Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19531
標題: 調色盤影像驗證技術與無失真資料隱藏技術之研究
A Study on Image Authentication and Lossless Data Hiding for Color Palette Images
作者: 黃靜慧
Huang, Ching-Hui
關鍵字: lossless data hiding;可還原式資訊隱藏;difference expansion;color palette images;fragile watermarking;image authentication;clustering analysis;差值擴充;調色盤影像;易碎型浮水印;影像驗證;叢聚分析
出版社: 資訊科學與工程學系所
引用: [1] Alatter, A. M., “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, Vol. 13, pp. 1147-1156, 2004. [2] Bao, F., Deng, R. H., Ooi, B. C., and Yang, Y., “Tailored reversible watermarking schemes for authentication of electronic clinical atlas,” IEEE Transactions on Information Technology in Biomedicine, Vol. 9, pp. 554-563, 2005. [3] Celik, M. U., Sharma, G., Tekalp, A. M., and Saber, E., “Lossless generalized-LSB data embedding,” IEEE Transactions on Image Processing, Vol. 14, pp. 253-266, 2005. [4] Celik, M. U., Sharma, G., Tekalp, A. M., and Saber, E., “Reversible data hiding,” in Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 157-160, 2002. [5] Chan, C. K. and Cheng, L. M., “Hiding data in images by simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469-474, 2004. [6] Chang, C. C. and Lu, T. C., “A difference expansion oriented data hiding scheme for restoring the original host image,” The Journal of Systems and Software, Vol. 79, pp. 1754-1766, 2006. [7] Chang, C. C., Hsiao, J. Y., and Chan, C. S., “Finding optimal least significant bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, Vol. 36, pp. 1583-1595, 2003. [8] Chang, C. C., Huang, K. F., and Chen, T. S., Electronic Imaging Techniques, Flag Information Co. Ltd., Taiwan, 2000 (in Chinese). [9] Chen, T. S., Chang, C. C., and Huang, K. F., Digital Image Processing Techniques, Flag Information Co. Ltd. Taiwan, 2001 (in Chinese). [10] Chen, W. C. and Wang, M. S., “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication,” Expert Systems with Applications, 2008. [11] Fridrich, J., Applications of data hiding in digital images, Tutorial for the ISSPA'99, Brisbane, Australia, 1999. [12] Fridrich, J., “A new steganographic method for palette based images,” in Proceedings of the IS&T PICS conference, Vol. 25-28, pp. 285-289, 1999. [13] Fridrich, J., “Security of fragile authentication watermarks with localization,” in Proceedings of SPIE Security and Watermarking of Multimedia Contents, pp. 691-700, 2002. [14] Fridrich, J., Baldoza, A. C., and Simard, R. J., “Robust digital watermarking based on key-dependent basis functions,” in Proceedings of the 2nd Information Hiding Workshop, LNCS, Vol. 1525, pp. 143-157, 1998. [15] Fridrich, J., Goljan, M., and Du, R., “Invertible authentication watermark for JEPG images,” in Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Content, San Jose, CA, pp. 223-227, 2001. [16] Fridrich, J., Goljan, M., and Du, R., “Lossless data embedding-new paradigm in digital watermarking,” EURASIP Journal on Applied Signal Processing, pp. 185-196, 2002. [17] Fridrich, J., Memon, N., and Goljan, M., “Further attacks on yeung-mintzer fragile watermarking Scheme,” in Proceedings of SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, pp. 428-437, 2000. [18] Huang, H. C., Wang, F. H., and Pan, J. S., “A VQ-based robust multi- watermarking algorithm,” IEICE Transactions on Fundamentals, Vol. E85-A (7), pp. 1719-1726, 2002. [19] Jin, H. L., “Lossless data hiding in the spatial domain for high quality images,” IEICE Transactions on Fundamentals, Vol. E90-A, pp. 771-777, 2007. [20] Joy, G. and Xiang, Z., “Center-cut for color-image quantization,” The Visual Computer, Vol. 10, Issue 1, pp. 62-66, 1993. [21] Lai, J. Z. C. and Liaw, Y. C. “A novel approach of reordering color palette for indexed image compression,” IEEE Signal Processing Letters, Vol. 14, pp. 117-120, 2007. [22] Lee, C. C., Wu, H. C., Tsai, C. S., and Chu, Y. P. “Adaptive lossless steganographic scheme with centralized difference expansion,” Pattern Recognition, Vol. 41, pp. 2097-2106, 2008. [23] Li, C. T., “Digital fragile watermarking scheme for authentication of JPEG images,” IEE Proceedings on Vision, Image, and Signal Processing, Vol. 151, Issue 6, pp. 460-466, 2004. [24] Liu, H., Zhang, Z., Huang, J., Huang, X., and Shi, Y. Q., “A high capacity distortion-free data hiding algorithm for palette image,” in Proceedings of the ISCAS, Vol. 2, pp. II-916-919, 2003. [25] Lu, Z. M., Pan, J. S., and Sun, S. H., “VQ-based digital image watermarking method,” Electronics Letters, Vol. 36 (14), pp. 1201-1202, 2000. [26] Machado, R., EZ stego, stego online, stego, available at http://www.stego.com, 1997. [27] Ni, Z., Shi, Y. Q., Ansari, N., and Su, W., “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, pp 354-362, 2006. [28] Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Information hiding-A survey,” in Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 87 (7), pp. 1062-1078, 1999. [29] Pinho, A. J. and Neves, A. J. R., “On the relation between Memon's and the modified Zeng's palette reordering methods,” Image and Vision Computing, Vol. 24, pp. 534-540, 2006. [30] Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B. S., and Chandrasekaran, S., “Robust image-adaptive data hiding using erasure and error correction,” IEEE Transactions on Image Processing, Vol. 13 (12), pp. 1627-1639, 2004. [31] Tian, J., “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 831-841, 2003. [32] Tzeng, C. H., Yang, Z. F., and Tsai, W. H., “Adaptive data hiding in palette images by color ordering and mapping with security protection,” IEEE Transactions on Communications, Vol. 52, Issue 5, pp. 791-800, 2004. [33] Wang, S. J., Ke, H. J., and ICCL (Information Cryptology and Construction Lab.), Cryptography and network security- development, theory & applications, Dr. Master Book Inc., 2004 (in Chinese). [34] Wu, H. C. and Chang, C. C., “Embedding invisible watermarks into digital images based on side-match vector quantization,” Fundamental Informaticae, Vol. 63, Issue 1, pp. 1001-1017, 2004. [35] Wu, M. Y., Ho, Y. K., and Lee, J. H., “An iterative method of palette-based image steganography,” Pattern Recognition Letters, Vol. 25, pp.301-309, 2004. [36] Wu, Y. T. and Shih, F. Y., “An adjusted-purpose digital watermarking technique,” Pattern Recognition, Vol. 37, pp. 2349- 2359, 2004. [37] Yu, Y. H., Chang, C. C., and Lin, I. C.,“A new steganographic method for color and grayscale image hiding,” Computer Vision and Image Understanding, Vol. 107, pp. 183-194, 2007. [38] Yu, P. T., Tsai, H. H., and Lin, J. S., “Digital watermarking based on neural networks for color image,” Signal Processing, Vol. 81, pp. 663-671, 2001.
摘要: 
本論文主要研究數位影像的隱藏技術與驗證技術,將資料驗證與資料隱藏技術應用於調色盤影像中以達到保護影像內容與秘密通訊的目的。
本論文所提出的第一個技術是基於調色盤影像之數位浮水印技術,用以保護影像內容的完整性。首先針對調色盤的特性進行分群處理,接著,將影像予以區塊化,並計算出其特徵值,以作為驗證資訊。其後,再以最小位元取代方式(LSB substitution),將驗證資訊藏匿在被保護影像的每個像素索引值(index)的最後位元中。最後,利用同群內最接近的顏色來取代已被藏入特徵浮水印的索引值,即完成浮水印的嵌入動作。此技術能大幅提高已嵌入浮水印影像之視覺品質並降低其失真程度。當接收方收到嵌入浮水印之影像時,可以藉由取出特徵值比對來驗證得知是否該影像遭受篡改,並可得知被篡改的位置,達成驗證影像正確性之目的。
本論文所提的第二個技術為資料隱藏技術,亦即將機密訊息隱藏在數位影像中,以達到秘密通訊的目的。此技術是植基於調色盤影像之壓縮技術所發展,其特性為無失真且高隱藏量。運用差值擴張 (Difference Expansion) 技巧並透過預測方法,將秘密訊息藏於調色盤的索引中。如此不僅可提高資訊隱藏量,在取出秘密訊息的同時,亦可還原偽裝影像成為原始的掩護影像。本技術大幅改善調色盤影像在嵌入資訊後,具有高失真程度的缺失。
實驗結果顯示,本研究所提的演算法在藏入資訊後,偽裝影像具有優異的視覺品質。此外,影像經嵌入浮水印後,對影像做驗證的處理時,具有高度的準確性,為多媒體資訊在網路傳輸上提供了安全而有效率的機制。
URI: http://hdl.handle.net/11455/19531
其他識別: U0005-1408200813510000
Appears in Collections:資訊科學與工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.