| 研究生: |
謝金樺 Chin-Hua Hsieh |
|---|---|
| 論文名稱: |
數位影像上高資料隱藏率的方法探討 A High-Capacity Information Hiding Method for Binary and Halftone Images |
| 指導教授: |
曾煜棋
Yu-Chee Tseng |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 畢業學年度: | 89 |
| 語文別: | 中文 |
| 論文頁數: | 35 |
| 中文關鍵詞: | 安全性 、資料隱藏 、影像處理 、隱藏學 、二元 |
| 外文關鍵詞: | image processing, steganography, binary image, information hiding, security |
| 相關次數: | 點閱:22 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
數位時代的來臨,各種傳統的資料如書本、音樂和影像也都數位化,隨著網路技術快速發展,使得這些數位產品得以在網路上輕鬆的傳送,由於如此,也就衍生出網路安全的問題。
資料隱藏 ( Data Hiding ) 不同於所謂的加密 ( Encryption ) ,加密是將重要資料做轉換來提供安全性的技術,而資料隱藏是將重要資料嵌入在不受人注意的寄主媒介中,藉此分散敵人的注意來達到安全性。
本篇論文主要是針對在單色的數位影像上實做資料隱藏,我們提出一個高資料隱藏率的方法,讓我們修改些少的位元,就可以隱藏大量的資料在單色影像上。我們所提出的方法和以前的方法比較,能隱藏更多的資料並維持一定的影像品質和提供較高的安全性。
This paper studies how to hide/embed a piece of secret in a host message which is a binary image. An earlier paper [4] shows that as many as log2(mn+1) bits of secret data can be hidden in an arbitrary mn binary image block by modifying at most 2 bits in the block. In this paper, we improve that result
by showing that as many as r≦ (log2(mn-1)」+ 2) bits can be hidden by modifying at most 3 bits in the block. Simulation and probabilistic analysis are presented, which verify that the new scheme does offer higher hiding capacity per altered bit. We also show how to extend the result for halftone images, which
are a special type of binary images.
[1] R. J. Anderson. Stretching the Limits of Steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 39—48, 1996.
[2] R. J. Anderson and F. A. P. Petitcolas. On the Limits of Steganography. IEEE J. on Selected Areas in Communications, 16(4):474—481, May 1998.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for Data Hiding. IBM System, 35(3—4),February 1996.
[4] Y.-Y. Chen, H.-K. Pan, and Y.-C. Tseng. A Secure Data Hiding Scheme for Two-Color Images. In IEEE Symp. on Computers and Communications, 2000.
[5] E. Franz et al. Computer-Based Steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 7—21, 1996.
[6] M. S. Fu and O. Au. Data hiding by smart pair toggling for halftone images. In IEEE Inter. Conf. on Acoustics, Speech, and Signal Processing, pages 2318 —2321, April 2000.
[7] M. S. Fu and O. C. Au. Data Hiding By Smart Pair Toggling For Halfton Image. In IEEE In-ternational Conference on Acoustics, Speech, and Signal Processing, 2000. ICASSP ’00, pages 2318—2321, 2000.
[8] D. Gruhl and W. Bender. Information Hiding to Foil the Casual Counterfeiter. In Proceedings of the Workshop on Information Hiding, IH’98, Portland, Oregon, USA, April 1998.
[9] S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000.
[10] D. Kohn. The Codebreakers: The Story of Secret Writing. Scribner, New York, 1996.
[11] G. J. Simmons. The Prisoners’ Problem and the Subliminal Channel. In CRYPTO’83, pages 51—67.
[12] G. J. Simmons. Results Concerning the Bandwidth of Subliminal Channels. IEEE J. on Selected Areas in Communications, 16(4):463—473, May 1998.
[13] G. J. Simmons. The History of Subliminal Channels. IEEE J. on Selected Areas in Communications,16(4):452—462, May 1998.
[14] W. Stallings. Cryptography and Network Security. Prentice Hall, New Jersey, 1999.
[15] Y.-C. Tseng and H.-K. Pan. Secure and Invisible Data Hiding in 2-Color Images. In IEEE INFO-COM,2001.
[16] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A Digital Watermark. In IEEE Int. Conf.Image Processing, volume 2, pages 86—90, 1994.
[17] M. Wu, E. Tang, and B. Liu. Data Hiding in Digital Binary Image. In IEEE Inter. Conf. on Multimedia and Expo, ICME’00, New York, USA, 2000.
[18] M. Y. Wu and J. H. Lee. A Novel Data Embedding Method for Two-Color Facsimile Images. In Proceedings of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan,R.O.C, December 1998.
[19] J. Zhao and E. Koch. Embedding Robust Labels into Images for Copyright Protection. In Proceed-ings of the International Conference on Intellectual Property Rights for Information, Knowledge and New Techniques, pages 242—251, Munchen, Wien, 1995.