| 研究生: |
李岳霖 Li-Yueh-Lin |
|---|---|
| 論文名稱: |
使用差值編碼技術隱藏AMBTC壓縮影像數據以實現高質量影像 AMBTC Compressed Image Data-Hiding for High Image Quality Using Difference Encoding Strategy |
| 指導教授: |
張大中
Dah-Chung Chang |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 通訊工程學系在職專班 Executive Master of Communication Engineering |
| 論文出版年: | 2021 |
| 畢業學年度: | 109 |
| 語文別: | 中文 |
| 論文頁數: | 82 |
| 中文關鍵詞: | AMBTC 、資訊隱藏 、動能絕對值區塊截短碼 、PSNR值 、差異擴張法 |
| 外文關鍵詞: | AMBTC, Data hiding, Absolute moment block truncation coding, PSNR, difference expansion |
| 相關次數: | 點閱:21 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
摘要
在資訊發達的數位時代,隨著網際網路的普及,任何的數位資訊都能透過網際網路廣泛地傳播與散佈,然而享受數位科技帶來的便捷與商機時,有些潛在的問題,比如隱私權及智慧財產權侵犯,著作物的違法複製、歪曲、偽造、割裂或篡改,資料竊取、竊聽與偷窺等,因此,要如何保護數位資料在網路上傳輸時的安全,便成為現今數位時代不容忽視的重要議題。
近年來,資訊安全技術不斷的被學者所提出,例如:密碼學、機密共享及資訊隱藏等,各種資訊安全皆有不同的優缺點。例如,傳送方將數位資料以金鑰加密產生密文,密文透過網路傳送到接收方,再以相同的金鑰做解密,以取得機密資料。且因駭客沒有金鑰可以解密,但駭客可以攔截並破壞機密資料,再將已破壞的機密資料傳送給接收方,如此接收方即使有金鑰也無法還原原始機密。
為了解決這樣的問題,已有眾多學者提出資訊隱藏的概念,當資訊隱藏在嵌入更多的機密數據及數值較大的情況下,本文提出了運用差值編碼實現高品質偽裝影像資訊隱藏方法。該方法使用局部特徵和全域特徵,鄰近機密數據將大多數機密數據轉換為較小的值。反之,一些機密數據被轉換為較大的值。由於嵌入較小的值不會引起嚴重的圖像失真問題,因此,在具有相同嵌入率的情況下,該方法的圖像質量高於以前的方法。
關鍵詞:資訊隱藏、動能絕對值區塊截短碼、PSNR值、差異擴張法。
Abstract
Any digital information can be transmitted widely by internet as Internet become universal. It implies that the digital techniques make that life become convenience. However, there are some potential issues, e.g., private, copyright protection, information copy, tampering, and so on. Therefore, how to protect the digital data transmitted on Internet becomes an important issue.
Recently, information security techniques have been proposed continually, e.g., cryptography, secret sharing, and data hiding. Each information security technique owns different advantages and disadvantages. For example, a sender used key to encrypt digit information as cipher. After transmitting cipher to receiver, `the information can be decrypt to obtain secret data. Although hackers do not have key to decrypted data, he/she can intercept or destroy data, making that receiver cannot obtain correct information.
In order to solve this problem, many scholars proposed the concepts of data hiding. In this paper, a difference encode method is proposed to embed more secret data, where the secret data is large. The proposed method used local and global characteristic to transform most secret data into the smaller values. On contrary, a few secret data are converted into the larger values. Since embedding the smaller value does not invoke serious image distortion, the proposed method has better image quality than the previous method with the same embedding ratio.
Keyword: Data hiding, Absolute moment block truncation coding, PSNR, difference expansion
參考文獻
[1] D. Coltuc and J. M. Chassery, “Very fast watermarking by reversible contrast mapping,” IEEE Signal Processing Letters, vol. 14, no. 4, pp. 255-258, 2007.
[2] C. C. Chang, T. D. Kieu, and Y. C. Chou, “Reversible data hiding scheme using two steganographic images,” Proceedings of IEEE Region 10 International Conference on Tencon, pp. 1-4, 2007.
[3] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006.
[4] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, 2003.
[5] D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible watermarking,” Proceedings of IEEE Conference on Image Processing, vol. 3, pp. 1549-1552, 2004.
[6] Y. Liu, L. Ju, M. Hu, X. Ma, and H. Zhao, “A robust reversible data hiding scheme for H.264 without distortion drift,” Neurocomputing, vol. 151, no. 3, pp. 1053-1062, 2015.
[7] D. Xu, R. Wang, and Y. Q. Shi, “An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 410-422, 2014.
[8] H. L. Yeh, S. T. Gue, P. Tsai, and W. K. Shih, “Reversible video data hiding using neighbouring similarity,” IET Signal Processing, vol. 8, no. 6, pp. 579-587, 2014.
[9] A. Nishimura, “Reversible audio data hiding using linear prediction and error expansion,” Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 318-321, 2011.
[10] H. J. Shiu, S. Y. Tang, C. H. Huang, R. C. T. Lee, and C. L. Lei, “A reversible acoustic data hiding method based on analog modulation,” Information Sciences, vol. 273, pp. 233-246, 2014.
[11] D. Yan and R. Wang, “Reversible data hiding for audio based on prediction error expansion,” Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 249-252, 2008.
[12] C. C. Chang, T. C. Lu, Y. F. Chang, and R. C. T. Lee, “Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium,” International Journal of Innovative Computing, Information and Control, vol. 3, no. 5, pp. 1145-1160, 2007.
[13] H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, “Data hiding methods based upon DNA sequences,” Information Sciences, vol. 180, no. 11, pp. 2196-2208, 2010.
[14] C. C. Chang, T. S. Nguyen, and C. C. Lin, “A reversible data hiding scheme for VQ indices using locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 22, no. 7, pp. 664-672, 2011.
[15] C. C. Chang, T. S. Nguyen, and C. C. Lin, “A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies,” Journal of Systems and Software, vol. 86, no. 2, pp. 389-402, 2013.
[16] Z. Pan, S. Hu, X. Ma, and L. Wang, “A new lossless data hiding method based on joint neighboring coding,” Journal of Visual Communication and Image Representation, vol. 26, pp. 14-23, 2015.
[17] C. Qin, C. C. Chang, G. Horng, Y. H. Huang, and Y. C. Chen, “Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching,” Security and Communication Networks, vol. 8, no. 6, pp. 899-906, 2014.
[18] W. J. Wang, C. T. Huang, C. M. Liu, P. C. Su, and S. J. Wang, “Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping,” Information Sciences, vol. 246, no. 10, pp. 69-82, 2013.
[19] S. Li, K. Leung, L. M. Cheng, and C. K. Chan, “A novel image-hiding scheme based on block difference,” Pattern Recognition, vol. 39, no. 6, pp. 1168–1176, 2006.
[20] C. C. Lin, W. L. Tai, and C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognitation, vol. 41, no.12, pp. 3582–3591, 2008.
[21] J. Mielikainen, “LSB Matching Revisited. IEEE Signal Process,” Lett , vol. 13, pp. 285–287, 2006.
[22] X. Zhang, S. Wang, “Effcient Steganographic Embedding by Exploiting Modification Direction,” IEEE Commun. Lett, vol. 10, pp.781–783, 2006.
[23] W. Hong, T. Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching,” IEEE Trans. Inf. Forensics Secur, vol. 7, pp. 176–184, 2012.
[24] J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. Video Technol, vol. 13, pp. 890–896, 2003.
[25] F. Peng, X. Li, B. Yang, “Adaptive Reversible Data Hiding Scheme Based on Integer Transform,” Signal Process, vol. 92, pp. 54–62, 2012.
[26] W. L. Tai, C. M. Yeh, C. C. Chang, “Reversible Data Hiding Based on Histogram Modification of Pixel Di_erences,” IEEE Trans. Circuits Syst. Video Technol, vol. 19, pp. 906–910, 2009.
[27] K. Wang, Z. M. Lu, Y. J. Hu, “A High Capacity Lossless Data Hiding Scheme for JPEG Images,” J. Syst. Softw, vol. 86, pp. 1965–1975, 2013.
[28] Y. P. Lee, J. C. Lee, W. K. Chen, K. C. Chang, I. J. Su, C. P. Chang, “High-Payload Image Hiding with Quality Recovery Using Tri-Way Pixel-Value Differencing,” Inf. Sci. (Ny), vol. 191, pp. 214–225, 2012.
[29] E. Delp, O. Mitchell, “Image Compression Using Block Truncation Coding,” IEEE Trans. Commun, vol. 27, pp. 1335–1342, 1979.
[30] M. Lema, O. Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Trans. Commun, vol. 32, pp. 1148–1157, 1984.
[31] A. Malik, G. Sikka, H. K. Verma, “A High Payload Data Hiding Scheme Based on Modified AMBTC Technique,” Multimed. Tools Appl, vol. 76, pp. 14151–14167, 2017.
[32] A. Malik, G. Sikka, H. K. Verma, “An AMBTC Compression Based Data Hiding Scheme Using Pixel Value Adjusting Strategy,” Multidimens. Syst. Signal Process, vol. 29, pp. 1801–1818, 2018.
[33] D. Ou, W. Sun, “High Payload Image Steganography with Minimum Distortion Based on Absolute Moment Block Truncation Coding,” Multimed. Tools Appl, vol. 74, pp. 9117–9139, 2015.
[34] W. Hong, T. S. Chen, C. W. Shiu, “Lossless steganography for AMBTC-compressed images,” In: International Congress on Image and Signal Processing, vol. 2, pp. 13–17, 2008.
[35] Y. H. Huang, C. C. Chang, Y. H. Chen, “Hybrid secret hiding schemes based on absolute moment block truncation coding, ” Multimedia Tools and Applications, vol.76, pp. 6159-6174, 2016.
[36] J. Y. Yeh, C. C. Chen, P. L. Liu, and Y. H. Huang, “High-Payload Data-Hiding Method for AMBTC Decompressed Images,” Entropy, vol. 22-2, no. 145, pp. 1-13, 2020.
[37] T. C. Lu, L. P. Chi, C. H. Wu, and H. P. Chang, “Reversible data hiding in dual stego-images using frequency-based encoding strategy,” Multimedia Tools and Applications, vol.76, pp. 23903-23929, 2017.
[38] UCID Image Dataset, http://homepages.lboro.ac.uk/~cogs/datasets/ucid/data/ ucid.v2.tar.gz