Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19653
標題: 可適應性無失真資訊隱藏技術之研究
A Study on Adaptive Lossless Data Hiding Schemes
作者: 李志強
Lee, Chih-Chiang
關鍵字: lossless data hiding;無失真資訊隱藏;difference expansion;adaptive steganography;差值擴充;可適應性偽裝學
出版社: 資訊科學與工程學系所
引用: [1] A. M. Alattar, “Reversible Watermarking Using the Difference Expansion of A Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, pp. 1147-1156, 2004. [2] E. Besdok, “Hiding Information in Multispectral Spatial Images,” Journal of Electronics and Communications, Vol. 59, pp. 15-24, 2005. [3] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, pp. 585-595, 2002. [4] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Lossless Watermarking for Image Authentication: A New Framework and An Implementation,” IEEE Transactions on Image Processing, Vol. 15, pp. 1042-1049, 2006. [5] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, Vol. 14, pp. 253-266, 2005. [6] C. K. Chan, and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469-474, 2004. [7] C. C. Chang, and T. C. Lu, “A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images,” Journal of Systems and Software, Vol. 79, pp. 1754-1766, 2006 [8] C. C. Chang, and H. W. Tseng, “A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letter, Vol. 25, pp.1431-1437, 2004. [9] J. Dittmann, M. Steinebach, and L. C. Ferri, “Watermarking Protocols for Authentication and Ownership Protection Based on Timestamps and Holograms,” Proceedings of SPIE, no. 1, pp. 240-251, 2002. [10] S. Dumitrescu, and X. Wu, “A New Framework of LSB Steganalysis of Digital Media,” IEEE Transactions on Signal Processing, Vol. 53, pp.3936-3947, 2005. [11] J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding—New Paradigm in Digital Watermarking,” EURASIP Journal on Applied Signal Processing, Vol. 2002, No. 02, pp. 185-196, 2002. [12] J. Fridrich, M. Goljan, and R. Du, “Invertible Authentication,” Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, California, Vol. 3971, pp. 197-208, 2001. [13] F. Hartung, and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings of IEEE Special Issue on Protection of Multimedia Content, Vol. 87, pp. 1079-1107, 1999. [14] S. Lee, C. D. Yoo, and T. Kalker “Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform,” Transactions on Information Forensics and Security, Vol. 2, pp. 321-330, 2007. [15] L. Kamstra, and H. J. A. M. Heijmans, “Reversible Data Embedding into Images Using Wavelet Techniques and Sorting,” IEEE Transactions on Image Processing, Vol. 14, pp. 2082-2090, 2005. [16] A. D. Ker, “Steganalysis of LSB Matching in Grayscale Images,” IEEE Signal Processing Letters, Vol. 12, pp. 441-444, 2005. [17] R. L. Lagendijk, G. C. Langelaar, and I. Setyawan, “Watermarking Digital Image and Video Data,” IEEE Signal Processing Magazine, Vol. 17, pp. 20-46, 2000. [18] J. Tian, “Reversible Data Embedding Using A Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 890-896, 2003. [19] S. S. Maniccam, and N. G. Bourbakis, “Lossless Image Compression and Encryption Using SCAN,” Pattern Recognition, Vol. 34, pp. 1229-1245, 2001. [20] S.S. Maniccam, and N.G. Bourbakis, “Lossless Compression and Information Hiding in Images,” Pattern Recognition, Vol. 37, pp. 475-486, 2004. [21] L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, “Spread Spectrum Image Steganography,” IEEE Transactions on Image Processing, Vol. 8, pp. 1075-1083, 1999. [22] B. G. Mobasseri, and R. J. Berger, “A Foundation for Watermarking in Compressed Domain,” IEEE Signal Processing Letters, Vol. 12, pp. 399-402, 2005. [23] Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, pp. 354-361, 2006. [24] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data Embedding and Watermarking Technologies,” Proceedings of the IEEE, Vol. 86, pp. 1064-1087, 1998. [25] C. C. Lin, and N. L. Hsueh “A Lossless Data Hiding Scheme Based on Three-pixel Block Differences,” Pattern Recognition, Vol. 41, pp. 1415-1425, 2008. [26] C. L. Tsai, H. F. Chiang, K. C. Fan, and C. D. Chung, “Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-wise Logical Computation Mechanism,” Pattern Recognition, Vol. 38, pp. 1993-2006, 2005. [27] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A Secure Data Hiding Scheme for Binary Images,” IEEE Transactions on Communications, Vol. 50, pp.1227-1231, 2002. [28] C. H. Tzeng, and W. H. Tsai, “A Combined Approach to Integrity Protection and Verification of Palette Images Using Fragile Watermarks and Digital Signatures,” IEICE Transactions Fundamentals, Vol. E87-A, pp.1612-1619, 2004. [29] C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping with Security Protection,” IEEE Transactions on Communications, Vol. 52, pp.791-800, 2004. [30] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management,” IEEE Transactions on Multimedia, Vol. 5, pp. 97-105, 2003. [31] D. C. Wu, and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, pp.1613-1626, 2003. [32] M. Y. Wu, Y. K. Ho, and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters, Vol. 25, pp.301-309, 2004. [33] X. Zhang, and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, pp.67-70, 2005. [34] H. L. Jin, “Lossless Data Hiding in the Spatial Domain for High Quality Images,” IEICE Transactions on Fundamentals, Vol. E90-A, pp. 771-777, 2007. [35] [ISO/IEC97] ISOiIEC JTC 29/WG1 FCD 14495 public draft, “JPEG-LS: Lossless and Near-lossless Coding of Continuous-Tone Still Images,” Jul. 1997. [36] Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, “Robust Lossless Image Data Hiding,” Proceedings of IEEE International Conference on Multimedia and Expo, Vol. 3, pp. 2199-2202, 2004. [37] X. Zhang, and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, Vol. 10, pp.781-783, 2006. [38] F. A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, “Information Hiding - A Survey,” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Vol. 87, pp. 1062-1078, 1999. [39] C. K. Chan, and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469-474, 2004. [40] C. Chang, and C. Lin, LIBSVM: a library for support vector machines, 2001, Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm/. [41] D. C. Lou and J. L. Liu, “Steganographic Method for Secure Communications,” Computer Security, Vol.21, pp. 449-460, 2002. [42] C. M. Wang, N. I Wu, C. S. Tsai, and M. S. Hwang, “A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function,” The Journal of Systems and Software, Vol. 81, pp. 150-158, 2008. [43] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recovery of An Original Image Containing Embedded Data,” U.S. Patent #6278791, 2001. [44] X. Zhang, and S. Wang, “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, pp. 331-339, 2004. [45] C. C. Thien, and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, pp. 2875-2881, 2004. [46] J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Grayscale and Color Images,” Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, pp. 27-30, 2001. [47] S. Lyu, and H. Farid, “Steganalysis Using Higher-Order Image Statistics,” IEEE Transactions on Information Forensics and Security, Vol. 1, pp. 111-119, 2006. [48] S. Lyu, and H. Farid, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines,” 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, Vol. 2578, pp.340-354, 2002.
摘要: 
由於科技的快速發展,經由網際網路傳遞的多媒體影音資訊與日俱增。然而,在網路所傳輸之資訊非常注重其安全度。近年來專家學者們陸續提出了新的研究成果,其中資訊隱藏技術,為資訊加密注入了新的契機,經由一張普遍使用的影像,不破壞影像原來的視覺品質,將額外的訊息或資料嵌入掩護影像中,達到機密通訊或版權保護的目的。由於嵌入過程一定會修改到原本的掩護媒體,造成一些永久性的破壞,而無失真資訊隱藏技術可以在取出訊息和資料後,將偽裝前的原始掩護影像完全無任何失真地還原回來。
本論文提出兩種具有可適應性的無失真資訊隱藏,相較於目前大部分的無失真資訊隱藏方法,每個像素的隱藏容量都是固定的,本論文所提出的第一個技術讓每個像素的隱藏容量是可變動的,根據我們的研究,差值擴充技術在邊緣地區會造成影像品質很嚴重的破壞,所以不適合藏入大量資料,而平滑地區可以被藏入較多的資訊量,因此,我們提出區塊式中央差值擴充技術來決定每一個區塊的隱藏量。另外,目前大部分以差值擴充技術為基礎的方法都需要記錄地圖資訊,而像素預測的方式可以解決此一額外資訊的浪費,所提出的第二個技術就是利用周圍像素的變異數來預測可隱藏容量,如此可同時降低失真程度與增加隱藏容量,偽裝後的影像品質與藏入的資訊量也可以達到一個較好的結果。實驗結果顯示,本研究所提的演算法在藏入資訊後,偽裝影像具有優異的視覺品質,而且還原後的影像具有無失真的特性,為多媒體資訊在網路傳輸上提供了安全而有效率的機制。
資料隱藏技術主要追求的目標為:資訊藏量要大,同時,偽裝隱蔽物的影像品質要好。然而,資訊藏量與偽裝隱蔽物影像品質是很難取捨的問題,因此本論文最後提出一個可根據藏入資料量大小,決定最佳影像品質的菱形編碼技術,如此可在資訊藏量與影像品質中取得一個最佳平衡。

Due to the fast development of scientific technologies, cryptography has been widely used for information security. However, the using of cryptography is easy to be detected. Nowadays, the popular application of multi-media and transmission via network, the data hiding technologies have been widely applied for information protection, data monitoring and tracking, copyright protection, and source authentication. Traditional information/data hiding methods, which are ways to embed additional messages into host signals, have been applied to accomplish content protection and secret communication. The embedding process has to modify the original contents of cover signal without introducing perceptual changes, but some permanent destroy result from the modifications. Lossless data hiding scheme can have the cover image come back to its old self again without leaving any trace of distortion after the secret message or data extraction.
Firstly, in this thesis, two novel lossless data hiding schemes have been proposed. Unlike the fixed hiding capacity each pixel provides in most of the currently available lossless data hiding approaches, the proposed first method utilizes a block-based lossless data embedding algorithm where the quantity of the hidden information each block bears is variable. Due to the fact that schemes with difference expansion tend to damage the image quality seriously in the edge areas, in the proposed schemes, smoother areas are chosen to conceal more secret bits. Therefore, we proposed a block-based centralized difference expansion technique to determine the capacity of each block. In addition, the location map is needed in most lossless data hiding schemes with difference expansion. Next, another lossless data hiding scheme with edge prediction and difference expansion without additional location map is proposed in the second scheme. This way, a better balance can be reached between the embedding ratio and the stego-image quality. Experimental results show that the proposed lossless data hiding schemes produce the stego-image with high quality after data embedding. In addition, the recovered image is same as the original image after data extracting phase. In conclusion, these two schemes are feasible to offer a safe and efficient approach for multimedia transmission on the Internet.
Most of data hiding techniques suffer from the problem of trade-off between payload and image distortion. Finally, in this thesis, a novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The diamond encoding method determines the diamond-shaped size based on the payload of hidden messages. Therefore, the information hiding scheme with diamond encoding can hide a large amount of information in a cover image with little distortion.
URI: http://hdl.handle.net/11455/19653
其他識別: U0005-2507200914345600
Appears in Collections:資訊科學與工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.