跳到主要內容

簡易檢索 / 詳目顯示

研究生: 潘祥光
Hsiang-Kuang Pan
論文名稱: 在數位影像上資料隱藏技術之探討
A Secure and Invisibile Data Hiding Scheme for Two-Color Images
指導教授: 曾煜棋
Yu-Chee Tseng
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
畢業學年度: 88
語文別: 中文
論文頁數: 50
中文關鍵詞: 傳真資料隱藏密碼學安全
外文關鍵詞: facsimile, data hiding, cryptography, security
相關次數: 點閱:11下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來隨著電腦科學的進步,各種傳統的資料如影像、音樂和書本也漸漸的數位化。網路技術的開發,也使得這些數位化產品能夠很輕易的利用網路來傳送。由於網路的開放性,也就衍生出了網路安全與數位資料著作權相關的問題。
    資訊隱藏(Information Hiding)是一門古老的科學。其中包含了兩大議題:資料隱藏(data hiding)和浮水印(Watermarking)。資料隱藏是將重要的資料嵌入在不受人注意的寄主媒介中,藉此分散敵人的注意力;浮水印則是將產品資訊隱藏在數位化的產品中,來達到著作權宣告的目的。
    本篇論文主要是針對數位影像來實作資料隱藏,而其中我們更著重在單色影像。因為單色影像的每一個像素皆是用一個位元來表示。相對於彩色影像而言,在單色影像上的任何修改,將會很容易的被發現。因此,如何在單色影像上作資料隱藏也是一個重要的問題。
    基於以上的問題,我們提出了二個針對單色影像上資料隱藏的方法,一個的特性是隱藏率高,而另一個則是隱藏後影像的品質相當好,不過這兩種方法和以前的方法比較,皆能隱藏較多的資料、維持一定的影像品質和提供較高的安全性。


    Contents 1. Introduction . , . . . . . . . . . . . . . . . . . . . . . 1 2. Reviews and Motivations . , . . . . . . . . . . . . . . . .4 3. A Secure Data Hiding Scheme for 2-color Images . . . . . . 8 3.1 Weight Management . , . . . . . . . . . . . . . . . . . . 9 3.2 The Hiding Steps . . . . . . . . . . . . . . . . . . . . 11 4. Data Hiding with Quality Control. . . . . . . . . . . . . 16 4.1 Control of Image Quality after Data Hiding . . . . . . . 16 4.2 The Scheme . . . . . . . . . . . . . . . . . . . . . . . 17 5. Experimental Results. . . . . . . . . . . . . . . . . . . 22 5.1 Possible Attacks and Costs for CPT Scheme . . . . . . . .22 5.2 Experimental Results . . . . . . . . . . . . . . . . . . 23 5.3 Theoretical Data Hiding Ratio . . . . . . . . . . . . . .25 6. Conclusions . . . . . . . . . . . . . . . . . . . . . . . 17

    [1] R. J. Anderson. Stretching the Limits of Steganography. In Information Hiding,
    Springer Lecture Notes in Computer Science, volume 1174, pages 39{48, 1996.
    [2] R. J. Anderson and F. A. P. Petitcolas. On the Limits of Steganography. IEEE
    J. on Selected Areas in Communications, 16(4):474{481, May 1998.
    [3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for Data Hiding. IBM
    System, 35(3{4), February 1996.
    [4] E. Franz et al. Computer-Based Steganography. In Information Hiding, Springer
    Lecture Notes in Computer Science, volume 1174, pages 7{21, 1996.
    [5] R. L. Graham, D. E. Knuth, and O. Patashnik. Concrete Mathematics (2nd ed.).
    Addison-Wesley, 1994.
    [6] D. Gruhl and W. Bender. Information Hiding to Foil the Casual Counterfeiter.
    In Proceedings of the Workshop on Information Hiding, IH''98, Portland, Oregon,
    USA, April 1998.
    [7] D. Kohn. The Codebreakers: The Story of Secret Writing. Scribner, New York,
    1996.
    [8] M. Kutter, F. Jordan, and F. Bossen. Digital Signature of Color Images using
    Amplitude Modulation. Electronic Imaging, 7(2):326{332, April 1998.
    [9] G. J. Simmons. The Prisoners'' Problem and the Subliminal Channel. In
    CRYPTO''83, pages 51{67.
    [10] G. J. Simmons. Results Concerning the Bandwidth of Subliminal Channels. IEEE
    J. on Selected Areas in Communications, 16(4):463{473, May 1998.
    [11] G. J. Simmons. The History of Subliminal Channels. IEEE J. on Selected Areas
    in Communications, 16(4):452{462, May 1998.
    [12] W. Stallings. Cryptography and Network Security. Prentice Hall, New Jersey,
    1999.
    [13] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A Digital Watermark. In
    IEEE Int. Conf. Image Processing, volume 2, pages 86{90, 1994.
    [14] R. Z. Wang, C. F. Lin, and J. C. Lin. Image Hiding by LSB Substitution and
    Genetic Algorithm. In Proceedings of International Symposium on Multimedia
    Information Processing, Chung-Li, Taiwan, R.O.C, December 1998.
    [15] P. Wayner. Should encryption be regulated. Byte, May 1993.
    [16] P. W. Wong. A Public key Watermark for Image Verication and Authentication.
    In Proceedings of International Conference on Image Processing, Chicago, Illinois,
    USA, October 1998.
    [17] P. W. Wong. A Watermark for Image Integrity and Ownership Verication. In
    Proceedings of IS&T PIC Conference, Portland, Oregon, USA, May 1998.
    [18] M. Y. Wu and J. H. Lee. A Novel Data Embedding Method for Two-Color Facsim-
    ile Images. In Proceedings of International Symposium on Multimedia Information
    Processing, Chung-Li, Taiwan, R.O.C, December 1998.

    QR CODE
    :::