研究生: |
林佩洵 Pei-Hsun Lin |
---|---|
論文名稱: |
基於階層式分群與向量量化的資訊隱藏技術研究 A Study of Information Hiding Based on Hierarchical Clustering and Vector Quantization |
指導教授: |
王乃堅
Nai-jian Wang |
口試委員: |
姚立德
Leeh-ter Yao 賴坤財 Kuen-tsair Lay 姚嘉瑜 Chia-yu Yao 陳雅淑 Ya-shu Chen |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 電機工程系 Department of Electrical Engineering |
論文出版年: | 2010 |
畢業學年度: | 98 |
語文別: | 中文 |
論文頁數: | 68 |
中文關鍵詞: | 資訊隱藏 、隱藏學 、向量量化 、階層式分群法 、影像壓縮 |
外文關鍵詞: | data hiding, steganography, vector quantization, hierarchical clustering, image compression |
相關次數: | 點閱:262 下載:3 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來隨著網路技術的快速發展,為了保障使用者隱私權以及防止重要資訊的洩漏與破壞,各種有關資訊安全的研究陸續被提出。其中,隱藏學是一種新興的技術,將機密資訊藏入各種可以公開展示的掩護媒體中〈例如文字、影像、聲音和視訊等〉傳遞給接收者,因為這些多媒體資料是可公開的,不會引起有心人士的注意,且以此技術藏入重要資訊只會稍微降低掩護媒體的品質,藉由人類視覺系統的缺陷,可以避免遭受攻擊。
資訊隱藏容量和影像品質是判定方法好壞的兩大標準。本論文提出了基於向量量化壓縮的隱藏方式,利用階層式分群法,來提升資訊隱藏量並維持一定的影像品質。使用階層式分群法將相似的編碼字分為同一群,每一群所含的編碼字個數不同。因為每個影像區塊所對到的編碼字可以和同一群中的編碼字代換,如此整張圖會有很多種編碼字組合的呈現方式,我們利用此特性來提高資訊的隱藏量,且藏入機密資訊後的影像品質不會變差太多。實驗結果顯示,與目前已知的研究比較,本論文提出的方法的確可以使影像的品質較佳,且獲得更高的資訊隱藏量。
Steganography is a new technology to embed the secret data into various media, such as word, image, voice, audio, and so on. Through public transmission, we wish our secret data were sent without perception. In data hiding applications, the quality of the embedded image and the capacity of the embedded image are the two major considerations. In order to further improve the performance of the previous methods, we propose a novel data hiding scheme based on VQ compression and hierarchical clustering method. We partition the codewords into clusters according to similarity by a hierarchical clustering method in advance. Because an image block’s codewords can be replaced by each other in the same cluster, the whole image will be presented by many kinds of codewords’ combination. We use this feature to increase the hiding capacity and obtain an image with acceptable quality. Experimental results show that the performance of the proposed scheme is better than the previous VQ-based information hiding scheme in terms of the embedded capacity and the image quality.
[1]A. P. Fabien, R. J. Anderson, and M. G. Kuhn, “Information Hiding – A Survey,” Proceedings of the IEEE Special Issue on Protection of Multimedia Content, Vol. 87, No. 7, pp. 1062-1078, 1999.
[2]C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal Least-significant-bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595, 2003.
[3]I. Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687, 1997.
[4]H. C. Huang, F. H. Wang, and J. S. Pan, “A VQ-based Robust Multi-Watermarking Algorithm,” IEICE Transactions on Fundamentals, Vol. 85-A, No. 7, pp. 1719-1726, 2002.
[5]Y. Linde, A. Buzo, R.M. Gray, “An Algorithm for Vector Quantizer Design,” IEEE Transactions on Communications, Vol. 28, No. 1, pp. 84-95, 1980.
[6]R.M. Gray, “Vector Quantization,” IEEE Acoustics, Speech and Signal Processing Magazine, Vol. 1, No. 2, pp. 4-29, 1984.
[7]C.C. Chung, W.L. Tai, C.C. Lin, “A Reversible Data Hiding Scheme Based on Side Match Vector Quantization,” IEEE Transactions on Circuit Systems Video Technology, Vol. 16, No. 10, pp. 1301-1308, 2006.
[8]M. Jo and H.D. Kim, “A Digital Watermarking Scheme Based on Vector Quantization,” IEICE Transactions on Information & Systems, Vol. E85-D, No. 6, pp. 1054-1056, 2006.
[9]T. Kim, “Side match and overlap match vector quantizers for images,” IEEE Transactions on Image Process, Vol. 1, No. 4, pp. 170-185, 1992.
[10]R. F. Chang and W. T. Chen, “Image Coding Using Variable-Rate Side-Match Finite-State Vector Quantization,” IEEE Transactions on Image Processing, Vol. 2, No. 1, pp. 104-108, 1993.
[11]C.C. Chung, D.C. Lin, T.S. Chen, “An Improved VQ Codebook Search Algorithm Using Principal Component Analysis,” Journal of Visual Communication and Image Representation, Vol. 8, No. 1, pp. 27-37, 1997.
[12]A. M. Alattar, “Reversible Watermarking Using the Difference Expansion of A Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156, 2004.
[13]C. C. Chang and T. C. Lu, “A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images,” The Journal of Systems and Software, Vol. 79, No. 12, pp. 1754-1766, 2006.
[14]C. C. Lee and H. C. Wu, “Adaptive Lossless Steganographic Scheme with Centralized Difference Expansion,” Pattern Recognition, Vol. 41, No. 6, pp. 2097-2106, 2008.
[15]C. C. Lin and N. L. Hsueh, “A Lossless Data Hiding Scheme Based on Three-pixel Block Differences,” Pattern Recognition, Vol. 41, No. 4, pp. 1415-1425, 2008.
[16]T. C. Lu and C. C. Chang, “Lossless Nibbled Data Embedding Scheme Based on Difference Expansion,” Image and Vision Computing, Vol. 26, No. 5, pp. 632-638, 2008.
[17]J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuit Systems Video Technology, Vol. 13, No.8, pp.890-896, 2003.
[18]M. Fallahpour and M. H. Sedaaghi, “High Capacity Lossless Data Hiding Based on Histogram Modification,” IEICE Electronics Express, Vol. 4, No. 7, pp. 205-210, 2007.
[19]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuit Systems and Video-Technology, Vol. 16, No. 3, pp. 354-362, 2006.
[20]U. C. Mehmet, S. Gaurav, M. T. Ahmet, and S. Eli, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, Vol. 14, No. 2, pp. 256-266, 2005.
[21]C. K. Chang and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004.
[22]C. C. Chang, W. C. Wu, and Y. C. Hu, “Lossless Recovery of A VQ Index Table with Embedded Secret Data,” Journal of Visual Communication and Image Representation, Vol. 18, No. 3, pp. 207-216, 2007.
[23]C. C. Chang, G. M. Chen, and M. H. Lin, “Information Hiding Based on Search-order Coding for VQ-indices,” Pattern Recognition Letters, Vol. 25, No. 11, pp. 1253-1261, 2004.
[24] Y. K. Chiang and P. Y. Tsai, “Steganography Using Overlapping Codebook Partition,” Signal Processing, Vol. 88, No. 5, pp. 1203-1215, 2008.
[25]Y. C. Hu, “High-capacity Image Hiding Scheme Based on Vector Quantization,” Pattern Recognition, Vol. 39, No. 9, pp. 1715-1724, 2006.
[26]C. Y. Lin and C. C. Chang, “Hiding Data in VQ-compressed Images Using Dissimilar Pairs,” Journal of Computers, Vol. 17, No. 2, pp. 3-10, 2006.
[27]Y. C. Lin and C. C. Wang, “Digital Images Watermarking by Vector Quantization,” Proceedings of National Computer Symposium, Vol. 3, pp.76-87, 1999.
[28]H. C. Wu and C. C. Chang, “A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique,” Computers and Security, Vol. 24, No. 6, pp. 460-471, 2005.
[29]C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible Hiding in DCT-based Compressed Image,” Information Sciences, Vol. 177, No. 13, pp. 2768-2786, 2007.
[30]S. P. Maity, M. K. Kundu, and T. S. Das, “Robust SS Watermarking with Improved Capacity,” Pattern Recognition Letters, Vol. 28, No. 3, pp.350-356, 2007.
[31]J. R. Slagle, C. L. Chang, S. Heller, “A Clustering and Data-Reorganization Algorithm,” IEEE Transactions on Systems, Man and Cybernetics, Vol. 5, pp. 125-158, 1975.
[32]C. P. Hsieh and H. W. Tseng, “Reversible Data Hiding by Histogram Modification,” The 19th IPPR Conference on Computer Vision, Graphics and Image Processing, Taoyuan, Taiwan, pp. 13-15, 2006.