簡易檢索 / 詳目顯示

研究生: 王柏雄
Po-hsiung Wang
論文名稱: 植基於區塊式的高品質可回復式資料隱藏演算法
A Quality-Efficient Block-Based Reversible Data Embedding Algorithm
指導教授: 鍾國亮
Kuo-Liang Chung
口試委員: 廖弘源
Hong-Yuan Liao
黃詠淮
Yong-Huai Huang
謝仁偉
Jen-Wei Hsieh
楊偉楨
Wei-Jen Yang
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 34
中文關鍵詞: 影像區塊邊方向性差異擴張可回復式資料隱藏
外文關鍵詞: image block, edge direction, difference expansion, reversible data hiding
相關次數: 點閱:232下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 不同於傳統的資料隱藏技術,可回復式資料隱藏技術可以將隱藏的資料取出後得到原始影像內容而不會有任何的失真。在本篇論文中,我們將提出一套植基於區塊式的高品質可回復式資料隱藏演算法。在本方法中,首先將影像切割成指定大小的區塊,利用鄰近區塊的資訊估計目標區塊的邊方向性,進而依照該方向性來進行差異擴張法達到資料隱藏的效果。根據在數張常用的實驗影像上的實驗結果顯示,在相同的隱藏資料量下,所提出的植基於區塊式的高品質可回復式資料隱藏演算法較過去所提出的區塊式之可回復式資料隱藏演算法有著較佳的影像品質。


    Different from the conventional data hiding techniques, the reversible data hiding technique can recover the original image without any distortion after extracting the hidden data. In this thesis, a new quality-efficient block-based reversible data hiding algorithm is presented. In the proposed algorithm, we divide an image into a set of blocks with a specific size. Then, the edge direction of the target block can be estimated by its neighboring blocks. According the estimated edge direction, we can embed the hidden data by the difference expansion scheme. By experimenting on some typical test images, the results demonstrate that under the same embedding capacity, the proposed data hiding algorithm has better marked image quality than the previously published block-based reversible data hiding algorithm.

    論 文 摘 要I ABSTRACTII 總 目 錄III 圖 目 錄IV 表 目 錄V 第 一 章 緒論1 第 二 章 所提出之可回復式資料隱藏方法4 2.1 區塊分類6 2.2 差異擴張法(DIFFERENCE EXPANSION METHOD)10 2.3 像素溢位(OVERFLOW / UNDERFLOW)問題14 2.4 適應式門檻值的調整17 2.5 資料植入流程20 2.6 資料取出及回復原始圖流程22 第 三 章 實 驗 結 果23 第 四 章 結 論26 參考文獻27

    [1].C. C. Chang, G. M. Chen, and M. H. Lin, “Information hiding based on search-order coding for VQ indices,” Pattern Recognition Letters, vol. 25, pp. 1253–1261, 2004.
    [2].C. C. Chang, P. Y. Tsai, and M. H. Lin, “SVD-based digital image watermarking scheme,” Pattern Recognition Letters, vol. 26, pp. 1577–1586, 2005.
    [3].K. L. Chung, C. H. Shen, and L. C. Chang, “A novel SVD- and VQ-based image hiding scheme,” Pattern Recognition Letters, vol. 22, pp. 1051–1058, 2001.
    [4].K. L. Chung, W. N. Yang, Y. H. Huang, S. T. Wu, and Y. C. Hsu,“On SVD-based watermarking algorithm,” Applied Mathematics and Computation, vol. 188, pp.54–57, 2007.
    [5].I. J. Cox, M. Miller, and J. Bloom, Digital Watermarking, Morgan Kaufmann, San Francisco, CA, 2001.
    [6].M. Gkizeli, D. A. Pados, and M. J. Medley, “Optimal signature design for spread-spectrum steganography,” IEEE Trans. Circuits and Systems for Video Technology, vol. 16, pp. 391–405, 2007.
    [7].C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Trans. Image Processing, vol. 8, pp.58–68, 1999.
    [8].C. S. Lu, and H. Y. Mark Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Trans. Image Processing, vol. 10, pp. 1579–1592, 2001.
    [9].L. M. Marvel, C. G. Boncelet, and C. T. Retter, “Spread spectrum image steganography,” IEEE Trans. Image Processing, vol. 8, pp.1075–1083, 1999.
    [10].F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” in Proc. of the IEEE, Special Issue on Protection of Multimedia Content vol. 87, pp. 1062–1078, 1999.
    [11].H. T. Sencar, M. Ramkumar, and A. N. Akansu, Data Hiding Fundamentals and Applications, Academic Press, Orlando, FL, (2004).
    [12].J. Y. Hsiao, K. F. Chan, and J. M. Chang, “Block-based reversible data embedding,” Signal Processing, vol. 89, pp. 556-569, 2009.
    [13].A. M. Alattar., “Reversible watermark using difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, pp. 1147-1156, 2004.
    [14].J. Tian “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003.
    [15].D. M. Thodi., J. J. Rodriquez., “Reversible Watermarking by Prediction-Error Expansion,” in 6th IEEE Southwest Symposium on Image Analysis and Interpretation, pp. 21-25, 2004.
    [16].D. M. Thodi., J. J. Rodriquez, Senior Member, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. on Image Processing, vol. 16, pp.721-730, 2007.
    [17].J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” in Proc. of the SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, pp. 197–208, 2001.
    [18].C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery of an original image containing embedded data,” US Patent# 6 278 791, 2001.
    [19].B. Macq and F. Deweyand, “Trusted headers for medical images,” in DFG VIII-DII Watermarking Workshop, Erlangen, Germany, pp. 1–13, 1999.
    [20].Y. Q. Shi, Z. Ni, D. Zou, C. Liang and G. Xuan, “Lossless data hiding: fundamentals, algorithms and applications,” in Proc. of the 2004 International Symposium on Circuits and Systems, vol. 2, pp. II-33–II-36, 2004.
    [21].L. H. J. Kamstra and A. M. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Trans. Image Processing, vol. 14, pp. 2082–2090, 2005.
    [22].Y. Q. Ni, N. Ansari Shi, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits and Systems for Video Technology, vol. 16, pp. 354–362, 2006.
    [23].C. C. Chang, C. Y. Lin, and Y. H. Fan, “Lossless data hiding for color images based on block truncation coding,” Pattern Recognition, vol. 41, pp. 2347–2357, 2008.
    [24].Signal Image Process. Inst., Univ. Southern California, Los Angeles, Image Database [Online]. Available: http://sipi.usc.edu/database/.

    QR CODE