacy Information in Surveillance Systems,' EURASIP Journal on Information Security, article ID 236139, vol. 2009. [Peti1999] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, 'Information hiding-a survey,' Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999. [Prov2003] N. Provos and P. Honeyman, 'Hide and seek: an introduction to steganography,' IEEE Security & Privacy, vol. 1, no. 3, pp. 32-44, 2003. [Rodg1988] J. L. Rodgers and W. A. Nicewander, 'Thirteen ways to look at the correlation coefficient,' The American Statistician, vol. 42, no. 1, pp. 59-66, 1988. [Sach2009] V. Sacheny, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, 'Reversible Watermarking Algorithm Using Sorting and Prediction,' IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 7, pp. 989-999, 2009. [Tai2009] W. L. Tai, C. M. Yeh, and C. C. Chang, 'Reversible Data Hiding Based on Histogram Modification of Pixel Differences,' IEEE Transactions on Circuits and System for Video Technology, vol. 19, no. 6, pp. 906-910, 2009. [Tian2003] J. Tian, 'Reversible Data Embedding Using a Difference Expansion,' IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, 2003. [Thod2007] D. M. Thodi and J. J. Rodriguez, 'Expansion Embedding Techniques for Reversible Watermarking,' IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, 2007. [Tsai2009] P. Tsai, Y. C. Hu, and H. L. Yeh, 'Reversible Image Hiding Scheme using Predictive Coding and Histogram Shifting,' Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009. [Tsen2009] H. W. Tseng and C. P. Hsien, 'Prediction-based Reversible Data Hiding,' Journal of Information Sciences, vol. 179, no. 14, pp. 2460-2469, 2009. [Wang2004] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, 'Image quality assessment: from error visibility to structural similarity,' IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004. [Wei2000] L.-Y. Wei and M. Levoy, 'Fast texture synthesis using tree-structured vector quantization,' in Proceedings of the 27th Annual Conference on Computer Graphics and Interactive Techniques, 2000, pp. 479-488. [Wu2010] H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, 'Reversible Image Steganographic Scheme via Predictive Coding,' Displays, vol. 31, no. 1, pp. 35-43, 2010. [Wu2015] K. C. Wu and C. M. Wang. 'Steganography using reversible texture Synthesis.' IEEE Transactions on Image Processing, vol. 24, no. 1, pp. 130-139, 2015. [Xie2008] X. Xie, T. Feng, and S. S., 'Style-learning with feature-based texture synthesis,' Computers in Entertainment, vol. 6, no. 4, article no. 25, 2008. [Xu2009] K. Xu, D. Cohen-Or, T. Ju, L. Liu, H. Zhang, S. Zhou, and Y. Xiong, 'Feature-aligned shape texturing,' ACM Transactions on Graphics, vol. 28, no. 5, pp. 1-7, 2009. [Yu2011] C. M. Yu, K. C. Wu, and C. M. Wang, 'A Distortion-free Data Hiding Scheme for High Dynamic Range Images,' Displays, vol.32 no. 5, pp. 225-236, 2011.
摘要: In this study we present two steganographic algorithms using texture synthesis and style transfer. The first algorithm we propose is a novel approach for steganography using a reversible texture synthesis. A texture synthesis process re-samples a smaller texture image which synthesizes a new texture image with a similar local appearance and arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages. In contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image and embeds secret messages through the process of texture synthesis. This allows us to extract secret messages and the source texture from a stego synthetic texture. Our approach offers three distinct advantages. First, our scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, a steganalytic algorithm is not likely to defeat our steganographic approach. Third, the reversible capability inherited from our scheme provides functionality which allows recovery of the source texture. Experimental results have verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source texture. The second algorithm we introduce is a steganographic algorithm that using constrained texture synthesis and style transfer. Given an original source texture and a target image or vector field, our scheme can produce a new stego synthetic image concealing secret messages. Our approach is the first steganographic method that uses the constrained texture synthesis and style transfer scheme to convey secret message. We recommend using the combinatorial number system to provide an efficient data embedding solution. Experimental results verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source texture. To best of our knowledge, these two algorithms are novel and are the first attempt of using the texture synthesis and style transfer techniques to achieve steganography.
本研究我們提出兩個使用材質合成與風格轉移的資訊隱藏演算法。第一個演算法是一利用可回復式材質合成來進行資訊隱藏的嶄新技術。材質合成是藉由將一個較小的紋理影像重新取樣,以合成一個任意尺寸的新紋理影像,同時與有與原本較小紋理影像有相似的特徵。我們修改材質合成的程序,使它能在合成過程中藏入秘密訊息。相較於利用已存在的媒體來隱藏訊息,我們的演算法在材質合成過程中把較小的來源材質與秘密訊息藏入,使我們可以從偽裝影像中取回來源材質與秘密訊息。我們的方法具有三個與眾不同的優勢,首先我們的訊息藏量與合成影像的尺寸成正比。再者,我們演算法不會被既有的資訊隱藏分析技術所偵測出。第三,我們的技術可以回復材質合成所用的來源材質。實驗結果顯示我們的方法既可以提供不同的訊息藏量,同時可以產生具有良好視覺品質的紋理圖像,並且可正確還原來源材質。 我們介紹的第二個演算法,是使用約束性材質合成與風格轉移的資訊隱藏演算法。給予一個原始來源材質,與一個目標影像或是向量場,我們的技術可以產生一個新的藏有秘密訊息之偽裝合成影像。我們的技術為首創使用約束性材質合成與風格轉移技巧來達成資訊隱藏的方法。我們亦推薦使用組合數字系統以提供一個高效率的資訊嵌入方案。實驗結果驗證了我們所提供的演算法可以提供多種資訊嵌入容量,並產生視覺上擬真的材質影像,並且可以回復來源材質。據我們所知,這兩個演算法具有新穎性,且為使用材質合成與風格轉移來達成資訊隱藏的首次嘗試。
URI: http://hdl.handle.net/11455/90735
其他識別: U0005-2408201506124500
文章公開時間: 2018-08-26
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.