Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19888
標題: 基於調整式矩陣之資訊隱藏技術
An Information Hiding Technique Based on Adjusted Matrix
作者: 許睿中 
Hsu, Jui-Chung 
關鍵字: 資訊隱藏;藏密學;統計;人類視覺系統
出版社: 資訊科學與工程學系所
引用: [1] C. H. Yang, C. Y. Weng and S. J. Wang and H. M. Su, “Varied PVD + LSB evading detection programs to spatial domain in data embedding systems,” The journal of systems and software., vol. 83, issue 10, pp.1635-1643, 2010. [2] C. C. Chang, H. W. Tseng, “A steganographic method for digital images using side match,” Pattern recognition letters, vol. 25, no. 12, pp. 1431–1437, 2004. [3] C. M. Wang, N. I. Wu and C. S. Tsai and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,” The journal of systems and software, vol. 81, no 12, pp. 150-158, 2008. [4] C. N. Lin, D. J. Buehrer and C. C. Chang and T. C. Lu, “Using quad smoothness to efficiently control capacity-distortion of reversible data hiding,” The journal of systems and software, vol. 83, issue 10, pp. 1805-1812, 2010. [5] C. K. Chan, L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern recognition, vol. 37, no. 3, pp. 469–474, 2004. [6] C. H. Yang, C. Y. Weng and S. J. Wang, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE transactions on information forensics and security, vol. 3, no. 3, pp. 488 – 497, 2008. [7] C. H. Yang, C. Y. Weng and H. K. Tso and S. J. Wang, “A data hiding scheme using the varieties of pixel-value differencing in multimedia images,” The journal of systems and software, vol. 84, no. 4, pp. 669-678, 2011. [8] C. C. Chang, Y. C. Chou and T. D. Kieu, “An information hiding scheme using sudoku,” Proceedings of the third international conference on innovative computing, information and control (ICICIC2008), pp. 17-21, 2008. [9] C. F. Lee, H. L. Chen, “A novel data hiding scheme based on modulus function,” The journal of systems and software, vol. 83, issue 5, pp. 832-843, 2011. [10] C. T. Hsu, J. L. Wu, “Hidden digital watermarks in images,” IEEE transactions on image processing, vol. 8, no. 1, 1999. [11] D. C. Wu, W. H. Tsai, “A steganographic method for image by pixel-value differencing,” Pattern recognition letters, vol. 24, issue 9-10, pp. 1613-1626, 2003. [12] H. C. Wu, N. I. Wu and C. S. Tsai and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEEE proceedings –vision image and signal processing., vol. 152, issue 5, pp.611-615, 2005. [13] H. Liu, J. Liu and J. Huang and D. Huang and S. Y.Q., “A robust DWT-based blind data hiding algorithm,” Circuits and system, 2002. ISCAS, vol. 2, pp. 672-675, 2012. [14] H. B. Kekre, A. Athawale and P. N.Halarnkar, “Increased capacity of information hiding in LSB’s method for text and image,” International journal of electrical, computer and systems engineering, vol. 2, no. 4, 2008. [15] J. Tian, “Reversible data embedding using a difference expansion,” IEEE transactions on circuits and systems for video technology, vol. 13, no. 8, pp. 890–896, 2003. [16] J. Mielkainen, “LSB matching revisited,” IEEE signal processing letters, vol. 13, no. 5, pp. 285-287, 2006. [17] L. Luo, Z. Chen and M. Chen and X. Zeng and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE transactions on information forensics and security, vol. 5, no. 1, 2010. [18] L. Kamstra, S. Member and H. J. A. M. Heijmans, “Reversible data embedding Into images using wavelet techniques and sorting,” IEEE transactions on image processing, vol. 14, no. 12, 2005. [19] M. Ramkumar, A. N. Akansu and A. A. Alatan, “A robust data hiding scheme for images using DFT,” IEEE ICIP, vol. 2, p.p. 211-215, 1999. [20] N. Ahmed, T. Natarajan and K. R. Rao, “Discrete cosine transform,” IEEE transactions on computers, c-23, Issue 1, p.p. 90-93, 1974. [21] P. Tsai, Y. C. Hu and H. L. Yeh, ”Reversible image hiding scheme using predictive coding and histogram shifting,” Signal processing, vol. 89, no 6, pp. 1129-1143, 2009. [22] P. Tsai, Y. C. Hu and H. L. Yeh, ”Reversible image hiding scheme using predictive coding and histogram shifting,” Signal processing, vol. 89, no 6, pp. 1129-1143, 2009. [23] S. W. Jung, L. T. Ha and S. J. Ko, “A new histogram modification based reversible data hiding algorithm considering the human visual system,” IEEE signal processing letters, vol. 18, no. 2, 2011. [24] T. S. Chen, C. C. Chang and M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE transactions on image processing, vol. 7, no. 10, pp. 1485-1488, 1998. [25] T. D. Kieu, Z. H. Wang and C. C. Chang and M.-C. Li, “A Sudoku based wet paper hiding scheme,” International journal of smart home, vol. 3, no. 2, pp. 1-12, 2009. [26] W. Hong, T. S. Chen and C. W. Shiu, “A minimal euclidean distance searching technique for sudoku steganography,” Proceedings of international symposium on information science and engineering, vol. 1, pp. 515-518, 2008. [27] W. Hong, T. S. Chen and C. W. Shiu, “Steganography using Sudoku revisited,” Proceedings of 2008 international symposium on intelligent information technology application, vol. 2, pp. 935-939, 2008. [28] W. Hong, T. S. Chen and C. W. Luo, “Data embedding using pixel value differencing and diamond encoding with multiple-base notational system,” The journal of systems and software, vol. 85, no. 5, pp. 1166-1175, 2012. [29] W. Hong, T. S. Chen and C. W. Shiu, “Reversible data hiding for high quality images using modification of prediction errors,” The journal of systems and software, vol. 82, no. 11, pp.1833-1842, 2009. [30] W. Hong, T. S. Chen, “Reversible data hiding for high quality images interpolation and reference pixel distribution mechanism,” Journal of visual communication and Image representation, vol. 22, no. 3, pp.133-140, 2011. [31] W. Hong, T. S. Chen, “Reversible data hiding for high quality images interpolation and reference pixel distribution mechanism,” Journal of visual communication and Image representation, vol. 22, no. 3, pp.133-140, 2011. [32] Q. M. Ai-Qershi, B. E. Khoo, “High capacity data hiding schemes for medical images based on difference expansion,” The journal of systems and software, vol. 84, issue 1, pp. 105-112, 2011. [33] Z. Ni, Y. Q. Shi and N. Ansari and W. Su, “Reversible data hiding,” IEEE transactions on circuits and systems for video technology, vol. 16, no 3, pp. 354-362, 2006. [34] 張真誠,黃國峰,陳同孝,"電子影像技術",旗標出版股份有限公司,民國九十二年三月,2003. [35] 曹憲中, “植基於調整亂數之資訊隱藏技術”, 中興大學資訊科學與工程學系碩士學位論文, 民國99年6月, 2010.
摘要: 
一般我們所藏匿的機密訊息,都在已知機密訊息的情況下進行藏匿動作。因此,本篇論文提出了將所要藏匿的機密訊息與掩護影像內相鄰像素值對應到參考矩陣上的位置等進行統計,產生最符合該張掩護影像及機密訊息的參考矩陣,使得在機密訊息嵌入的過程中,相鄰像素值能夠以最小的位移尋找到所要藏匿的機密訊息,嵌入得更有效率,並且藏完後做適當的調整動作,減少像素值的位移。實驗結果中我們將所提出的方法和Chang等學者的方法與Tsao的方法進行比較,結果顯示本篇論文擁有較好的影像品質,且在空間利用度上也較省。也將我們所提出的方法在基於人類視覺系統(Human Visual System, HVS)概念下和Wu和Tsai學者的方法及Yang學者的方法進行比較,結果顯示本篇論文仍有較高的影像品質,且也保有高載量。因此本篇論文成功的使用統計的方式對相鄰像素值及機密訊息產生嵌入時所使用的參考矩陣,且在影像品質及載量上皆高於傳統的藏密技術。

Conventional hiding secret data is under the assumption where the secret data have been known before hiding. In this thesis, we propose a novel approach that makes use of the statistic information of the secret data and the cover image. Through the statistic results, we produce a reference matrix which is the most suitable with respect to the cover image and the hiding secret data. Such a reference matrix makes the neighboring pixel values successfully find the hiding secret data in the shortest offsets. Consequently, we could embed secret data in a more efficient way. With a series adjustment processes, we could further reduce offsets of pixel values. Compared to the approaches proposed by Chang and Tsao, the experimental results show that the approach proposed in this thesis has better image quality and with smaller space on reference matrices. We also compare Wu and Tsai''s approach and Yang''s approach with our approach by Human Visual System (HVS), and then find this approach has better image quality and higher capacity as well.
URI: http://hdl.handle.net/11455/19888
Appears in Collections:資訊科學與工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.