Basic Search / Detailed Display

Author: 吳旻穎
Min-Ying Wu
Thesis Title: 利用直方圖偏移與祕密共享增強雲端影像資料之安全性與私密性
Improving Security and Privacy of Images on Cloud Storage by Histogram Shifting and Secret Sharing
Advisor: 呂政修
Jenq-Shiou Leu
Committee: 石維寬
Hsing-Lung Chen
Ray-Guang Cheng
Degree: 碩士
Department: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
Thesis Publication Year: 2015
Graduation Academic Year: 103
Language: 中文
Pages: 45
Keywords (in Chinese): 雲端儲存裝置不可視的數位浮水印直方圖偏移可回復的資料嵌入方式秘密共享
Keywords (in other languages): Cloud storages, invisible digital watermarking, histogram shifting, reversible data hiding, secret sharings
Reference times: Clicks: 163Downloads: 0
School Collection Retrieve National Library Collection Retrieve Error Report
  • 隨著智慧型裝置的興起與普及,人們越來越容易利用手邊的行動裝置將眼前的景物拍攝下來並透過行動網路將這些圖像上傳到雲端儲存裝置。在今日,雲端儲存裝置廣泛的被用來存放許多個人的多媒體影像,然而,這些上傳在網路上的私人影像大多被存在公開網域中,因此他們存在著許多潛在的風險,例如:影像資料外洩、竄改。為了能夠避免這些潛在的問題,我們提出一套有效的系統,整合了不可視的數位浮水印和影像遮罩的技術並利用直方圖偏移的方法加以實踐。這種基於直方圖修改的影像處理是一種可回復的資料隱藏方式,而且我們能用以確保影像資料的完整性和機密性。此外,我們利用秘密共享將原有的金鑰拆解成數把密鑰並儲存在不同的IP區域,用來加強反解時存取密鑰的安全性。最後,我們展示了實驗的結果,證明本篇所提出的系統確實能有效的避免外部惡意的使用者存取,並成功的保護私人的影像資料。

    Nowadays people can easily use any smart device at hand to capture scenery and then upload it to the cloud storage. Cloud storages are widely used for storing the generated multimedia content. However, the risk of potential private data leakage may exist since cloud storages are normally in a public domain. To enhance the security and privacy of images on the cloud storage, we proposed an integrated scheme evolving invisible digital watermarking and masking which are based on the histogram shifting method. The histogram modification based scheme can achieve reversible data hiding, to ensure the integrity and the confidentiality of the image data. Additionally, we use the secret sharing scheme to keep the secret keys to further improve the security of data access. The evaluation results show that the proposed system can effectively prevent the malicious user from accessing the private images.

    第 1 章緒論1 第 2 章背景知識與相關研究4 2.1 可完全復原之影像處理技術4 2.2 影像品質評估6 2.3 相關系統研究8 第 3 章系統架構10 3.1 系統架構圖10 3.2 系統流程圖11 3.3 加密演算法13 3.4 解密演算法18 第 4 章實驗結果與系統評估20 4.1 數位浮水印處理20 4.2 遮罩處裡24 4.3 影像品質評估28 4.4 秘密共享安全性分析30 第 5 章結論35 參考文獻36

    [1]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol.35, no.3.4, pp.313-336, 1996.
    [2]H. Wang, S. Wu, M. Chen, and W. Wang, "Security protection between users and the mobile media cloud," Communications Magazine, IEEE, vol.52, no.3, pp.73-79, March 2014.
    [3]A. Shamir, "How to Share a Secret," Commun. ACM, vol.22, no.11, pp.612-613, 1979.
    [4]J. Tian, "Reversible data embedding using a difference expansion," Circuits and Systems for Video Technology, IEEE Transactions on, vol.13, no.8, pp.890-896, Aug. 2003.
    [5]Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," Circuits and Systems for Video Technology, IEEE Transactions on, vol.16, no.3, pp.354-362, March 2006
    [6]H.-T. Wu, J.-L. Dugelay, and Y.-Q. Shi, "Reversible Image Data Hiding with Contrast Enhancement," Signal Processing Letters, IEEE, vol.22, no.1, pp.81-85, Jan. 2015
    [7]S.-K. Lee, Y.-H. Suh, and Y.-S. Ho, "Reversible Image Authentication Based on Watermarking," Multimedia and Expo, 2006 IEEE International Conference on, pp.1321-1324, July 2006.
    [8]Q. H.-T., M. Ghanbari, "Scope of validity of PSNR in image/video quality assessment," Electronics Letters , vol.44, no.13, pp.800-801, June 19 2008
    [9]Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," Image Processing, IEEE Transactions on , vol.13, no.4, pp.600-612, April 2004
    [10]C. Wang, B.Zhang, K. Ren, J.M. Roveda, "Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud," Emerging Topics in Computing, IEEE Transactions on , vol.1, no.1, pp.166-177, June 2013
    [11]D. Liu, W. Liu, G. Zhang, "An Adaptive Watermarking Scheme Based on Nonsubsampled Contourlet Transform for Color Image Authentication," Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for , vol., no., pp.748-752, 18-21 Nov. 2008
    [12]V.M. Potdar, S. Han, E. Chang, "Fingerprinted secret sharing steganography for robustness against image cropping attacks," Industrial Informatics, 2005. INDIN '05. 2005 3rd IEEE International Conference on , vol., no., pp.717-724, 10-12 Aug. 2005
    [13]R. Hamzaoui, D. Saupe (May 2006). Barni, Mauro, ed. "Fractal Image Compression". Document and image compression (CRC Press) 968: 168–169. ISBN 9780849335563. Retrieved 5 April 2011
    [14]R. Gracia-Tinedo, M. Sanchez Artigas, A. Moreno-Martinez, C. Cotes, P. Garcia Lopez, "Actively Measuring Personal Cloud Storage," Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on , vol., no., pp.301-308, June 28 2013-July 3 2013