簡易檢索 / 詳目顯示

研究生: 蔡嘉晉
Jia-jin Tsai
論文名稱: 基於半色調技術之資料隱藏探討
Data Hiding with Digital Halftoning
指導教授: 郭景明
Jing-ming Guo
口試委員: 江正雄
Jen-shiun Chiang
蔡超人
Chau-ren Tsai
陳鴻興
Hung-shing Chen
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 中文
論文頁數: 75
中文關鍵詞: 半色調區塊截斷編碼資料隱藏
外文關鍵詞: Halftoning, Block Truncation Coding, Data hiding
相關次數: 點閱:243下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來數位資訊與網路的發展迅速,數位多媒體在網際網路容易被下載、竄改與破壞,因此智慧財產權的保護變得更重要。大部分多媒體在儲存空間或傳送時間皆以壓縮位元串流的型式來儲存,因此本論文在資訊隱藏提出兩種新穎的資料隱藏技術,分別為資料隱藏於半色調影像與資料隱藏於灰階影像,尤其資料隱藏於灰階影像還能達到壓縮的效果。
    首先,本論文提出複雜度適當的資料隱藏演算法來嵌入機密圖案至兩張或多張半色調影像,先前文獻未依據不同的變異數值添加不同雜訊的強度,在此可調式雜訊平衡錯誤擴散法提出的方法是根據區域變異數值,不同的變異數值使用品質-雜訊查表法與最佳化倍率來控制添加雜訊強度,實驗結果顯示本論文提出方法與先前文獻方法在維持相同影像品質效能下有較高的解碼率。
    此外,本論文提出另一個資料隱藏方法在有序抖動區塊截斷編碼影像的位元平面可彈性嵌入不同的資料量,其中有序抖動用於抖動量化區塊截斷編碼影像來避免先前區塊截斷編碼影像造成令人厭煩的假邊與區塊效應。實驗結果顯示適當複雜度可彈性嵌入的容量具有客觀良好的影像品質,除了正確解碼率維持100%外,如有需要還可在解碼端將有序抖動原始區塊截斷編碼影像重建。


    The digital information over Internet have been growing rapidly recently. Digital multimedia can easily be downloaded or manipulated and tampered intentionally. So the intellectual property protection becomes more important. Most multimedia is stored in compressed bit stream format to save the storage space or transmission time. This thesis proposes two novel techniques for data hiding, data hiding in halftoning images and data hiding in grayscale images, respectively. Notably, the proposed data hiding in grayscale images can also achieve compression benefit.
    First, this thesis presents a reasonable computational complexity data hiding algorithm to embed secret pattern into two or more halftone images. The former approaches in the literature do not consider noise strength according to the local variance value. The proposed Adaptive Noise-Balanced Error Diffusion (ANBEDF) method employs the Quality-Noise Look Up Table (QNLUT) and the optimized multipliers to control the adaptive noise strength according to the local variance value. The experimental results show that higher decoding rate is available under the same image quality performance than former approaches in the literature.
    Moreover, this thesis proposes another data hiding which can embed flexible amount of data in the bit map of an Ordered Dither Block Trumcation Coding(ODBTC)image, where the ordered dithering is used to dither the quantized BTC image to avoid the annoying false contour and blocking effect inherently existed in BTC image. Experimental results demonstrate that an objective good image quality image with flexible capacity and reasonable complexity is obtained. Moveover, the correct decoding rate of 100% is maintained, and the original host ODBTC image can also be reconstructed in the decoder when needed.

    摘要............................................i Abstract........................................ii 誌謝............................................iii 目錄............................................iv 圖表索引........................................vi 第一章 緒論...................................1 1.1 研究動機...............................1 1.2 研究目的...............................2 1.3 論文架構...............................4 第二章 數位半色調技術與區塊截斷編碼...........5 2.1 前言...................................5 2.2 有序抖動法.............................5 2.3 錯誤擴散法.............................9 2.4 區塊截斷編碼...........................11 第三章 影像資訊隱藏技術之文獻探討.............18 3.1 前言...................................18 3.1.1數位浮水印的目的...........................18 3.1.2 數位浮水印的特性..........................19 3.1.3 數位浮水印的能力..........................20 3.2 數位浮水印的用途.......................20 3.3 浮水印效能評估方式.....................21 3.3.1 統計方式...............................21 3.3.2 影像訊號雜訊比.........................21 3.3.3 浮水印正確解碼率.......................23 3.4 半色調影像資訊隱藏技術相關文獻.........24 3.5 區塊截斷編碼影像資訊隱藏技術相關文獻...26 第四章 查表法及可調式雜訊平衡之資料隱藏技術...29 4.1 簡介...................................29 4.2 可調式雜訊平衡資料隱藏程序.............29 4.3 品質-雜訊查表法程序....................31 4.4 實驗結果...............................41 4.5 小結...................................50 第五章 結合高效率壓縮之可還原式資料隱藏技術...51 5.1 簡介...................................51 5.2 有序抖動區塊截斷編碼...................51 5.3 影像隱藏程序...........................53 5.4 擷取資料程序...........................56 5.5 實驗結果...............................59 5.6 小結...................................67 第六章 結論與未來方向.........................68 參考文獻........................................70 作者簡介........................................75

    [1] R. Ulichney, Digital Halftoning. Cambridge, MA. MIT Press, 1987.
    [2] R. W. Floyd and L. Steinberg, “An adaptive algorithm for spatial gray scale,” in proc. SID 75 Digest. Society for Information Display, pp. 36-37, 1975.
    [3] J. F. Jarvis, C. N. Judice, and W. H. Ninke, “A survey of techniques for the display of continuous-tone pictures on bilevel displays,” Comp. Graph. Image Proc., vol. 5, pp. 13-40, 1976.
    [4] P. Stucki, “MECCA-A multiple-error correcting computation algorithm for bilevel image hardcopy reproduction,” Res. Rep. RZ1060, IBM Res. Lab., Zurich, Switzerland, 1981.
    [5] N. Memon, and P. W. Wong, “Protecting digital media content,” Commun. of the ACM, vol.41, pp. 35-43, July 1998.
    [6] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread specttum watermarking for Images, Audio and Video,” Proc. IEEE Int. Conf. Image processing, vol. 3, pp. 243-246, 1996.
    [7] M. Wu and B. Liu, “Watermarking for image authentication,” IEEE International Conference on Image Processing, vol. 2, pp. 437-441, Oct. 1998.
    [8] C. K. Yang and W. H. Tsai, “Improving block truncation coding by line and edge information and adaptive bit plane selection for gray-scale image compression,” pattern recognition letters 16, pp. 67-75, 1996.
    [9] H. K. Pan, Y. Y. Chen, and Y. C. Tseng, “A secure data hiding scheme for two –color images,” IEEE International Symposium on Comptuers and Communication, vol. 2, pp. 437-441, 1998.
    [10] S. C. Pei and J. M. Guo, “High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter,” IEEE Trans. Image Processing, vol. 15, no. 6, pp. 1665-1679, June 2006.
    [11] M. Mese and P. P. Vaidyanathan, “Optimized halftoning using dot diffusion and methods for inverse halftoning,” IEEE. Trans. Image Proc., vol. 9, no. 4, pp. 691-709, April 2000.
    [12] D. E. Knuth, “Digital halftones by dot diffusion,” ACM Trans. Graph., vol. 6, no. 4, pp. 245-273, Oct. 1987.
    [13] M. A. Seldowitz, J. P. Allebach, and D. W. Sweeney, “Synthesis of digital holograms by direct binary search,” Applied Optics. vol. 26, no. 14, pp. 2788-2798, July 1987.
    [14] A. Zakhor, S. Lin, and F. Eskafi, “A new class of B/W and color halftoning algorithm,” in Proc. ICASSP-91,(Toronto, Canada)vol. 4, pp. 2801-2804, May 1991.
    [15] M. Analoui, and J. P. Allebach, “Model based halftoning using direct binary search,” in Proc. SPIE, Human Vision, Visual Proc., Digital Display III, (San Jose, CA), vol. 1666, pp. 96-108, Feb. 1992.
    [16] D. Anastassion, “Error diffusion coding for A/D conversion,” IEEE. Trans. Cirs. Syst. vol. 36, no. 9, pp. 1175-1186, Sep. 1989.
    [17] D. Anastassiou and S. Kollias, “Digital image halftoning using neural networks,” Proc. SPIE, vol. 1001, 1988.
    [18] J. B. Mulligan and A. J. Ahumada, Jr. , “Principled halftoning based on models of human vision,” in Proc. SPIE, Human Vision, Visual Proc. , Digital Display III,(San Jose, CA), vol. 1666, pp. 109-121, Feb. 1992.
    [19] S. C. Pei and J. M. Guo, “Novel data hiding and blind decoding in dithering halftone images,” IEEE International Conference on Information, Communications and Signal Processing, Thailand, pp. 1006-1009, Dec. 2005.
    [20] J. R. Goldschneider, E. A. Riskin, and P. W. Wong, “Embedded multilevel error diffusion,” IEEE Trans. Image Processing, vol. 6, no. 7, pp. 956–964, July 1997.
    [21] D. Kacker, and J. P. Allebach, “Joint halftoning and watermarking,” IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1054-1068, April 2003.
    [22] G. Sharma and S. G. Wang, “Show-through watermarking of duplex printed documents,” SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, San Jose, 19-22, January 2004.
    [23] H. Z. Hel-Or, “Watermarking and copyright labeling of printed images,” Journal of Electronic Imaging, vol. 10, no. 3, pp. 794-803, July 2001.
    [24] Z. Baharav and D. Shaked, “Watermarking of dither halftoned images,” IS&T/SPIE International Conference on Security and Watermarking of Multimedia Content 3657, pp. 307-316, May 1999.
    [25] M. S. Fu and O. C. Au, “Hiding data in halftone image using modified data hiding error diffusion,” Proc. SPIE Conf. Visual Communication and Image Processing, vol. 4067, pp. 1671–1680, May 2000.
    [26] J. M. Guo, “A new model-based digital halftoning and data hiding designed with LMS optimization,” IEEE Trans. on Multimedia, vol. 9, no. 4, pp. 687–700, June 2007.
    [27] K. T. Knox, “Digital watermarking using stochastic screen patterns,” U.S. Patent 5734752.
    [28] M. S. Fu and O. C. Au, “Data hiding in halftone images by stochastic error diffusion,” IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1965-1968, May 2000.
    [29] M. S. Fu and O. C. Au, “Steganography in halftone images: Conjugate error diffusion,” Signal Processing, vol. 83, no. 10, p2171-2178, October 2003.
    [30] M. S. Fu and O. C. Au, “Watermarking technique for color halftone images,” IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 3, no. 17-21, pp. III381-III384, May 2004.
    [31] S. C. Pei and J. M. Guo, “Data hiding in halftone images with noise-balanced error diffusion,” IEEE Signal Processing Letters, vol. 10, no. 12, pp. 349-351, December 2003.
    [32] S. C. Pei and J. M. Guo, “Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images,” IEEE Trans. Circuits and Systems for video technology, vol. 13, no. 8, pp. 867-884, August 2003.
    [33] D. Augot, J.-M. Boucqueau, J.-F. Delaigle, C. Fontaine, and E. Goray, “Secure Delivery of Images over Open Networks,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1251-1266, July 1999.
    [34] C. C. Chang, M. H. Lin, and Y. C. Hu, “A Fast and Secure Image Hiding Scheme Based on LSB Substitution,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 399-416, 2002.
    [35] E. J. Delp and O. R. Mitchell, “Image compression using block truncation coding,” IEEE Trans. Commun., vol. 27, pp. 1335-1342, Sept. 1979.
    [36] O. R. Mitchell and E. J. Delp, “Multilevel graphics representation using block truncation coding,” Proc. IEEE, vol. 68 , no. 7, pp. 868-873, July 1980.
    [37] V. R. Udpikar and J. P. Raina, “BTC image coding using vector quantization,” IEEE Trans. Commun., vol. Comm-35, PP. 352-256, Sept., 1987.
    [38] Y. Wu and D. Coll, “BTC-VQ-DCT hybrid coding of digital images,” IEEE Trans. Commun., vol. 39, pp. 1283-1287, Sept., 1991.
    [39] C. S. Huang and Y. Lin, “Hybrid block truncation coding,” IEEE Signal Processing Letters, vol. 4, no. 12, pp. 328-330, Dec., 1997.
    [40] Y. G. Wu and S. C. Tai, “An efficient BTC image compression technique,” IEEE Trans. Consumer Electronics, vol. 44, issue 2, pp. 317-325, May, 1998.
    [41] Y. C. Hu, “Improved moment preserving block truncation coding for image compression,” Electronics Letters, vol. 39, issue 19, pp. 1377-1379, Sept. 18, 2003.
    [42] J. M. Guo, “Improved block truncation coding using modified error diffusion,” Electronics Letters, vol. 44, no. 7, pp. 462-464, March 2008.
    [43] D. L. Lau and G. R. Arce, “Modern Digital Halftoning,” New York: Marcel Dekker, 2001.
    [44] S. F. Tu and C. S. Hsu, “A BTC-based watermarking scheme for digital images,” International Journal on Information & Security, pp. 216-228, 2004.
    [45] M. H. Lin and C. C. Chang, “A novel information hiding scheme based on BTC,” International Conference on Computer and Information Technology, 2004.
    [46] J. M. Guo, “Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning,” Signal Processing, vol. 88, issue 6, pp. 1496-1510, June 2008.
    [47] C. Harris, and M. Stephens, “A combined corner and edge detector,” In Fourth Alvey Vision Conference, Manchester, UK, pp. 147–151, 1988.
    [48] D. G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints,” International Journal of Conflict Violence, 60, 2, pp. 91-110, 2004.

    QR CODE