Please use this identifier to cite or link to this item:
標題: 可適應性無失真資訊隱藏技術之研究
A Study on Adaptive Lossless Data Hiding Schemes
作者: 李志強
Lee, Chih-Chiang
關鍵字: lossless data hiding;無失真資訊隱藏;difference expansion;adaptive steganography;差值擴充;可適應性偽裝學
出版社: 資訊科學與工程學系所
引用: [1] A. M. Alattar, “Reversible Watermarking Using the Difference Expansion of A Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, pp. 1147-1156, 2004. [2] E. Besdok, “Hiding Information in Multispectral Spatial Images,” Journal of Electronics and Communications, Vol. 59, pp. 15-24, 2005. [3] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, pp. 585-595, 2002. [4] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Lossless Watermarking for Image Authentication: A New Framework and An Implementation,” IEEE Transactions on Image Processing, Vol. 15, pp. 1042-1049, 2006. [5] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, Vol. 14, pp. 253-266, 2005. [6] C. K. Chan, and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469-474, 2004. [7] C. C. Chang, and T. C. Lu, “A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images,” Journal of Systems and Software, Vol. 79, pp. 1754-1766, 2006 [8] C. C. Chang, and H. W. Tseng, “A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letter, Vol. 25, pp.1431-1437, 2004. [9] J. Dittmann, M. Steinebach, and L. C. Ferri, “Watermarking Protocols for Authentication and Ownership Protection Based on Timestamps and Holograms,” Proceedings of SPIE, no. 1, pp. 240-251, 2002. [10] S. Dumitrescu, and X. Wu, “A New Framework of LSB Steganalysis of Digital Media,” IEEE Transactions on Signal Processing, Vol. 53, pp.3936-3947, 2005. [11] J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding—New Paradigm in Digital Watermarking,” EURASIP Journal on Applied Signal Processing, Vol. 2002, No. 02, pp. 185-196, 2002. [12] J. Fridrich, M. Goljan, and R. Du, “Invertible Authentication,” Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, California, Vol. 3971, pp. 197-208, 2001. [13] F. Hartung, and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings of IEEE Special Issue on Protection of Multimedia Content, Vol. 87, pp. 1079-1107, 1999. [14] S. Lee, C. D. Yoo, and T. Kalker “Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform,” Transactions on Information Forensics and Security, Vol. 2, pp. 321-330, 2007. [15] L. Kamstra, and H. J. A. M. Heijmans, “Reversible Data Embedding into Images Using Wavelet Techniques and Sorting,” IEEE Transactions on Image Processing, Vol. 14, pp. 2082-2090, 2005. [16] A. D. Ker, “Steganalysis of LSB Matching in Grayscale Images,” IEEE Signal Processing Letters, Vol. 12, pp. 441-444, 2005. [17] R. L. Lagendijk, G. C. Langelaar, and I. Setyawan, “Watermarking Digital Image and Video Data,” IEEE Signal Processing Magazine, Vol. 17, pp. 20-46, 2000. [18] J. Tian, “Reversible Data Embedding Using A Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 890-896, 2003. [19] S. S. Maniccam, and N. G. Bourbakis, “Lossless Image Compression and Encryption Using SCAN,” Pattern Recognition, Vol. 34, pp. 1229-1245, 2001. [20] S.S. Maniccam, and N.G. Bourbakis, “Lossless Compression and Information Hiding in Images,” Pattern Recognition, Vol. 37, pp. 475-486, 2004. [21] L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, “Spread Spectrum Image Steganography,” IEEE Transactions on Image Processing, Vol. 8, pp. 1075-1083, 1999. [22] B. G. Mobasseri, and R. J. Berger, “A Foundation for Watermarking in Compressed Domain,” IEEE Signal Processing Letters, Vol. 12, pp. 399-402, 2005. [23] Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, pp. 354-361, 2006. [24] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data Embedding and Watermarking Technologies,” Proceedings of the IEEE, Vol. 86, pp. 1064-1087, 1998. [25] C. C. Lin, and N. L. Hsueh “A Lossless Data Hiding Scheme Based on Three-pixel Block Differences,” Pattern Recognition, Vol. 41, pp. 1415-1425, 2008. [26] C. L. Tsai, H. F. Chiang, K. C. Fan, and C. D. Chung, “Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-wise Logical Computation Mechanism,” Pattern Recognition, Vol. 38, pp. 1993-2006, 2005. [27] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A Secure Data Hiding Scheme for Binary Images,” IEEE Transactions on Communications, Vol. 50, pp.1227-1231, 2002. [28] C. H. Tzeng, and W. H. Tsai, “A Combined Approach to Integrity Protection and Verification of Palette Images Using Fragile Watermarks and Digital Signatures,” IEICE Transactions Fundamentals, Vol. E87-A, pp.1612-1619, 2004. [29] C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping with Security Protection,” IEEE Transactions on Communications, Vol. 52, pp.791-800, 2004. [30] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management,” IEEE Transactions on Multimedia, Vol. 5, pp. 97-105, 2003. [31] D. C. Wu, and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, pp.1613-1626, 2003. [32] M. Y. Wu, Y. K. Ho, and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters, Vol. 25, pp.301-309, 2004. [33] X. Zhang, and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, pp.67-70, 2005. [34] H. L. Jin, “Lossless Data Hiding in the Spatial Domain for High Quality Images,” IEICE Transactions on Fundamentals, Vol. E90-A, pp. 771-777, 2007. [35] [ISO/IEC97] ISOiIEC JTC 29/WG1 FCD 14495 public draft, “JPEG-LS: Lossless and Near-lossless Coding of Continuous-Tone Still Images,” Jul. 1997. [36] Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, “Robust Lossless Image Data Hiding,” Proceedings of IEEE International Conference on Multimedia and Expo, Vol. 3, pp. 2199-2202, 2004. [37] X. Zhang, and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, Vol. 10, pp.781-783, 2006. [38] F. A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, “Information Hiding - A Survey,” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Vol. 87, pp. 1062-1078, 1999. [39] C. K. Chan, and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469-474, 2004. [40] C. Chang, and C. Lin, LIBSVM: a library for support vector machines, 2001, Software available at [41] D. C. Lou and J. L. Liu, “Steganographic Method for Secure Communications,” Computer Security, Vol.21, pp. 449-460, 2002. [42] C. M. Wang, N. I Wu, C. S. Tsai, and M. S. Hwang, “A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function,” The Journal of Systems and Software, Vol. 81, pp. 150-158, 2008. [43] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recovery of An Original Image Containing Embedded Data,” U.S. Patent #6278791, 2001. [44] X. Zhang, and S. Wang, “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, pp. 331-339, 2004. [45] C. C. Thien, and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, pp. 2875-2881, 2004. [46] J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Grayscale and Color Images,” Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, pp. 27-30, 2001. [47] S. Lyu, and H. Farid, “Steganalysis Using Higher-Order Image Statistics,” IEEE Transactions on Information Forensics and Security, Vol. 1, pp. 111-119, 2006. [48] S. Lyu, and H. Farid, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines,” 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, Vol. 2578, pp.340-354, 2002.

Due to the fast development of scientific technologies, cryptography has been widely used for information security. However, the using of cryptography is easy to be detected. Nowadays, the popular application of multi-media and transmission via network, the data hiding technologies have been widely applied for information protection, data monitoring and tracking, copyright protection, and source authentication. Traditional information/data hiding methods, which are ways to embed additional messages into host signals, have been applied to accomplish content protection and secret communication. The embedding process has to modify the original contents of cover signal without introducing perceptual changes, but some permanent destroy result from the modifications. Lossless data hiding scheme can have the cover image come back to its old self again without leaving any trace of distortion after the secret message or data extraction.
Firstly, in this thesis, two novel lossless data hiding schemes have been proposed. Unlike the fixed hiding capacity each pixel provides in most of the currently available lossless data hiding approaches, the proposed first method utilizes a block-based lossless data embedding algorithm where the quantity of the hidden information each block bears is variable. Due to the fact that schemes with difference expansion tend to damage the image quality seriously in the edge areas, in the proposed schemes, smoother areas are chosen to conceal more secret bits. Therefore, we proposed a block-based centralized difference expansion technique to determine the capacity of each block. In addition, the location map is needed in most lossless data hiding schemes with difference expansion. Next, another lossless data hiding scheme with edge prediction and difference expansion without additional location map is proposed in the second scheme. This way, a better balance can be reached between the embedding ratio and the stego-image quality. Experimental results show that the proposed lossless data hiding schemes produce the stego-image with high quality after data embedding. In addition, the recovered image is same as the original image after data extracting phase. In conclusion, these two schemes are feasible to offer a safe and efficient approach for multimedia transmission on the Internet.
Most of data hiding techniques suffer from the problem of trade-off between payload and image distortion. Finally, in this thesis, a novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The diamond encoding method determines the diamond-shaped size based on the payload of hidden messages. Therefore, the information hiding scheme with diamond encoding can hide a large amount of information in a cover image with little distortion.
其他識別: U0005-2507200914345600
Appears in Collections:資訊科學與工程學系所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.