系統識別號 | U0002-2207200510204200 |
---|---|
DOI | 10.6846/TKU.2005.00521 |
論文名稱(中文) | 適用於彩色影像的容忍失真壓縮資訊隱藏技術之研究 |
論文名稱(英文) | The Study of Steganographic Scheme with Tolerating Losing Compression Process for Color Image |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 93 |
學期 | 2 |
出版年 | 94 |
研究生(中文) | 林凱鈞 |
研究生(英文) | Kai-Chun Lin |
學號 | 692190555 |
學位類別 | 碩士 |
語言別 | 繁體中文 |
第二語言別 | |
口試日期 | 2005-06-23 |
論文頁數 | 64頁 |
口試委員 |
指導教授
-
黃仁俊
委員 - 王旭正 委員 - 謝景棠 |
關鍵字(中) |
資訊隱藏 JPEG壓縮 錯誤修正碼 誤差擴散法 |
關鍵字(英) |
Steganography JPEG Error Correction Error Diffusion |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
本論文提出一個容忍JPEG失真壓縮之資訊隱藏方法。我們的方法除了能隱藏大量的資訊於掩護影像(Cover image)內,產生的偽裝影像(Stego-image)與掩護影像於外觀上並無太大差異,從視覺觀察無法分辨兩者之間的差別,攻擊者亦無法偵測出該偽裝影像隱藏機密資料。由於數位影像需要佔用大量的儲存媒體,一般傳輸或儲存上皆會採用例如JPEG壓縮法等失真壓縮技術以減小影像之儲存空間,我們的方法產生的偽裝影像,可以使用JPEG來進行失真壓縮處理,增加實用上的價值,但即便如此,從壓縮過並解壓縮後的偽裝影像中萃取出的機密資料,仍然可以達到百分之百的正確率。這對如文、數字與程式等萃取出來有任何一位元發生錯誤將造成意義失真或不可執行的隱藏資料而言是非常重要的。本論文所提出之方法,提供這類資料一個安全隱密的傳輸管道,而這是過去學者們的方法所較少考慮的特質。 |
英文摘要 |
In this paper, we present a new steganographic scheme used to embed secret text data into color images. Not only preserve the visual quality, we can use JPEG to com-press the stego-image. JPEG is the most common used image compression technique which reduces the image size drastically without losing the image quality seriously. There are many steganographic scheme have been proposed, but most of them can’t tolerate JPEG compression. That is, after JPEG compressing, the hidden data will be damaged critically. If the embedding data are pictures, accuracy losing would be ac-cepted. But for text data embedding approaches, even one bit error will lead the ex-tracted data to be totally useless. In our scheme, the hidden data are encoded by error correction technique first. Then we embed the encoded data in the spatial domain di-rectly by adjusting the pixel relation in each 3×3 image block. We also adopt the concept of error diffusion method used in halftone technique to improve the image quality to human visual system. By this way, the extracted data from a compressed stego-image could be completely correct. |
第三語言摘要 | |
論文目次 |
目錄 第1章 緒論 1 1.1 資訊隱藏的歷史與背景 1 1.2 資訊隱藏技術之演變 5 1.3 研究動機與目的 11 1.4 論文結構 13 第2章 相關研究工作 14 2.1 低位元隱藏法(LSB-based embedding) 14 2.2 Wu和Tsai的方法 15 2.3 Wang和Pearmain的方法 17 第3章 容忍失真壓縮之資訊隱藏技術 19 3.1 隱藏方法(Embedding process) 21 3.2 萃取方法(Extracting process) 27 第4章 實驗結果 29 第5章 討論與分析 40 5.1 隱藏量分析 40 5.2 影像品質與壓縮率探討 41 5.3 安全性討論 42 5.3.1 Steganalysis based on JPEG compatibility 43 5.3.2 Visual attack 43 5.3.3 Chi-square attack 50 第6章 結論與未來方向 59 參考文獻 61 附錄A:英文論文稿 65 圖目錄 圖1-1:以加密方式進行秘密通訊的流程 2 圖1-2:以資訊隱藏方法進行秘密通訊的流程 4 圖1-3:資訊隱藏技術之分類 6 圖2-1:灰階度示意圖 14 圖2-2:差值表範例 16 圖2-3:由差值表判斷所能隱藏的資訊量 16 圖2-4:3×3區塊中間像素Pc與其八個相鄰像素 17 圖3-1:整體方法架構圖 21 圖3-2:區塊分割示意圖 23 圖3-3:區塊Bi像素值經過排序過後的結果 23 圖4-1:掩護影像Airplane(512×512) 30 圖4-2:藏入資料後的偽裝影像Stego-Airplane 30 圖4-3:掩護影像Airplane(512×512) 31 圖4-4:藏入資料後的偽裝影像Stego-Baboon 31 圖4-5:掩護影像Fruits(512×512) 32 圖4-6:藏入資料後的偽裝影像Stego-Fruits 32 圖4-7:掩護影像Lena(512×512) 33 圖4-8:藏入資料後的偽裝影像Stego-Lena 33 圖4-9:掩護影像Peppers(512×512) 34 圖4-10:藏入資料後的偽裝影像Stego-Peppers 34 圖4-11:以JPEG壓縮過的Stego-Airplane 37 圖4-12:以JPEG壓縮過的Stego-Baboon 38 圖4-13:以JPEG壓縮過的Stego-Fruits 38 圖4-14:以JPEG壓縮過的Stego-Lena 39 圖4-15:以JPEG壓縮過的Stego-Peppers 39 圖5-1:掩護影像Airplane的位元平面 45 圖5-2:偽裝影像Stego-Airplane的位元平面 45 圖5-3:掩護影像Baboon的位元平面 46 圖5-4:偽裝影像Stego-Baboon的位元平面 46 圖5-5:掩護影像Fruits的位元平面 47 圖5-6:偽裝影像Stego-Fruits的位元平面 47 圖5-7:掩護影像Lena的位元平面 48 圖5-8:偽裝影像Stego-Lena的位元平面 48 圖5-9:掩護影像Peppers的位元平面 49 圖5-10:偽裝影像Stego-Peppers的位元平面 49 圖5-11:Airplane經Chi-square attack分析的結果 52 圖5-12:Baboon經Chi-square attack分析的結果 53 圖5-13:Fruits經Chi-square attack分析的結果 54 圖5-14:Lena經Chi-square attack分析的結果 55 圖5-15:Peppers經Chi-square attack分析的結果 56 圖5-16:Airplane以亮度做Chi-square attack分析之結果 57 圖5-17:Baboon以亮度做Chi-square attack分析之結果 57 圖5-18:Fruits以亮度做Chi-square attack分析之結果 58 圖5-19:Lena以亮度做Chi-square attack分析之結果 58 圖5-20:Peppers以亮度做Chi-square attack分析之結果 58 表目錄 表4-1:使用不同的秘密金鑰產生的偽裝影像的影像品質 36 表4-2:使用JPEG壓縮過後的影像品質與壓縮率 37 表5-1:α=3與t=15時的影像品質與所能容忍的最大壓縮率 42 |
參考文獻 |
[1] F. Alturki and R. Mersereau, ”Secure blind image steganographic technique using discrete Fourier transformation,” IEEE Transactions on Image Processing, Vol. 2, 2001, pp. 542-545. [2] P.S.L.M. Barreto, H.Y. Kim, and V. Rijmen, ”Toward a Secure Pub-lic-key Blockwise Fragile Authentication Watermarking,” IEEE In-ternational Conference on Image Processing, Vol. 2, 2001, pp. 494-497. [3] F.L. Bauer, Decrypted Secrets – Methods and Maxims of Cryptology. Springer-Verlag, 1997. [4] L.H. Chen and J.J. Lin, “Mean Quantization Based Image Water-marking,” Image and Vision Computing, Vol. 21, Issue. 8, 2003, pp. 717-727. [5] J. Fridrich, ”Security of Fragile Authentication Watermarks with Lo-calization,” Proceedings of SPIE on Security and Watermarking of Multimedia Contents IV, Vol. 4675, 2002, pp. 691-700. [6] J. Fridrich, M. Goljan, and R. Du, “Steganalysis Based on JPEG Compatibility,” Proceedings of SPIE on Multimedia Systems and Applications IV, Vol. 4518, 2001, pp. 275-280. [7] M.S. Fu and O.C. Au, “Data Hiding Watermarking for Halftone Im-ages,” IEEE Transactions on Image Processing, Vol. 11, No. 4, 2002, pp. 477-484. [8] H.C. Huang, F.H. Wang, and J.S. Pan, ”A VQ-based Robust Multi-watermarking Algorithm,” IEICE Transactions on Fundamentals, Vol. E85-A, No. 7, 2002, pp. 1719-1726. [9] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, No. 2, 1998, pp. 26-34. [10] D. Kundur and D. Hatzinakos, ”Digital Watermarking Using Mul-tiresolution Wavelet Decomposition,” IEEE International Confer-ence on Acoustics, Speech, and Signal Processing, Vol. 5, 1998, pp. 2969-2972. [11] S.D. Lin and S.C. Shie, ”Improving Robustness of Visible Water-marking Schemes for Images,” IEEE International Symposium on Consumer Electronics, 2004, pp. 11-14. [12] C.C. Lin and W.H. Tsai, “Secret Image Sharing with Steganography and Authentication,” The Journal of Systems and Software, Vol. 73, No. 3, 2004, pp. 405-414. [13] T. Liu and Z.D. Qiu, ”A DWT-based Color Image Steganography Scheme,” IEEE International Conference on Signal Processing, Vol. 2, 2002, pp. 1568-1571. [14] D.C. Lou and J.L. Liu, “Steganographic Method for Secure Com-munications,” Computers and Security, Vol. 21, No. 5, 2002, pp. 449-460. [15] C.S. Lu, ”Dual Security-based Image Steganography,” IEEE Inter-national Conference on Multimedia and Expo, Vol. 2, 2003, pp. 489-492. [16] A. Lumini and D. Maio, ”Adaptive Positioning of a Visible Water-mark in a Digital Image,” IEEE International Conference on Multi-media and Expo, Vol. 2, 2004, pp. 967-970. [17] J. Meng and S.F. Chang, ”Embedding Visible Video Watermarks in the Compressed Domain,” International Conference on Image Proc-essing, Vol. 1, 1998, pp. 474-477. [18] E.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, ”Information Hid-ing – A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, 1999, pp. 1062-1078. [19] B. Pfitzmann, ”Information Hiding Terminology,” Proceedings of the First International Workshop on Information Hiding, 1996, pp. 347-350. [20] G.J. Simmons, ”The Prisoners’ Problem and Subliminal Channel,” Proceedings of Crypto ’83, 1984. [21] Y. Wang and A. Pearmain, “Blind Image Data Hiding Based on Self Reference,” Pattern Recognition Letters, Vol. 25, Issue 15, 2004, pp.1681-1689. [22] A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Sys-tems,” Proceedings of the Third International Workshop on Informa-tion Hiding, 1999, pp. 61-76. [23] H.W. Wong, O.C. Au, and Justy W. C. Wong, “A Data Hiding Tech-nique in JPEG Compressed Domain,” Proceedings of SPIE on Secu-rity and Watermarking of Multimedia Contents III, Vol. 4314, 2001, pp. 309-320. [24] M. Wu and B. Liu, ”Data Hiding in Binary Image for Authentication and Annotation,” IEEE Transactions on Multimedia, Vol. 6, Issue 4, 2004, pp. 528-538. [25] D.C. Wu and W.H. Tsai, “A Steganographic Method for Images by Pixel-value Differencing,” Pattern Recognition Letters, Vol. 24, Is-sue 9-10, 2003, pp.1613-1626. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信