簡易檢索 / 詳目顯示

研究生: 張凱鈞
Kai-Chun Chang
論文名稱: 一種基於直方圖位移方式改進影像資料隱藏之演算法
A Novel Robust Data Hiding Scheme Using Adaptive Shrinking
指導教授: 花凱龍
Kai-Lung Hua
口試委員: 陸敬互
none
鮑興國
none
郭彥甫
none
陳永耀
none
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2015
畢業學年度: 103
語文別: 中文
論文頁數: 38
中文關鍵詞: 資料隱藏強韌性直方圖位移
外文關鍵詞: Data hiding, Robust, Histogram shift
相關次數: 點閱:205下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,非失真的資訊隱藏技術逐漸被重視,這類型的技術適合處理一些帶
    有機密資訊或是隱私的圖像,例如醫學影像、軍事影像... 等等。在此類型技術中
    尤其是以直方圖位移 (Histogram shift) 的方法在抵抗影像處理後的破壞上最為突
    出,這類的方法在非失真的資訊隱藏中,不僅能使影像擁有相當大的容量 (High
    hiding capacity) 來隱藏資訊,更可以抵抗影像壓縮後的破壞。在這之前,有很
    多研究利用此技術提出了不少的演算法,而在這篇論文中,主要會針對直方圖
    位移的方法做延伸,並且透過我們的研究方法讓隱藏資訊的容量和影像品質上
    都可以提升。除此之外,如何使得此類型的方法更完善,像是提出透過 adaptive
    shrinking 和兩階段直方圖位移 (two-level histogram shift) 來改善過去在直方圖位
    移方法做資訊隱藏所衍生的問題,也會是本篇論文討論的重點。


    In recent years, non-distorted information hidden technology is gradually valued;
    this type of technology is suitable for some confidential images or private images
    like the medical images and military images. In this technology, histogram shift
    method has the most outstanding performance in resisting the distortion by image
    processing. This method not only has a high hiding capacity in non-distorted hidden
    information, but also has resistance toward post image compression distortion. In
    the past, there were plenty of algorithms using histogram shift method. Thus, we
    would also broaden new methods from histogram shift in this thesis to improve the
    capacity and image quality. Moreover, we propose to use adaptive shrinking and
    two level histogram shift to solve the problem from histogram shift methods. It is
    also the main point to be discussed in this thesis.

    摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 表格目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 圖目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1 導論 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2 文獻回顧 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3 研究方法 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.1 Adaptive shrinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 嵌入過程 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.3 擷取過程 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 4 實驗結果 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 5 結論 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 參考文獻 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    [1] G. C. Langelaar and R. L. Lagendijk, “Optimal differential energy watermark-
    ing of dct encoded images and video,” IEEE Trans. Image Process, 2001.
    [2] T. K. Das, S. Maitra, and J. Mitra, “Cryptanalysis of optimal differential en-
    ergy watermarking(dew) and a modified robust scheme,” IEEE Trans. Signal
    Process, 2005.
    [3] J. C. Patra, J. E. Phua, and D. Rajan, “Dct domain watermarking scheme
    using chinese remainder theorem for image authentication,” IEEE Int. Conf.
    on Multimedia and Expo., 2010.
    [4] R. Dubolia, R. Singh, S. Bhadoria, and R. Gupta, “Digital image watermarking
    by using discrete wavelet transform and discrete cosine transform and compar-
    ison based on psnr,” IEEE Int. Conf. on Communication Systems and Network
    Technologies., 2011.
    [5] Y. Qianli and C. Yanhong, “A digital image watermarking algorithm based on
    discrete wavelet transform and discrete cosine transform,” IEEE Int. Conf. on
    Information Technology in Medicine and Education., 2012.
    [6] S. Ababneh, A. Khokhar, and R. Ansari, “Compressed-image authentication
    using compensated signature embedding,” in IEEE Int. Conf. on Electro/In-
    formation Tech., 2007.
    [7] S. Ababneh, A. Khokhar, and R. Ansari, “Compensated signature embedding
    based multimedia content authentication system,” in IEEE Int. Conf. on Image
    Proc., 2007.
    [8] S. Ababneh, A. Khokhar, and R. Ansari, “Improved image authentication us-
    ing closed-form compensation and spread-spectrum watermarking,” IEEE Int.
    Conf. on Acoustics Speech and Signal Proc., 2008.
    34[9] A. Shahbahrami, “Improving the performance of 2d discrete wavelet transform
    using data-level parallelism,” IEEE Int. Conf. on High Performance Computing
    and Simulation., 2011.
    [10] G. Pradeepkumar and S. Usha, “Effective watermarking algorithm to protect
    electronic patient record using image transform,” IEEE Int. Conf. on Informa-
    tion Communication and Embedded Systems., 2013.
    [11] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery
    of an original image containing embedded data,” US Patent, 2001.
    [12] P. Pawar and K. Jondhale, “Histogram- based reversible data hiding using
    block division,” IEEE Int. Conf. on Advanced Communication Control and
    Computing Technologies., 2012.
    [13] W.-C. Wu and Y.-C. Wu, “Improved reversible data hiding based on residue
    histogram shifting,” IEEE Int. Conf. on Genetic and Evolutionary Computing.,
    2012.
    [14] S. Cai and X. Gui, “An efficient reversible data hiding scheme based on refer-
    ence pixel and block selection,” IEEE Int. Conf. on Information Hiding and
    Multimedia Signal Processing., 2013.
    [15] C. Kumar, V. Natarajan, and D. Bhogadi, “High capacity reversible data hiding
    based on histogram shifting for medical images,” IEEE Int. Conf. on Commu-
    nications and Signal Processing., 2013.
    [16] W.-J. Wang, Y.-H. Zhang, C.-T. Huang, and S.-J. Wang, “Steganography of
    data embedding in multimedia images using interpolation and histogram shift-
    ing,” IEEE Int. Conf. on Intelligent Information Hiding and Multimedia Signal
    Processing., 2013.
    [17] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Hierarchical water-
    marking for secure image authentication with localization,” IEEE Trans. Image
    Process, 2002.
    35[18] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-lsb
    data embedding,” IEEE Trans. Image Process., 2005.
    [19] M. U. Celik, G. Sharma, and A. M. Tekalp, “Lossless watermarking for image
    authentication: A new framework and an implementation,” IEEE Trans. Image
    Process., 2006.
    [20] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans.
    Circuits Syst. Video Technol., 2003.
    [21] H. J. Kim, V. Sa, Y. Q. Shi, J. Nam, and H.-G. Choo, “A novel difference
    expansion transform for reversible data embedding,” IEEE Trans Information
    forensics and security, 2008.
    [22] X. L. D. T. X. Gao, L. An, “Reversibility improved lossless data hiding,” Signal
    Processing, 2009.
    [23] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of bi-
    jective transformations in lossless watermarking for media asset management,”
    IEEE Trans. Multimedia, 2003.
    [24] W.-L. Tai, C.-M. Yeh, and C.-C. Chang, “Reversible data hiding based on
    histogram modification of pixel differences,” IEEE Trans. Circuits Syst. Video
    Technol., 2009.
    [25] Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, “Robust lossless
    image data hiding designed for semi-fragile image authentication,” IEEE trans
    Circuits and systems for video technology, 2008.
    [26] X. T. Zeng, L. D. Ping, and X. Z. Pan, “A lossless robust data hiding scheme,”
    Pattern Recognition, 2010.

    無法下載圖示 全文公開日期 2020/08/27 (校內網路)
    全文公開日期 2025/08/27 (校外網路)
    全文公開日期 2030/08/27 (國家圖書館:臺灣博碩士論文系統)
    QR CODE