系統識別號 | U0002-2806200512202300 |
---|---|
DOI | 10.6846/TKU.2005.00687 |
論文名稱(中文) | 可以忍受失真壓縮處理的資訊隱藏技術 |
論文名稱(英文) | Lossy Compression-Tolerant Data Hiding |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系博士班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 93 |
學期 | 2 |
出版年 | 94 |
研究生(中文) | 高泉合 |
研究生(英文) | Chuan-Ho Kao |
學號 | 889190095 |
學位類別 | 博士 |
語言別 | 英文 |
第二語言別 | |
口試日期 | 2005-05-31 |
論文頁數 | 87頁 |
口試委員 |
指導教授
-
施國琛
委員 - 廖弘源 委員 - 楊錦潭 委員 - 許輝煌 委員 - 黃仁俊 |
關鍵字(中) |
資訊隱藏 VQ JPEG 圖形失真壓縮 |
關鍵字(英) |
Data Hiding VQ JPEG Lossy Image Compression |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
在網際網路快速發展的時代中,資訊在公開網路上傳遞的數量也越來越多,有時候我們並不希望我們所傳遞的重要資訊或資料,被其他不相關的人所檢閱,因此漸漸的有了加解密技術的產生,但是只靠加解密技術已經不再能夠滿足現在的需求,因為加解密後所得的資訊會變為亂碼,在網路上傳遞亂碼不就是告訴大家這是重要的資訊,所以如果我們可以將亂碼隱藏在一份有意義的資料中,欺騙過破壞或偷窺者,便可以解決這樣的顧慮,在這篇論文中所提出的方法就是在於解決這方面問題,可以讓使用者將他們所要傳遞的重要資訊隱藏在一張圖形中,讓其他人誤會使用者只是在傳遞一張不重要的圖形,事實上裡面藏有其他重要的資訊。 有此可知,資訊隱藏技術既然是在於隱藏一份資訊,所做出來的技術就需要符合幾項條件,首先當我們將資料隱藏到一份有意義的資料中時,對於這份有意義的資料不能破壞太多,否則就喪失隱藏的原意,讓其他的使用者發現我們有東西隱藏在裡面,另外所能隱藏的量越多越好,這樣可以方便使用者隱藏多一點的東西。本文所提出的資訊隱藏方式是利用圖形來隱藏重要資訊,除了符合一般方法所擁有的這兩種特性外,我們的方法還可以使我們的圖形在忍受失真壓縮後,完整的將原本隱藏在內的資訊萃取出來,因為現在已經很少人使用沒有失真壓縮的圖形在網路上傳輸了,而且傳輸失真壓縮過的圖形檔案大小比較小,對於使用者來說是比較方便的,另外在失真壓縮後還能完整的取出原來的所有資料,才適合隱藏文字或不能損失任何位元的資料。 |
英文摘要 |
Lossy compression-tolerant data hiding methods are proposed in this thesis. Data hiding hides the confidential data secretly. The unauthorized people are difficult to detect hidden data. It provides a secure channel to transmit confidential information. Nowadays, it is a very important technique when we are progressively going to computer network age. There are many hiding method that have proposed. But the most of methods will lost an amount of hiding data after do the lossy compression process. However, there are few people will transmit no lossy compression image in the public internet. When people use our method, the receiver can extracts complete data correctly from the lossy compression image. It is fit to hide text data and transmit image in public internet environment now. The propose methods hide data in an image in conjunction with a lossy compression. The image which hides data is called a stego-image. The reverse algorithm extracts data correctly after receiving the stego-image (i.e., the image which hides data). Our mechanism saves the amount of data transmitted on the Internet. Also, it is difficult for human visual system to detect the difference between the original image and the steog-image. Besides, it can speed up transmission of stego-images and is regular that transmit lossy compression image on the internet now. |
第三語言摘要 | |
論文目次 |
CONTENTS LIST OF FIGURES ii LIST OF TABLES iii CHAPTER 1 INTRODUCTION 1 1.1 Motivation 2 1.2 Data Hiding Concepts 3 1.3 Overview 9 CHAPTER 2 RELATED WORK 11 2.1 Spatial Domain 11 2.2 Frequency Domain 14 2.2.1 Discrete Cosine Transformer 15 2.2.2 Discrete Wavelet Transformer 16 2.3 The Proposed Methods 17 CHAPTER 3 THE PROPOSED METHOD OF DATA HIDING BASED ON GRAY-LEVEL PIXEL VALUE CONTRASTIVE RELATION 19 3.1 Embedded and Extract data Phase 20 3.2 Experimental Results and Discussion 23 3.3 The Improvement of Data Hiding Capacity 30 3.4 Experiment and result 33 3.5 Discussion 36 3.5.1 Secure problem 42 3.5.2 Transparency and capacity 50 CHAPTER 4 THE PROPOSED METHOD OF A LOSSY COMPRESSION TOLERANT DATA HIDING METHOD BASED ON JPEG AND VQ 53 4.1 Introduction 54 4.2 Embedded and Extract data Phase 59 4.3 Experiment 67 4.4 Discussion 70 CHAPTER 5 CONCLUSIONS AND FUTURE RESEARCH 75 BIBLIOGRAPHY 78 LIST OF FIGURES Chapter 3 Figure 3-1 The chapter 3 of the Gospel According to Matthe ....................... 24 Figure 3-2 512×512 cover image......................................................................... 27 Figure 3-3 512×512 Stego-image ........................................................................ 28 Figure 3-4 The Introduction of Tamkang University ..................................... 37 Figure 3-5 The Introduction of Tamkang University of CSIE Department. 37 Figure 3-6 512×512 cover-image ........................................................................ 38 Figure 3-7 512×512 stego-image which embedded Fig. 3-4 data .................. 39 Figure 3-8 512×512 stego-image which embedded Fig. 3-5 data .................. 40 Figure 3-9 Lena bit-planes after embedded data ............................................ 44 Figure 3-10 F16 bit-planes after embedded data............................................. 45 Figure 3-11 Baboon bit-planes after embedded data...................................... 46 Figure 3-12 Boat bit-planes after embedded data ........................................... 47 Figure 3-13 Sailboat bit-planes after embedded data ..................................... 48 Figure 3-14 Toys bit-planes after embedded data........................................... 49 Chapter 4 Figure 4-1 The flow chart of our embed data .................................................. 65 Figure 4-2 The flow chart of our extract data .................................................. 66 Figure 4-3 The bit-planes of our experiment results (from MSBÆLSB) ...... 73 LIST OF TABLES Chapter 3 Table 3-1 Each image's PSNR value and can extracted 100% compression ratio after embedded Fig. 3-1 data ......................................................... 28 Table 3-2 Each image's PSNR value and can extracted 100% compression ratio after embedded Fig. 3-4 data ......................................................... 41 Table 3-3 Each image's PSNR value and can extracted 100% compression ratio after embedded Fig. 3-5 data ......................................................... 41 Chapter 4 Table 4-1 The experiment result........................................................................ 69 |
參考文獻 |
Adelson, E. H. (1990), “Digital Signal Encoding and Decoding Apparatus”, U.S. Patent, No.4939515. Anderson, R. J. and Petitcolas, F. A. P. (1998), “On The Limits of Steganography”, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, Vol. 16, No. 4, pp. 474–481. Anderson, R. J. ed. (1996), “Information Hiding: First International Workshop”, Lecture Notes in Computer Science, Isaac Newton Institute, Vol. 1174, Cambridge, England, Springer-Verlag, Berlin, Germany. Arnold, M. (2001), “Audio Watermarking”, Dr. Dobb’s Journal, pp.21–28. Barnett, R., and Pearson, D. E. (1998), “Attack Operators for Digitally Watermarked Images”, IEE Proceedings-Vision, Image and Signal Processing, Vol. 145, Issue 4, pp. 271–279. Barnett, R., and Pearson, D. E. (1998), “Frequency Mode L.R. Attack Operator for Digitally Watermarked Images”, Electronics Leters, Vol. 34, No. 19, pp. 1837–1839. Bender, W., Gruhl D., Morimoto, N. and Lu, A. (1996), "Techniques for data hiding", IBM System Journal, 35(3&4), pp. 313-336. Boland, F. M., Ó Ruanaidh, J. J. K. and Dautzenberg C. (1995), “Watermarking Digital Images for Copyright Protection”, in the Proceedings of the 5th IEE International Conference on Image Processing and its Application, Edinburgh, pp. 326–330. Braudaway, G.. W., Magerlein, K. A. and Minzer, F. C. (1996), “Protecting Publicly-Available Images with a Visible Image Watermark”, in the Proceedings of SPIE International Conference on Electronic Imaging, San Jose, CA, Vol. 2659, pp. 126-133. Celik, M.U., Sharma, G., Tekalp, A.M. and Saber, E. (Feb. 2005), “Lossless Generalized-LSB Data Embedding”, IEEE Transactions on Image Processing, Vol. 14, Issue 2, pp.253 – 266. Chan, C. K. and Cheng, L. M. (2004), “Hiding Data in Images by Simple LSB Substitution”, Pattern Recognition 37, pp. 469– 474. Chang, C. C., Chen, T. S., and Chung, L. Z. (2002), “A Steganographic Method Based upon JPEG and Quantization Table Modification”, Information Sciences, Vol. 141, pp. 123-138. Chang, C. C. and Tseng, H. W. (2004), “A Steganographic Method for Digital Images using Side Match”, Pattern Recognition, Vol. 25, pp. 1431-1437. Chang, C. K. and Cheng, L. M. (2004), “Hiding Data in Images by Simple LSB Substitution”, Pattern Recognition, Vol. 37, pp. 469-474. Chen, L. H., and Chang, H. M. (1999), “Two New Methods for Visible Digital Watermarking”, in the Proceedings of the Ninth National Conference of Information Security, pp. 23-26. Chen, T. S., Chang, C. C. (Oct. 1998), and Hwang, M. S., “A Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, pp. 1485-1488. Chen, T. S. and Hsu, Y. H. (1997), “Image Camouflage and Encryption Method Using Vector Quantization”, The Second Conference of Information Management and Its Application in Law Enforcement, Taipei, R.O.C., pp.97-106. Chung, K. L., Shen, C. H., and Chang, L. C. (2001), “A Novel SVD- and VQ-based Image Hiding Scheme”, Pattern Recognition Letters, Vol. 22, pp1051-1058. Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T. (1997), “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687. Di, Y., Liu, H., Ramineni, A. and Sen, A. (2003), “Detecting Hidden Information in Images: A Comparative Study”, Proc. of the 2nd Workshop on Privacy Preserving Data Mining (PPDM), Florida, USA, pp. 24-30. Du, W. C. and Hsu, W. J. (2003), “Adaptive Data Hiding based on VQ Compressed Images”, IEE Proceedings-Vision, Image and Signal Processing, Vol. 150, No. 4, pp. 233-238. Gersho, A. and Gray, R. M. (1991), “Vector Quantization and Signal Compression”, Kluwer Academic Publishers, Boston Hardbound, November. Gray, R. M. and Neuhoff, D. L. (1998), “Quantization”, IEEE Trans. Information Theory, Vol. 44, No. 6, pp. 2325-2383. Hartung, F. and Girod, B. (1997), “Watermarking of MPEG-2 Encoded Video Without Decoding and Re-encoding”, in the Proceedings Multimedia Computing and Networking 1997 (MMCN97), San Jose, CA, Vol. 3020, pp. 264-273. Hsieh, M. S. and Tseng, D. C. (2001), “Hiding Digital Watermarks Using Multiresolution Wavelet Transform”, IEEE Transactions on Industrial Electronics, Vol. 48, No. 5, pp.875-882, October. Huang, F. J. and Guan, Z. H. (Nov. 2004), “A Hybrid SVD-DCT Watermarking Method Based on LPSNR”, Pattern Recognition Letters, Vol. 25, pp. 1769-1775. Hsu, C. T. and Wu, J. L. (Jan. 1999), “Hidden Digital Watermarks in images”, IEEE Transactions on Image Processing, Vol. 8, No 1, pp.58-68. Hsu, C. T. and Wu, J. L. (1998), “DCT-Based Watermarking for Video”, IEEE Transactions on Consumer Electronics, Vol. 44, No. 1, pp. 206-215. Hsu, C. T. and Wu, J. L. (1996), “Hidden Signatures in Image”, in the Proceeding of International Conference On Image Processing, pp. 223–226. Iwata, M., Miyake, K. and Shiozaki, A. (Apr. 2004), “Digital Steganography Utilizing Features of JPEG Images”, IEICE Transactions on Fundamentals, Vol. E87-A No. 4, pp. 929- 936. Jiang, J. and Armstrong, A. (Nov. 2002), “Data Hiding Approach for Efficient Image Indexing”, Electronics Letters, Vol. 38, Issue 23 , pp. 1424 -1425. Johnson, N. F. and Jajodia, S. (Feb. 1998), “Exploring Steganography: Seeing the Unseen”, IEEE Computer Magazine, Vol. 31, No. 2, pp. 26-34. Kahn, D. (1996), “The Codebreakers: The Story of Secret Writing”, New York, U.S.A.: Scribner. Kutter, M., Jordan, F. and Bossen, F. (Apr. 1998), “Digital Signature of Color Images using Amplitude Modulation”, J. Electron. Imaging 7 (2), pp.326-332. Langelaar, G. C. and Lagendijk, R. L. (Jan. 2001), “Optimal Differential Energy Watermarking of DCT Encoded Images and Video”, IEEE Transactions on Image Processing, Vol. 10, No. 1, pp. 148-158. Langelaar, G. C., Lagendijk, R. L. and Biemond, J. (Sep. 1998), “Removing Spatial Spread Spectrum Watermarks by Non-linear Filtering,” in 9th European Signal Processing Conference (EUSIPCO’98), Island of Rhodes, Greece, pp. 2281-2284. Liaw, M. S. and Chen, L. H. (Nov. 1997), “An Effective Data Hiding Method”, in the Proceeding of the Sixth National Conference on Science and Technology of National Defense, Vol. 2, Taoyuan, Taiwan, pp.534-540. Lee, Y. K. and Chen, L. H. (1999), “An Adaptive Image Steganographic Model Based on Minimum-Error Replacement”, in the Proceedings of the Ninth National Conference on Information Security, Taichung, Taiwan, pp. 8-15, May. 14-15. Lin, C. C. and Tsai, W. H. (Nov. 2004), “Secret Image Sharing with Steganography and Authentication”, The Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414. Linde, Y., Buzo, A. and Gray, R.M. (1980), “An Algorithm for Vector Quantizer Design”, IEEE Transactions on Communications, Vol. Com-28, No. 1, pp. 84-95. Liu, J.C. and Chen, S.Y. (2000), “Fast Two-Layer Image Watermarking Without Resorting to Original Image and Watermark”, in the Proceedings of joint Conference of International computer Symposium, pp. 231-238, Taiwan, Republic of China. Liu, J.C. and Chen, S.Y. (Sep. 2001), “Fast Two-Layer Image Watermarking Without Resorting to Original Image and Watermark”, Image and Vision Computing, Vol. 19, No 14, pp. 1083-1097. Lou, D. C. and Sung, C. H. (June 2004), “A Steganography Scheme for Secure Communication Based on the Chaos and Euler Theorem”, IEEE Transactions on Multimedia, Vol. 6, No. 3, pp. 501-509. Manicca, S. S. and Bourbakis N. (2004), “Lossless Compression and Information Hiding in Images”, Pattern Recognition, Vol. 37, pp. 475-486. Marvel, L. M., Retter, C. T., and Boncelet, C. G. (1998), “Hiding Information in Images”, in the Proceedings of ICIP 98, Vol. 2, pp: 396-398. Moulin, P. and Mihcak, M. K. (2002), “A Framework for Evaluating the Data-Hiding Capacity of Image Sources”, IEEE Trans. on Image Processing, Vol. 11(9), pp. 1029-1042. Newman, B. (1940), Secrets of German Espionage, London: Robert Hale Ltd. Noda, H., Spaulding J., Shirazi, M. N. and Kawaguchi, E. (2002), “Application of Bit-Plane Decomposition Steganography to JPEG2000 Encoded Images”, IEEE Signal Processing Letters, Vol. 9(12), pp. 410-413. Pennebaker W. B. and Mitchell J. L. (1993), JPEG: Still Image Data Compression Standard. New York: Van Nostrand Reinhold. Petitcolas, F. A. P. (1998), “MP3Stego”, <http://www.cl.cam.ac.uk/~fapp2 /steganography/>. Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. (1999), “Information Hiding – A Survey”, in the Proceedings of the IEEE, special issue on protection of multimedia content, 87(7), pp. 1062–1078. Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. (1998), “Attacks on Copyright Marking Systems”, David Aucsmith, Ed., Second workshop on information hiding, in Vol. 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, pp. 218-238. Pfitzmann, B. (1996), “Information Hiding Terminology”, Information Hiding (Anderson, R. et.), Lecture Notes in Computer Science, Vol. 1174, Springer, pp. 347-350. Pitas, I. (1996), “A Method for Signature Casting on Digital Images”, in International conference on Image Processing, Vol. 3, pp. 215-218. Stevens, G. W. W. (1968), Microphotography–Photography and photo-fabrication at extreme resolutions. London: Chapman & Hall. Swanson, M. D., Xu, B. and Tewfik, A. H. (1996), “Robust Data Hiding for Images”, In 7th Digital Signal Processing Workshop (DSP96), IEEE, Loen, Norway, pp. 37-40. The New Testament Revised Standard Version And Chinese Union Version: The Gospel According to Matthew Chapter 3, pp. 5-7 (1985). Thien , C. C. and Lin, J. C. (2003), “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function”, Pattern Recognition, Vol.36, pp.2875-2881. Walton, S. (1995), “Image Authetication for A Slippery New Age”, Dr. Dobb’s Journal, pp. 18-26. Wang, S. J. (2005), “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image”, Applied Mathematics and Computation, Vol. 164, Issue 1, pp. 99 - 116, May. Wang, Y. and Pearmain A. (2004), “Blind Image Data Hiding Based on Self Reference”, Pattern Recognition, Vol. 25, pp. 1681-1689. Westfeld, A. (2001), “F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis”, Lecture Notes in Computer Science, Vol. 2137, pp. 289-302. Westfeld, A. and Pfitzmann A. (2000), “Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools-and Some Lessons Learned”, Lecture Notes in Computer Science, Vol. 1798, pp. 61-75. Wong , P. H. W. and Au, O. C. (2003), “A Capacity Estimation Technique for JPEG-to-JPEG Image Watermarking”, IEEE Transaction on Circuits and Systems for Video Technology, Vol.13, No. 8, pp.746-752, Aug.. Wu, D. C. and Tai, W. S. (2003), “A Steganographic Method for Images by Pixel-Value Differencing”, Pattern Recognition Letters, vol. 24, pp. 1613-1626. Wu, M. Y., Ho, Y. K. and Lee, J. H. (2004), “An Iterative Method of Palette-Based Image Steganography”, Pattern Recognition Letter, Vol. 25, pp. 301-309. Yu, P. T., Tsai, H. H., and Kin, J. S. (2001), “Digital Watermarking Based on Neural Networks for Color Images”, Signal Processing, Vol. 81, pp. 663-671. Zhang, X. P. and Wang S. Z. (2005), “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity”, IEEE Signal Processing Letters, Vol. 12, No. 1, pp. 67-70, Jan.. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信