Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19973
標題: 具最佳化特性之可適應性資訊隱藏演算法
A Study of Optimal Adaptive Data Hiding Algorithms
作者: 江翔宇
Jiang, Siang-Yu
關鍵字: 可適應性嵌入;adaptive embedding;最佳化;多基底方法;藏密學;灰階/彩色影像;高動態範圍影像;視覺差異預測器;optimization;multiple base method;steganography;grayscale/color images;high dynamic range images;visual difference predictor
出版社: 資訊科學與工程學系所
引用: [Ashi2002]M. Ashikhmin, “A Tone Mapping Algorithm for High Contrast Images,” in Proceedings of the 13th Eurographics Workshop on Rendering, pp. 145-156, 2002. [Bant2006]F. Banterle, P. Ledda, K. Debattista, and A. Chalmers, “Inverse Tone Mapping,” in Proceedings of the Fourth International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia (GRAPHITE ''06), ACM New York, pp. 349-356, 2006. [Boga2003]R. Bogart, F. Kainz, and D. Hess, “The OpenEXR File Format,” Siggraph 2003 Technical Sketch, 2003 (See also http://www.openexr.com). [Borg2008]P. Borges, J. Mayer, and E. Izquierdo, “Robust and Transparent Color Modulation for Text Data Hiding,” IEEE Transactions on Multimedia, Vol. 10, No. 8, pp. 1479-1489, December, 2008. [Čadi2005]M. Čadík and P. Slavík, “The Naturalness of Reproduced High Dynamic Range Images,” in Proceedings of the Ninth International Conference on Information Visualization, pp. 920-925, 2005. [Čadi2006]M. Čadík, M. Wimmer, L. Neumann, and A. Artusi, “Image Attributes and Quality for Evaluation of Tone Mapping Operators,” in Proceedings of Pacific Graphics 2006 (14th Pacific Conference on Computer Graphics and Applications), pp. 35-44, 2006. [Chan2004a]C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition Letters, Vol. 37, No. 3, pp. 469-474, 2004. [Chan2004b]C. C. Chang and H. W. Tseng, “A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letters, No. 25, pp. 1431-1437, 2004. [Chao2009]M. W. Chao, C. H. Lin, C. W. Yu, and T. Y. Lee, “A High Capacity 3D Steganography Algorithm,” IEEE Transactions on Visualization and Computer Graphics, Vol. 15, No. 3, pp. 274-284, March 2009. [Ched2010]A. Cheddad, J. Condell, K. Curran, and P. McKevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, Vol. 90, No. 3, pp. 727-752, 2010. [Chen2009]Y. T. Cheng and C. M. Wang, Adaptive Steganographic Algorithms for Grayscale and High Dynamic Range Images Based on Pixel-Value Differencing, Master Thesis, Department of Computer Science and Engineering, National Chung Hsing University, Taiwan, 2009. [Chva1983]V. Chvatal, Linear Programming, First Edition, W.H. Freeman & Company, New York, 1983. [Egia2006]K. Egiazarian, J. Astola, N. Ponomarenko, V. Lukin, F. Battisti, and M. Carli, “New Full-reference Quality Metrics Based on HVS,” CD-ROM Proceedings of the Second International Workshop on Video Processing and Quality Metrics, Scottsdale, USA, 2006. [Fatt2002]R. Fattal, D. Lischinski, and M. Werman, “Gradient Domain High Dynamic Range Compression,” ACM Transactions on Graphics (Proceedings of ACM SIGGRAPH, 2002), Vol. 21, No. 3, pp. 249-256, 2002. [Ge2008]L. M. Ge, N. I. Wu, and C. M. Wang, An Adaptive Steganographic Algorithm for High Dynamic Range Images, Master Thesis, Department of Computer Science and Engineering, National Chung Hsing University, Taiwan, 2008. [Gonz2008]R. C. Gonzalez and R. E. Woods, Digital Image Processing, Third Edition, Pearson Prentice Hall, Upper Saddle River, New Jersey, 2008. [Gopa2009]K. Gopalan, “A Unified Audio and Image Steganography by Spectrum Modification,” in Proceedings of the 2009 IEEE International Conference on Industrial Technology, pp.1-5, 2009. [Guo2011]J. M. Guo, and J. J. Tsai, “Data-Hiding in Halftone Image Using Adaptive Noise-Balanced Error Diffusion,” IEEE Multimedia, Vol. 18, No. 2, pp. 48-60, 2011. [Huan2009]N. C. Huang, M. T. Li, and C. M. Wang, “Toward Optimal Embedding Capacity for Permutation Steganography,” IEEE Signal Processing Letters, Vol. 16, no. 9, pp. 802-805, September, 2009. [Huss2011] A. Hussein, “Data Hiding in Motion Vector of Compressed Video Based on Their Associated Prediction Error,” IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 95-98, 2011. [Kang2000]S. B. Kang, M. Uyttendaele, S. Winder, and R. Szeliski, “High Dynamic Range Video,” ACM Transactions on Graphics, Vol. 22, No. 3, pp. 319-325, 2000. [Ledd2005]P. Ledda, A. Chalmers, T. Troscianko, and H. Seetzen, “Evaluation of Tone Mapping Operators Using a High Dynamic Range Display,” ACM Transactions on Graphics, Vol. 24, No. 3, pp. 640-648, 2005. [Lee2007]S. Lee, C. D. Yoo, and T. Kalker, “Reversible Image Watermarking Based on Integer-to-integer Wavelet Transform,” IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3, pp. 321-330, September, 2007. [Lee2008]C. F. Lee, C. C. Chang, and K. H. Wang, “An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy,” Image and Vision Computing, Vol. 26, No. 12, pp. 1670-1676, December 2008. [Lee2012]Y. P. Lee, J. C. Lee, W. K. Chen, K. C. Chang, I. J. Su, and C. P. Chang, “High-payload Image Hiding with Quality Recovery Using Tri-way Pixel-value Differencing,” Information Sciences, Vol. 191, pp. 214-225, May 2012. [Li2009]M. T. Li, N. C. Huang, K. C. Wu, C. K. Jan, and C. M. Wang, “An Effective Message Embedding Scheme for 3D Models,” Fundamenta Informaticae, Vol. 97, No. 1-2, pp. 93-109, 2009. [Li2011]M. T. Li, N. C. Huang, and C. M. Wang, “A Data Hiding Scheme for High Dynamic Range Images,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 5(A), pp. 2021-2035, 2011. [Lou2010]D. C. Lou, N. I. Wu, C. M. Wang, Z. H. Lin, and C. S. Tsai, “A Novel adaptive Steganography Based in Local complexity and Human Vision Sensitivity,” Journal of Systems and Software, Vol. 83, No.7, pp. 1236-1248, 2010. [Mali2007]H. M. A. Malik, R. Ansari, and A. A. Khokhar, “Robust Data Hiding in Audio Using Allpass Filters,” IEEE Transactions on Audio, Speech, and Language Processing, Vol. 15, No. 4, pp. 1296-1304, May 2007. [Mant2004]R. Mantiuk, K. Myszkowski, and H. P. Seidel, “Visible Difference Predicator for High Dynamic Range Images,” in Proceedings of IEEE international Conference on Systems, Man and Cybernetics, pp. 2763-2769, 2004. [Mant2008]R. Mantiuk, S. Daly, and L. Kerofsky, “Display Adaptive Tone Mapping,” ACM Transactions on Graphics, Vol. 27, Issue 3, Article No. 68, 2008. [Mant2011]R. Mantiuk, K. J. Kim, A. G. Rempel, and W. Heidrich, “HDR-VDP-2: A Calibrated Visual Metric for Visibility and Quality Predictions in All Luminance Conditions,” ACM Transactions on Graphics, Vol. 30, Issue 4, No. 40, 2011. [Miel2006]J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, May 2006. [Peti1999]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – a Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999. [Pono2007]N. Ponomarenko, F. Silvestri, K. Egiazarian, M. Carli, J. Astola, and V. Lukin, “On Between-coefficient Contrast Masking of DCT Basis Functions,” in Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics, (Scottsdale, Arizona, USA), January 2007. [Prov2003]N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, pp. 32-44, 2003. [Rein2002a]E. Reinhard, M. Stark, P. Shirley, and J. Ferwerda, “Photographic Tone Reproduction for Digital Images,” ACM Transactions on Graphics, Vol. 21, No. 3, pp. 267-276, July 2002. [Rein2002b]E. Reinhard, “Parameter Estimation for Photographic Tone Reproduction,” Journal of Graphics Tools, Vol. 7, No. 1, pp. 45-52, November 2002. [Rein2005]E. Reinhard and K. Devlin, “Dynamic Range Reduction Inspired by Photoreceptor Physiology,” IEEE Transactions on Visualization and Computer Graphics, Vol. 11, No. 1, pp. 13-24, January – February 2005. [Rein2010]E. Reinhard, W. Heidrich, P. Debevc, S. Pattanaik, G. Ward, and K. Myszkowski, High Dynamic Range Imaging, Morgan Kaufmann, San Francisco, 2010. [Rodg1988]L. Rodgers and W. A. Nicewander, “Thirteen Ways to Look at The Correlation Coefficient,” The American Statistician, Vol. 42, No. 1, pp. 59-66, February 1988. [Shir2008]M. Shirali-Shahreza and M. H. Shirali-Shahreza, “An Improved Version of Persian/Arabic Text Steganography Using ‘La’ Word,” in Proceedings of the 6th National Conference on Telecommunication Technologies 2008 and 2008 2nd Malaysia Conference on Photonics, pp. 372-376, Putrajaya, Malaysia, August 26-28, 2008. [Skje2011]J. Skjerven, The Performance of Image Difference Metrics for Rendered HDR Images, Master Thesis, Department of Computer Science and Media Technology, Gjøvik University College, Norway, 2011. [Smit2006]K. Smith, G. Krawczyk, K. Myszkowski, and H. P. Seidel, “Beyond Tone Mapping: Enhanced Depiction of Tone Mapped HDR Images,” Computer Graphics Forum, Vol. 25, No. 3, pp. 427-438, 2006. [Tzen2004]C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping with Security Protection,” IEEE Transactions on Communications, Vol. 52, No. 5, pp. 791-800, May 2004. [Wang2002]Z. Wang and A. C. Bovik, “A Universal Image Quality Index,” IEEE Signal Processing Letters, Vol. 9, No. 3, pp. 81-84, March 2002. [Wang2004]Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image Quality Assessment: From Error Visibility to Structural Similarity,” IEEE Transactions on Image Processing, Vol. 13, No. 4, pp. 600-612, April 2004. [Wang2008]C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function,” The Journal of Systems and Software, Vol. 81, No. 1, pp. 150-158, January 2008. [Wang2011]Z. Wang and Q. Li, "Information Content Weighting for Perceptual Image Quality Assessment," IEEE Transactions on Image Processing, Vol. 20, No. 5, pp. 1185-1197, May 2011. [Ward1991]G. Ward, “Real Pixels,” in Graphics Gems II, edited by J. Arvo, Academic Press, San Diego, 1991. [Ward1998]G. Ward-Larson and R. A. Shakespeare, Rendering with Radiance, Morgan Kaufmann, San Francisco, 1998. [Wayn2002]P. Wayner, Disappearing Cryptography – Information Hiding: Steganography & Watermarking, Second Edition, Morgan Kaufmann, San Francisco, 2002. [Wong2009]K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete Video Quality-preserving Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 10, pp. 1499-1512, October, 2009. [Wu2003]D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, June 2003. [Wu2007]N. I. Wu and M. S. Hwang, “Data Hiding: Current Status and Key Issues,” International Journal of Network Security, Vol. 4, No. 1, pp. 1-9, January 2007. [Wu2012]N. I. Wu, K. C. Wu, and C. M. Wang, “Exploring Pixel-value Differencing and Base Decomposition for Low Distortion Data Embedding,” Applied Soft Computing Journal, Vol. 12, No. 2, pp. 942-960, February 2012 [Yang2007]H. Yang and A. C. Kot, “Pattern-based Data Hiding for Binary Image Authentication by Connectivity-preserving,” IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 475-486, April 2007. [Yang2008a]C. H. Yang, “Inverted Pattern Approach to Improve Image Quality of Information Hiding by LSB Substitution,” Pattern Recognition, Vol. 41, No. 8, pp. 2674-2683, August 2008. [Yang2008b]C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488-497, September 2008. [Yang2009]X. L. Li, B. Yang, D. F. Cheng, and T. Y. Zeng, “A Generalization of LSB Matching,” IEEE Signal Processing Letters, Vol. 16, No. 2, pp. 69-72, February 2009. [Yu2011]C. M. Yu, K. C. Wu, and C. M. Wang, “A Distortion-free Data Hiding Scheme for High Dynamic Range Images,” Displays, Vol. 32, No. 5, pp. 225-236, 2011. [Yule2010]G. U. Yule, An Introduction to the Theory of Statistics (1919), Kessinger Publishing, LLC, Whitefish, MT, USA, September 2010. [Zhan2004]X. Zhang and S. Wang, “Vulnerability of Pixel-value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, No. 3, pp. 331-339, 2004. [Zhan2005]X. Zhang and S. Wang, “Steganography Using Multiple-base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, No. 1, pp. 67-70, January 2005.
摘要: 
本論文提出兩個可適應性資訊隱藏演算法,分別針對低動態範圍影像與高動態範圍影像現有文獻之缺失提出改進。在低動態範圍影像上,可適應性資訊隱藏演算法之文獻仍存在三個缺失。第一,使用多層之層級表但未能產出最佳之偽裝影像品質。第二,使用預先設定的層級表,難以滿足使用者對嵌入量之需求。第三,使用固定的基底組合做多基底嵌入,導致像素直方圖異常振盪,無法抵抗偽裝偵測。為此,我們提出一個使用多基底技巧之最佳化可適應性演算法,以來改善缺失。首先,我們以理論分析證明僅使用兩個層級來嵌入秘密訊息,可有效降低變動量,達成最佳化可適應性嵌入。實驗結果佐證我們的理論證明,我們方法所產生的偽裝影像,平均品質比先前學者高出0.38 dB。其次,我們以動態方式建構層級表,並以多基底方式嵌入秘密訊息,故演算法可以滿足使用者對嵌入量需求。最後,我們提出一個循環替換技巧,可改善像素直方圖之異常振盪,增加抵抗直方圖偽裝偵測之強靭性。
本論文針對高動態範圍影像提出一個最佳化可適應性資訊隱藏演算法。我們使用兩個層級並使用多基底演算法來嵌入秘密訊息,達成最佳化可適應性資訊嵌入。我們使用循環替換技巧來有效的解決嵌入秘密訊息時所造成偽裝影像直方圖異常振盪之現象。我們也對偽裝像素進行合法性調整,更提出平均基底調整方式,免除偽裝影像直方圖的局部異常突起,避免遭受偽裝偵測攻擊。演算法可動態建構兩層級之層級表,滿足使用者對嵌入量之需求。以VDP-2量化影像視覺差異結果顯示偽裝影像品質良好,僅有極低的機率會被人眼察覺具有視覺差異。演算法也能自動建議使用者提出之需求嵌入量,避免偽裝影像過度產生視覺變異,導致遭受偽裝偵測攻擊。實驗數據佐證我們提出的演算法具有五個重要特性,分別為能達到最佳化可適應性嵌入、充份改善偽裝影像直方圖異常現象、產出具有合法性之偽裝影像、滿足使用者嵌入量需求、產出具備優異品質的偽裝影像。我們的演算法已改進先前文獻論著的五個缺點,擴展高動態範圍影像可適應性資訊隱藏之應用。
總結本論文,我們提出的兩個可適應性藏密學演算法。實驗結果佐證演算法具有優異成果,分別適用於灰階、彩色影像與高動態範圍影像。我們認為此兩個演算法對影像藏密學提供了具體貢獻。

This paper presents two adaptive image data hiding algorithms. The first algorithm we propose is an optimal, adaptive data hiding algorithm using the multiple base embedding technique to convey secret messages in grayscale/color images. We introduce a theoretical analysis which proves that adopting two levels of range table produces the minimal image distortion and achieves the optimal data embedding. Experimental results indicate that our method can generate a stego image that shows the optimal data embedding performance and provides an average of 0.38 dB higher PSNR values higher than our counterparts. Our algorithm is able to dynamically construct the range table, allowing us to satisfy user’s demand for the embedded capacity. Finally, a skill referred to as “circular shift” is presented to alleviate the abnormal fluctuation appearing in the histogram of stego image, thus increasing the robustness of the steganalysis attacks. This novel algorithm contains features of achieving the optimization, complying with user’s capacity demanding, and improving the robustness for the steganalysis attack.
The second algorithm we propose is an optimized, adaptive data hiding algorithm for high dynamic range images. Similar to the first algorithm, our second algorithm dynamically constructs a two-level range table to satisfy the needs of the embedded capacity given by a user. A multiple base scheme is adopted to convey secret messages to achieve the optimization of adaptive data hiding. We propose a circular shift technique to alleviate the abnormal fluctuation appearing in the histogram of the stego image. In addition, we introduce a scheme referred to as an average base adjustment in order to ensure the legality of a stego pixel and provide robustness to resist the steganalysis attack. The visual difference predictor 2 (VDP-2) is adopted to measure the visual difference between images before and after the embedding. The output image concealing with the capacity of 12.9 bpp shows with a good image quality, where the tone mapped image has the PSNR value over 31.57 dB. Visualizing by the human eyes, there is an insignificantly low probability to perceive visual difference between cover and stego images. The proposed algorithm provides five remarkable benefits extending the feasibility of image-based adaptive data hiding for high dynamic range images.
In conclusion, we propose two adaptive data hiding algorithms in this work. Experimental results confirm their superiority for the grayscale, color images, and high dynamic range images. We believe two novel algorithms provided contribute the applications of image adaptive data hiding.
URI: http://hdl.handle.net/11455/19973
其他識別: U0005-2307201200410300
Appears in Collections:資訊科學與工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.