研究生: |
Dwi Riyono Dwi Riyono |
---|---|
論文名稱: |
Study and Improvement on Image Security and Retrieval Study and Improvement on Image Security and Retrieval |
指導教授: |
郭景明
Jing-Ming Guo |
口試委員: |
Jar-Ferr Yang
Jar-Ferr Yang Chung-Nan Lee Chung-Nan Lee Heri Prasetyo Heri Prasetyo Prof. Jian-Jiun Ding Jian-Jiun Ding Jing-Ming Guo Jing-Ming Guo |
學位類別: |
博士 Doctor |
系所名稱: |
電資學院 - 電機工程系 Department of Electrical Engineering |
論文出版年: | 2019 |
畢業學年度: | 107 |
語文別: | 英文 |
論文頁數: | 213 |
中文關鍵詞: | beta chaotic 、image encryption 、secret sharing 、hyperchaos 、image watermarking 、permutation 、image retrieval 、bitmap feature 、bit probability |
外文關鍵詞: | beta chaotic, image encryption, secret sharing, hyperchaos, image watermarking, permutation, image retrieval, bitmap feature, bit probability |
相關次數: | 點閱:210 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
In this dissertation, we conduct three researches : 1) improved beta chaotic image encryption for multiple secret sharing, 2) hyperchaos permutation on false-positive-free SVD-based image watermarking, and 3) a novel image descriptor based on dot-diffused block truncation coding with bit probability.
The first part is related to image encryption. The proposed image encryption is further extended and applied for the (n,n)-MSS task. Some ideas have been delivered to solve the problem in former existing scheme on dealing with odd number of secret images. In the (n,n)-MSS, the proposed method utilizes an additional random image, k image encryption, and two different masking coefficients to overcome the aforementioned problem. Experimental results validate the usability and effectiveness of the proposed method in the image encryption as well in (n,n)-MSS system. Thus, the proposed method can be regarded as very competitive candidate in the image encryption and secret sharing applications.
For the second part, some extensive experiments on image watermark scheme have been reported. It investigates the effect of hyperchaos permutation on FPF SVD-based image watermarking scheme. The watermark image is firstly scrambled using the hyperchaos permutation before being embedded into the host image. The proposed method yields a good result in the image watermarking scheme.
The third part presents a novel image descriptor based on DDBTC with bit probability. Specifically, the image feature descriptor is formed by combining the color feature directly derived from a DDBTC encoded data stream with bit probability and bitmap feature derived from the corresponding bitmap image. The color feature effectively captures the image brightness and color distribution, and the bitmap feature characterizes the image content. To demonstrate its viability as an image descriptor, its application to image retrieval and classification are considered. Results confirm the superiority of the proposed image descriptors in terms of the image retrieval and classification tasks for both natural and textural image databases, for both color and grayscale images.
In this dissertation, we conduct three researches : 1) improved beta chaotic image encryption for multiple secret sharing, 2) hyperchaos permutation on false-positive-free SVD-based image watermarking, and 3) a novel image descriptor based on dot-diffused block truncation coding with bit probability.
The first part is related to image encryption. The proposed image encryption is further extended and applied for the (n,n)-MSS task. Some ideas have been delivered to solve the problem in former existing scheme on dealing with odd number of secret images. In the (n,n)-MSS, the proposed method utilizes an additional random image, k image encryption, and two different masking coefficients to overcome the aforementioned problem. Experimental results validate the usability and effectiveness of the proposed method in the image encryption as well in (n,n)-MSS system. Thus, the proposed method can be regarded as very competitive candidate in the image encryption and secret sharing applications.
For the second part, some extensive experiments on image watermark scheme have been reported. It investigates the effect of hyperchaos permutation on FPF SVD-based image watermarking scheme. The watermark image is firstly scrambled using the hyperchaos permutation before being embedded into the host image. The proposed method yields a good result in the image watermarking scheme.
The third part presents a novel image descriptor based on DDBTC with bit probability. Specifically, the image feature descriptor is formed by combining the color feature directly derived from a DDBTC encoded data stream with bit probability and bitmap feature derived from the corresponding bitmap image. The color feature effectively captures the image brightness and color distribution, and the bitmap feature characterizes the image content. To demonstrate its viability as an image descriptor, its application to image retrieval and classification are considered. Results confirm the superiority of the proposed image descriptors in terms of the image retrieval and classification tasks for both natural and textural image databases, for both color and grayscale images.
References
[1] J.M. Guo, H. Prasetyo, and N.J. Wang, "Effective image retrieval system using dot-diffused block truncation coding features," IEEE Transactions on Multimedia, vol. 17, pp. 1576-1590, 2015.
[2] R. Zahmoul, R. Ejbali, and M. Zaied, "Image encryption based on new Beta chaotic maps," Optics and Lasers in Engineering, vol. 96, pp. 39-49, 2017.
[3] H. Zhu, C. Zhao, and X. Zhang, "A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem," Signal Processing: Image Communication, vol. 28, pp. 670-680, 2013.
[4] Z. Hua, Y. Zhou, C.M. Pun, and C. P. Chen, "2D Sine Logistic modulation map for image encryption," Information Sciences, vol. 297, pp. 80-94, 2015.
[5] Y. Wu, Y. Zhou, G. Saveriades, S. Agaian, J. P. Noonan, and P. Natarajan, "Local Shannon entropy measure with statistical tests for image randomness," Information Sciences, vol. 222, pp. 323-342, 2013.
[6] Y. Wu, J. P. Noonan, and S. Agaian, "A wheel-switch chaotic system for image encryption," in System Science and Engineering (ICSSE), 2011 International Conference on, 2011, pp. 23-27.
[7] X. Liao, S. Lai, and Q. Zhou, "A novel image encryption algorithm based on self-adaptive wave transmission," Signal Processing, vol. 90, pp. 2714-2722, 2010.
[8] Y. Zhou, Z. Hua, C.M. Pun, and C. P. Chen, "Cascade chaotic system with applications," IEEE transactions on cybernetics, vol. 45, pp. 2001-2012, 2015.
[9] Z. Hua and Y. Zhou, "Image encryption using 2D Logistic-adjusted-Sine map," Information Sciences, vol. 339, pp. 237-253, 2016.
[10] Y. Zhou, L. Bao, and C. P. Chen, "Image encryption using a new parametric switching chaotic system," Signal processing, vol. 93, pp. 3039-3052, 2013.
[11] R. Lan, J. He, S. Wang, T. Gu, and X. Luo, "Integrated chaotic systems for image encryption," Signal Processing, vol. 147, pp. 133-145, 2018.
[12] X. Wu, J. Weng, and W. Yan, "Adopting secret sharing for reversible data hiding in encrypted images," Signal Processing, vol. 143, pp. 269-281, 2018.
[13] Z.L. Liu and C.M. Pun, "Reversible data-hiding in encrypted images by redundant space transfer," Information Sciences, vol. 433, pp. 188-203, 2018.
[14] F. Khelifi, "On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain," Signal Processing, vol. 143, pp. 336-345, 2018.
[15] J.M. Guo and H. Prasetyo, "False-positive-free SVD-based image watermarking," Journal of Visual Communication and Image Representation, vol. 25, pp. 1149-1163, 2014.
[16] B. Harjito and H. Prasetyo, "False-positive-free GSVD-based image watermarking for copyright protection," in Electronics and Smart Devices (ISESD), International Symposium on, 2016, pp. 143-147.
[17] T.H. Chen and C.S. Wu, "Efficient multi-secret image sharing based on Boolean operations," Signal Processing, vol. 91, pp. 90-97, 2011.
[18] C.C. Chen and W.J. Wu, "A secure Boolean-based multi-secret image sharing scheme," Journal of Systems and Software, vol. 92, pp. 107-114, 2014.
[19] C.N. Yang, C.H. Chen, and S.R. Cai, "Enhanced Boolean-based multi secret image sharing scheme," Journal of Systems and software, vol. 116, pp. 22-34, 2016.
[20] J.B. Feng, H.C. Wu, C.S. Tsai, and Y.P. Chu, "A new multi-secret images sharing scheme using Largrange’s interpolation," Journal of Systems and Software, vol. 76, pp. 327-339, 2005.
[21] C. Guo, H. Zhang, Q. Song, and M. Li, "A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem," Multimedia Tools and Applications, vol. 75, pp. 11577-11594, 2016.
[22] M. Deshmukh, N. Nain, and M. Ahmed, "A novel approach for sharing multiple color images by employing Chinese Remainder Theorem," Journal of Visual Communication and Image Representation, vol. 49, pp. 291-302, 2017.
[23] S. Rastegar, F. Namazi, K. Yaghmaie, and A. Aliabadian, "Hybrid watermarking algorithm based on singular value decomposition and radon transform," AEU-International Journal of Electronics and Communications, vol. 65, pp. 658-663, 2011.
[24] G. Bhatnagar, "A new facet in robust digital watermarking framework," AEU-International Journal of Electronics and Communications, vol. 66, pp. 275-285, 2012.
[25] G. Bhatnagar and Q. J. Wu, "Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform," Future Generation Computer Systems, vol. 29, pp. 182-195, 2013.
[26] C. Song, S. Sudirman, and M. Merabti, "A robust region-adaptive dual image watermarking technique," Journal of Visual Communication and Image Representation, vol. 23, pp. 549-568, 2012.
[27] G. Bhatnagar, Q. J. Wu, and B. Raman, "A new robust adjustable logo watermarking scheme," computers & security, vol. 31, pp. 40-58, 2012.
[28] G. Bhatnagar, B. Raman, and Q. J. Wu, "Robust watermarking using fractional wavelet packet transform," IET Image Processing, vol. 6, pp. 386-397, 2012.
[29] E. Yen and L.H. Lin, "Rubik’s cube watermark technology for grayscale images," Expert Systems with Applications, vol. 37, pp. 4033-4039, 2010.
[30] J.M. Guo and H. Prasetyo, "Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition," AEU-International Journal of Electronics and Communications, vol. 68, pp. 816-834, 2014.
[31] W. El-Shafai, E.S. M. El-Rabaie, M. El-Halawany, and F. E. A. El-Samie, "Efficient multi-level security for robust 3D color-plus-depth HEVC," Multimedia Tools and Applications, pp. 1-27, 2018.
[32] P. Vaidya and C. M. PVSSR, "A robust semi-blind watermarking for color images based on multiple decompositions," Multimedia Tools and Applications, vol. 76, pp. 25623-25656, 2017.
[33] A. Zear, A. K. Singh, and P. Kumar, "A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine," Multimedia Tools and Applications, vol. 77, pp. 4863-4882, 2018.
[34] G. Bhatnagar and Q. J. Wu, "A new robust and efficient multiple watermarking scheme," Multimedia Tools and Applications, vol. 74, pp. 8421-8444, 2015.
[35] P. Singh, B. Raman, and P. P. Roy, "A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform," Multimedia Tools and Applications, vol. 76, pp. 3871-3897, 2017.
[36] S. P. alias Sathya and S. Ramakrishnan, "Fibonacci Based Key Frame Selection and Scrambling for Video Watermarking in DWT–SVD Domain," Wireless Personal Communications, pp. 1-21.
[37] S. P. Singh and G. Bhatnagar, "A new robust watermarking system in integer DCT domain," Journal of Visual Communication and Image Representation, vol. 53, pp. 86-101, 2018.
[38] P. Singh and B. Raman, "Reversible data hiding based on Shamir’s secret sharing for color images over cloud," Information Sciences, vol. 422, pp. 77-97, 2018.
[39] P. Singh, B. Raman, and M. Misra, "A secure image sharing scheme based on SVD and Fractional Fourier Transform," Signal Processing: Image Communication, vol. 57, pp. 46-59, 2017.
[40] M. Mardanpour and M. A. Z. Chahooki, "Robust transparent image watermarking with Shearlet transform and bidiagonal singular value decomposition," AEU-International Journal of Electronics and Communications, vol. 70, pp. 790-798, 2016.
[41] J.M. Guo, H. Prasetyo, and K. Wong, "Halftoning-based block truncation coding image restoration," Journal of Visual Communication and Image Representation, vol. 35, pp. 193-197, 2016.
[42] J.M. Guo, H. Prasetyo, M. E. Farfoura, and H. Lee, "Vehicle Verification Using Features From Curvelet Transform and Generalized Gaussian Distribution Modeling," IEEE Transactions. Intelligent Transportation Systems, vol. 16, pp. 1989-1998, 2015.
[43] J.M. Guo, H. Prasetyo, and J.H. Chen, "Content-based image retrieval using error diffusion block truncation coding features," IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, pp. 466-481, 2015.
[44] B. S. Manjunath and W.Y. Ma, "Texture features for browsing and retrieval of image data," IEEE Transactions on pattern analysis and machine intelligence, vol. 18, pp. 837-842, 1996.
[45] M. Kokare, P. K. Biswas, and B. N. Chatterji, "Texture image retrieval using new rotated complex wavelet filters," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 35, pp. 1168-1178, 2005.
[46] T. Ojala, M. Pietikäinen, and D. Harwood, "A comparative study of texture measures with classification based on featured distributions," Pattern recognition, vol. 29, pp. 51-59, 1996.
[47] X. Tan and B. Triggs, "Enhanced local texture feature sets for face recognition under difficult lighting conditions," IEEE transactions on image processing, vol. 19, pp. 1635-1650, 2010.
[48] Z. Guo, L. Zhang, and D. Zhang, "Rotation invariant texture classification using LBP variance (LBPV) with global matching," Pattern recognition, vol. 43, pp. 706-719, 2010.
[49] M. Subrahmanyam, R. Maheshwari, and R. Balasubramanian, "Local maximum edge binary patterns: a new descriptor for image retrieval and object tracking," Signal Processing, vol. 92, pp. 1467-1479, 2012.
[50] B. Zhang, Y. Gao, S. Zhao, and J. Liu, "Local derivative pattern versus local binary pattern: face recognition with high-order local pattern descriptor," IEEE transactions on image processing, vol. 19, pp. 533-544, 2010.
[51] S. Murala, R. Maheshwari, and R. Balasubramanian, "Local tetra patterns: a new feature descriptor for content-based image retrieval," IEEE Transactions on Image Processing, vol. 21, pp. 2874-2886, 2012.
[52] M. Subrahmanyam, Q. J. Wu, R. Maheshwari, and R. Balasubramanian, "Modified color motif co-occurrence matrix for image indexing and retrieval," Computers & Electrical Engineering, vol. 39, pp. 762-774, 2013.
[53] R. Kwitt and A. Uhl, "Lightweight probabilistic texture retrieval," IEEE Transactions on Image Processing, vol. 19, pp. 241-253, 2010.
[54] R. Kwitt and A. Uhl, "Image similarity measurement by Kullback-Leibler divergences between complex wavelet subband statistics for texture retrieval," in Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, 2008, pp. 933-936.
[55] N.E. Lasmar and Y. Berthoumieu, "Gaussian copula multivariate modeling for texture image retrieval using wavelet transforms," IEEE Transactions on Image Processing, vol. 23, pp. 2246-2261, 2014.
[56] A. Porebski, N. Vandenbroucke, and L. Macaire, "Haralick feature extraction from LBP images for color texture classification," in Image Processing Theory, Tools and Applications, 2008. IPTA 2008. First Workshops On, 2008, pp. 1-8.
[57] G.H. Liu, Z.Y. Li, L. Zhang, and Y. Xu, "Image retrieval based on micro-structure descriptor," Pattern Recognition, vol. 44, pp. 2123-2133, 2011.
[58] F. Bianconi, A. Fernández, E. González, D. Caride, and A. Calviño, "Rotation-invariant colour texture classification through multilayer CCR," Pattern Recognition Letters, vol. 30, pp. 765-773, 2009.
[59] G. Paschos and M. Petrou, "Histogram ratio features for color texture classification," Pattern Recognition Letters, vol. 24, pp. 309-314, 2003.
[60] M. A. Hoang, J.M. Geusebroek, and A. W. Smeulders, "Color texture measurement and segmentation," Signal processing, vol. 85, pp. 265-275, 2005.
[61] M. A. Hoang and J.-M. Geusebroek, "Measurement of color texture," in Workshop on Texture Analysis in Machine Vision, 2002, pp. 73-76.
[62] J. J. d. M. S. Junior, P. C. Cortez, and A. R. Backes, "Color texture classification using shortest paths in graphs," IEEE Transactions on Image Processing, vol. 23, pp. 3751-3761, 2014.
[63] B. J. Campana and E. J. Keogh, "A compression‐based distance measure for texture," Statistical Analysis and Data Mining: The ASA Data Science Journal, vol. 3, pp. 381-398, 2010.
[64] T. Guha and R. K. Ward, "Image similarity using sparse representation and compression distance," IEEE Transactions on Multimedia, vol. 16, pp. 980-987, 2014.
[65] D. G. Lowe, "Distinctive image features from scale-invariant keypoints," International journal of computer vision, vol. 60, pp. 91-110, 2004.
[66] T. Ojala, K. Valkealahti, E. Oja, and M. Pietikäinen, "Texture discrimination with multidimensional distributions of signed gray-level differences," Pattern Recognition, vol. 34, pp. 727-739, 2001.
[67] J. Chen, S. Shan, C. He, G. Zhao, M. Pietikainen, X. Chen, et al., "WLD: A robust local image descriptor," IEEE transactions on pattern analysis and machine intelligence, vol. 32, pp. 1705-1720, 2010.
[68] A. Satpathy, X. Jiang, and H.L. Eng, "LBP-based edge-texture features for object recognition," IEEE Transactions on Image Processing, vol. 23, pp. 1953-1964, 2014.
[69] X. Wang and Z. Wang, "A novel method for image retrieval based on structure elements’ descriptor," Journal of Visual Communication and Image Representation, vol. 24, pp. 63-74, 2013.
[70] W. Xing Yuan, L. Fan Ping, and W. Shu Guo, "Fractal image compression based on spatial correlation and hybrid genetic algorithm," Journal of Visual Communication and Image Representation, vol. 20, pp. 505-510, 2009.
[71] D. Cerra and M. Datcu, "A fast compression-based similarity measure with applications to content-based image retrieval," Journal of Visual Communication and Image Representation, vol. 23, pp. 293-302, 2012.
[72] P. Liu, J.M. Guo, C.-Y. Wu, and D. Cai, "Fusion of deep learning and compressed domain features for content-based image retrieval," IEEE Transactions on Image Processing, vol. 26, pp. 5706-5717, 2017.
[73] E. Hoque, O. Hoeber, G. Strong, and M. Gong, "Combining conceptual query expansion and visual search results exploration for Web image retrieval," Journal of Ambient Intelligence and Humanized Computing, vol. 4, pp. 389-400, 2013.
[74] N.V. Nguyen, A. Boucher, J.-M. Ogier, and S. Tabbone, "Cluster-based relevance feedback for CBIR: a combination of query point movement and query expansion," Journal of ambient intelligence and humanized computing, vol. 3, pp. 281-292, 2012.
[75] P. Fränti and T. Kaukoranta, "Binary vector quantizer design using soft centroids," Signal Processing: Image Communication, vol. 14, pp. 677-681, 1999.
[76] G. J. Burghouts and J.M. Geusebroek, "Material-specific adaptation of color invariant features," Pattern Recognition Letters, vol. 30, pp. 306-313, 2009.
[77] "SIPI-USC Brodatz texture image database," online available on http:// http://sipi.usc.edu/database/database.php?volume=textures.
[78] "Salzburg Texture (Stex) image database," online available on http://www.wavelab.at/sources/STex/.
[79] "Outex texture image database," online available on http://www.outex.oulu.fi/index.php?page=outex_home
[80] K. Sharifi and A. Leon Garcia, "Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video," IEEE Transactions on Circuits and Systems for Video Technology, vol. 5, pp. 52-56, 1995.
[81] M. N. Do and M. Vetterli, "Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance," IEEE transactions on image processing, vol. 11, pp. 146-158, 2002.
[82] M. H. Pi, C.S. Tong, S.K. Choy, and H. Zhang, "A fast and effective model for wavelet subband histograms and its application in texture image retrieval," IEEE transactions on image processing, vol. 15, pp. 3078-3088, 2006.