簡易檢索 / 詳目顯示

研究生: 林佩洵
Pei-Hsun Lin
論文名稱: 基於階層式分群與向量量化的資訊隱藏技術研究
A Study of Information Hiding Based on Hierarchical Clustering and Vector Quantization
指導教授: 王乃堅
Nai-jian Wang
口試委員: 姚立德
Leeh-ter Yao
賴坤財
Kuen-tsair Lay
姚嘉瑜
Chia-yu Yao
陳雅淑
Ya-shu Chen
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2010
畢業學年度: 98
語文別: 中文
論文頁數: 68
中文關鍵詞: 資訊隱藏隱藏學向量量化階層式分群法影像壓縮
外文關鍵詞: data hiding, steganography, vector quantization, hierarchical clustering, image compression
相關次數: 點閱:262下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

近年來隨著網路技術的快速發展,為了保障使用者隱私權以及防止重要資訊的洩漏與破壞,各種有關資訊安全的研究陸續被提出。其中,隱藏學是一種新興的技術,將機密資訊藏入各種可以公開展示的掩護媒體中〈例如文字、影像、聲音和視訊等〉傳遞給接收者,因為這些多媒體資料是可公開的,不會引起有心人士的注意,且以此技術藏入重要資訊只會稍微降低掩護媒體的品質,藉由人類視覺系統的缺陷,可以避免遭受攻擊。
資訊隱藏容量和影像品質是判定方法好壞的兩大標準。本論文提出了基於向量量化壓縮的隱藏方式,利用階層式分群法,來提升資訊隱藏量並維持一定的影像品質。使用階層式分群法將相似的編碼字分為同一群,每一群所含的編碼字個數不同。因為每個影像區塊所對到的編碼字可以和同一群中的編碼字代換,如此整張圖會有很多種編碼字組合的呈現方式,我們利用此特性來提高資訊的隱藏量,且藏入機密資訊後的影像品質不會變差太多。實驗結果顯示,與目前已知的研究比較,本論文提出的方法的確可以使影像的品質較佳,且獲得更高的資訊隱藏量。


Steganography is a new technology to embed the secret data into various media, such as word, image, voice, audio, and so on. Through public transmission, we wish our secret data were sent without perception. In data hiding applications, the quality of the embedded image and the capacity of the embedded image are the two major considerations. In order to further improve the performance of the previous methods, we propose a novel data hiding scheme based on VQ compression and hierarchical clustering method. We partition the codewords into clusters according to similarity by a hierarchical clustering method in advance. Because an image block’s codewords can be replaced by each other in the same cluster, the whole image will be presented by many kinds of codewords’ combination. We use this feature to increase the hiding capacity and obtain an image with acceptable quality. Experimental results show that the performance of the proposed scheme is better than the previous VQ-based information hiding scheme in terms of the embedded capacity and the image quality.

摘要..........................................................................I Abstract.....................................................................II 誌謝........................................................................III 目錄.........................................................................IV 圖目錄.......................................................................VI 表目錄......................................................................VII 第一章緒論....................................................................1 1.1研究背景與動機.............................................................1 1.2研究目的與方法.............................................................4 1.3論文組織...................................................................5 第二章相關研究................................................................6 2.1資訊隱藏技術...............................................................6 2.1.1利用LSB的資訊隱藏技術....................................................8 2.1.2直方圖隱藏法............................................................11 2.2資料分群技術介紹..........................................................14 2.2.1主成分分析法(Principal Component Analysis)..............................14 2.2.2最短路徑分析法(Shortest Spanning Path)..................................15 2.3編碼簿的訓練:LBG演算法...................................................17 2.4資料壓縮..................................................................19 2.5向量量化壓縮法(Vector Quantization).......................................21 2.6有關向量量化的技術介紹....................................................25 2.6.1邊緣吻合向量量化(Side-Match Vector Quantization)......................25 2.6.2分類邊緣匹配向量量化(Classified Side-Match Vector Quantization).......27 2.7Jo和Kim的壓縮碼資訊隱藏技術...............................................29 第三章基於階層式分群與向量量化的資訊隱藏技術.................................31 3.1階層式概念................................................................31 3.2編碼簿分群................................................................32 3.3機密資訊嵌入方式..........................................................34 3.4機密資訊取出方式..........................................................35 3.5舉例說明..................................................................37 3.5.1機密資訊藏入範例........................................................37 3.5.2機密資訊取出範例........................................................39 第四章實驗結果...............................................................40 4.1實驗說明..................................................................40 4.2影像評估標準..............................................................42 4.3實驗結果與分析............................................................43 4.3.1VQ壓縮結果..............................................................43 4.3.2Jo和Kim的實驗結果.......................................................46 4.3.3基於階層式分群與向量量化的資訊隱藏技術實驗結果與分析....................49 第五章結論與未來展望.........................................................64 5.1結論......................................................................64 5.2未來展望..................................................................64 參考文獻.....................................................................65 作者簡介.....................................................................68

[1]A. P. Fabien, R. J. Anderson, and M. G. Kuhn, “Information Hiding – A Survey,” Proceedings of the IEEE Special Issue on Protection of Multimedia Content, Vol. 87, No. 7, pp. 1062-1078, 1999.
[2]C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal Least-significant-bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595, 2003.
[3]I. Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687, 1997.
[4]H. C. Huang, F. H. Wang, and J. S. Pan, “A VQ-based Robust Multi-Watermarking Algorithm,” IEICE Transactions on Fundamentals, Vol. 85-A, No. 7, pp. 1719-1726, 2002.
[5]Y. Linde, A. Buzo, R.M. Gray, “An Algorithm for Vector Quantizer Design,” IEEE Transactions on Communications, Vol. 28, No. 1, pp. 84-95, 1980.
[6]R.M. Gray, “Vector Quantization,” IEEE Acoustics, Speech and Signal Processing Magazine, Vol. 1, No. 2, pp. 4-29, 1984.
[7]C.C. Chung, W.L. Tai, C.C. Lin, “A Reversible Data Hiding Scheme Based on Side Match Vector Quantization,” IEEE Transactions on Circuit Systems Video Technology, Vol. 16, No. 10, pp. 1301-1308, 2006.
[8]M. Jo and H.D. Kim, “A Digital Watermarking Scheme Based on Vector Quantization,” IEICE Transactions on Information & Systems, Vol. E85-D, No. 6, pp. 1054-1056, 2006.
[9]T. Kim, “Side match and overlap match vector quantizers for images,” IEEE Transactions on Image Process, Vol. 1, No. 4, pp. 170-185, 1992.
[10]R. F. Chang and W. T. Chen, “Image Coding Using Variable-Rate Side-Match Finite-State Vector Quantization,” IEEE Transactions on Image Processing, Vol. 2, No. 1, pp. 104-108, 1993.
[11]C.C. Chung, D.C. Lin, T.S. Chen, “An Improved VQ Codebook Search Algorithm Using Principal Component Analysis,” Journal of Visual Communication and Image Representation, Vol. 8, No. 1, pp. 27-37, 1997.
[12]A. M. Alattar, “Reversible Watermarking Using the Difference Expansion of A Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156, 2004.
[13]C. C. Chang and T. C. Lu, “A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images,” The Journal of Systems and Software, Vol. 79, No. 12, pp. 1754-1766, 2006.
[14]C. C. Lee and H. C. Wu, “Adaptive Lossless Steganographic Scheme with Centralized Difference Expansion,” Pattern Recognition, Vol. 41, No. 6, pp. 2097-2106, 2008.
[15]C. C. Lin and N. L. Hsueh, “A Lossless Data Hiding Scheme Based on Three-pixel Block Differences,” Pattern Recognition, Vol. 41, No. 4, pp. 1415-1425, 2008.
[16]T. C. Lu and C. C. Chang, “Lossless Nibbled Data Embedding Scheme Based on Difference Expansion,” Image and Vision Computing, Vol. 26, No. 5, pp. 632-638, 2008.
[17]J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuit Systems Video Technology, Vol. 13, No.8, pp.890-896, 2003.
[18]M. Fallahpour and M. H. Sedaaghi, “High Capacity Lossless Data Hiding Based on Histogram Modification,” IEICE Electronics Express, Vol. 4, No. 7, pp. 205-210, 2007.
[19]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuit Systems and Video-Technology, Vol. 16, No. 3, pp. 354-362, 2006.
[20]U. C. Mehmet, S. Gaurav, M. T. Ahmet, and S. Eli, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, Vol. 14, No. 2, pp. 256-266, 2005.
[21]C. K. Chang and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004.
[22]C. C. Chang, W. C. Wu, and Y. C. Hu, “Lossless Recovery of A VQ Index Table with Embedded Secret Data,” Journal of Visual Communication and Image Representation, Vol. 18, No. 3, pp. 207-216, 2007.
[23]C. C. Chang, G. M. Chen, and M. H. Lin, “Information Hiding Based on Search-order Coding for VQ-indices,” Pattern Recognition Letters, Vol. 25, No. 11, pp. 1253-1261, 2004.
[24] Y. K. Chiang and P. Y. Tsai, “Steganography Using Overlapping Codebook Partition,” Signal Processing, Vol. 88, No. 5, pp. 1203-1215, 2008.
[25]Y. C. Hu, “High-capacity Image Hiding Scheme Based on Vector Quantization,” Pattern Recognition, Vol. 39, No. 9, pp. 1715-1724, 2006.
[26]C. Y. Lin and C. C. Chang, “Hiding Data in VQ-compressed Images Using Dissimilar Pairs,” Journal of Computers, Vol. 17, No. 2, pp. 3-10, 2006.
[27]Y. C. Lin and C. C. Wang, “Digital Images Watermarking by Vector Quantization,” Proceedings of National Computer Symposium, Vol. 3, pp.76-87, 1999.
[28]H. C. Wu and C. C. Chang, “A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique,” Computers and Security, Vol. 24, No. 6, pp. 460-471, 2005.
[29]C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible Hiding in DCT-based Compressed Image,” Information Sciences, Vol. 177, No. 13, pp. 2768-2786, 2007.
[30]S. P. Maity, M. K. Kundu, and T. S. Das, “Robust SS Watermarking with Improved Capacity,” Pattern Recognition Letters, Vol. 28, No. 3, pp.350-356, 2007.
[31]J. R. Slagle, C. L. Chang, S. Heller, “A Clustering and Data-Reorganization Algorithm,” IEEE Transactions on Systems, Man and Cybernetics, Vol. 5, pp. 125-158, 1975.
[32]C. P. Hsieh and H. W. Tseng, “Reversible Data Hiding by Histogram Modification,” The 19th IPPR Conference on Computer Vision, Graphics and Image Processing, Taoyuan, Taiwan, pp. 13-15, 2006.

QR CODE