簡易檢索 / 詳目顯示

研究生: 黃立旻
Li-min Huang
論文名稱: 植基於深度影像的可逆式資料隱藏技術
Reversible Data Hiding Based on Depth Maps
指導教授: 古鴻炎
Hung-yan Gu
鍾國亮
Kuo-liang Chung
口試委員: 賴祐吉
Yu-chi Lai
姚智原
Chih-yuan Yao
黃詠淮
Yong-huai Huang
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2012
畢業學年度: 100
語文別: 中文
論文頁數: 41
中文關鍵詞: 立體視訊深度影像差值擴張法直方圖修改法深度合成無錯模型可逆式資料隱藏
外文關鍵詞: 3D video, depth map, difference expansion, histogram modification, depth no-synthesis-error (D-NOSE) model, reversible data hiding
相關次數: 點閱:201下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於數位檔案容易被竊取、竄改、偽造或複製,使得資料隱藏技術於資訊安全領域中是十分熱門的研究議題。然而用於立體視訊的資料隱藏技術還未成熟,雖然可直接應用現有的可逆式資料隱藏技術,但是在未將偽裝影像回復成掩護影像前進行彩現化,會產生視覺上可見的破綻,讓人察覺影像可能有隱藏資訊。此外,尚未有應用在深度影像的隱藏技術,本篇論文即是針對立體視訊提出植基於深度影像的可逆式資料隱藏技術。在提出的方法中,我們會將植入訊息後的深度值控制在深度合成無錯模型的合法範圍內,使偽裝影像不會在彩現化的過程產生任何失真。


    This thesis presents a novel reversible data hiding method, based on the depth no-synthesis-error (D-NOSE) model, for depth maps. The virtual view generated using the marked depth map is identical to the one using the original depth map. The proposed method can achieve substantially high embedding capacity due to the hiding flexibility provided by the D-NOSE model and the characteristics of the depth maps. Experimental results demonstrate that the proposed method achieves better performance than the existing state-of-the-art methods in terms of both quantitative and qualitative measures.

    論文摘要 i ABSTRACT ii 誌謝 iii 目錄 iv 圖目錄 v 表目錄 vi 第一章 緒論 1 第二章 相關背景知識 5 2.1 深度影像 5 2.2 基於深度影像的彩現化 6 2.2.1 翹曲變形 6 2.2.2 缺空填補 7 2.3深度合成無錯模型 8 第三章 本篇論文方法 10 3.1 針對深度影像的改良式差值擴張法 10 3.1.1 植入演算法 11 3.1.2 抽取演算法 14 3.2 針對深度影像的改良式直方圖修改法 15 3.2.1 植入演算法 16 3.2.2 抽取演算法 19 第四章 實驗結果 20 4.1 實驗方法 20 4.2 實驗結果 22 第五章 結論 28 參考文獻 29

    [1]黃怡菁、黃乙白與謝漢萍,3D立體顯示技術,科學發展,第451期,第46-52頁,2010。
    [2]賴文能與陳韋志,淺談2D至3D視訊轉換技術,影像與識別(IPPR),第16卷,第2期,第61-75頁,2010。
    [3]D. Tian, P. Lai, P. Lopez, and C. Gomila, “View synthesis techniques for 3D video,” in Proc. of SPIE, 7443, San Diego, CA, 2009.
    [4]C. Fehn, “A 3D-TV approach using depth-image-based rendering (DIBR),” In Proc. of the IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP), Benalmadena, Spain, 2003, pp. 482 -487.
    [5]G. Wolberg, Digital image warping, IEEE Computer Society Press, 1990.
    [6]P. Ndjiki-Nya, M. Koppel, D. Doshkov, H. Lakshman, P. Merkle, K. Muller, and T. Wiegand, “Depth image-based rendering with advanced texture synthesis for 3-D video,” IEEE Trans. Multimedia, 13(3), 2011, pp. 453-465.
    [7]C. V’azquez, W. J. Tam, and F. Speranza, “Stereoscopic imaging: filling disoccluded areas in depth image-based rendering,” in Proc. of SPIE Three-Dimensional TV, Video, and Display (ITCOM), Boston, MA, 2006, pp. 63920D.
    [8]Y. Zhao, C. Zhu, Z. Chen, and L. Yu, “Depth no-synthesis-error model for view synthesis in 3-D video,” IEEE Trans. Image Processing, 20(8), 2011, pp. 2221-2228.
    [9]C. C. Chang, M. H. Lin, and Y. C. Hu, “A fast and secure image hiding based on LSB substitution,” International Journal of Pattern Recognition and Artificial Intelligence, 16(4), 2001, pp. 399-416.
    [10]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, 34(3), 2001, pp. 671-683.
    [11]D. C. Wu, and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, 24(9-10), 2003, pp. 1613-1626.
    [12]H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods”, IEE Proc. Vision, Image and Signal Processing, 152(5), 2005, pp. 611 - 615.
    [13]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits and Systems for Video Technology, 13(8), 2003, pp. 890–896.
    [14]V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits and Systems for Video Technology, 19(7), 2009, pp. 989–999.
    [15]Y. Q. Ni, N. Ansari Shi, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits and Systems for Video Technology, 16(3), 2006, pp. 354–362.
    [16]K. L. Chung, Y. H. Huang, W. N. Yang, Y. C. Hsu, and C. H. Chen, “Capacity maximization for reversible data hiding based on dynamic programming approach,” Applied Mathematics and Computation, 208(1), 2009, pp. 284-292.
    [17]鍾國亮,影像處理與電腦視覺,第五版,臺灣東華書局股份有限公司,第18-19頁,2012。
    [18]D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Processing, 16(3), 2007, pp. 721–730.
    [19][Online]. Available: http://www.tanimoto.nuee.nagoya-u.ac.jp/~mpegftv/mpeg3dv/CfP/
    [20][Online]. Available: ftp://203.253.128.142
    [21]鍾國亮,資料壓縮的原理與應用,第二版,全華科技圖書股份有限公司,第7-2-4頁,2004。

    QR CODE