博碩士論文 88541001 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:30 、訪客IP:18.221.187.121
姓名 蔡昌隆(Chang-Lung Tsai)  查詢紙本館藏   畢業系所 電機工程學系
論文名稱 無漏失位元分解與位元對邏輯運算之數位資訊隱藏機制
(Lossless Data Hiding Mechanism Based on Pixel Decomposition and Pair-wise Logical Computation)
相關論文
★ 小型化 GSM/GPRS 行動通訊模組之研究★ 語者辨識之研究
★ 應用投影法作受擾動奇異系統之強健性分析★ 利用支撐向量機模型改善對立假設特徵函數之語者確認研究
★ 結合高斯混合超級向量與微分核函數之 語者確認研究★ 敏捷移動粒子群最佳化方法
★ 改良式粒子群方法之無失真影像預測編碼應用★ 粒子群演算法應用於語者模型訓練與調適之研究
★ 粒子群演算法之語者確認系統★ 改良式梅爾倒頻譜係數混合多種語音特徵之研究
★ 利用語者特定背景模型之語者確認系統★ 智慧型遠端監控系統
★ 正向系統輸出回授之穩定度分析與控制器設計★ 混合式區間搜索粒子群演算法
★ 基於深度神經網路的手勢辨識研究★ 人體姿勢矯正項鍊配載影像辨識自動校準及手機接收警告系統
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 摘 要
隨著科技的快速發展,透過網際網路傳遞的多媒體影音資訊日與俱增。然而,經由網路所傳輸之資訊,其安全度非常重要。近年來專家學者們陸續提出了新的研究成果,其中數位資料隱藏或鑲嵌,為資訊保密注入了新的契機,經由一張很普通而不起眼的影像,可以輕易的將機密資訊隱藏在影像中,而且不會破壞影像的視覺效果,若是再配合加密措施就更加安全無虞了。此外,資訊隱藏技術亦可應用於數位典藏系統,可收節省儲存空間、身分認證及檔案管理之效。
本篇論文,我們提出了新的演算概念-位元對邏輯運算、像素分解與相位差,其中位元邏輯對運算,提供了新思維並解決了大部分資料隱藏技術無法將被隱藏之機敏資料與外層掩護之原始資料均完整無漏失重建的缺點;我們並依此概念,開發出六種資料隱藏方式,其中適用於二位元影像部分的有位元對邏輯運算及以邊緣(界)為基的位元對邏輯運算二種資料隱藏方式;適用於灰階影像部分的有以位元對邏輯運算及像素分解為基的資料隱藏方式;適用於彩色影像部分的有以位元對邏輯運算及像素分解為基於紅藍綠波段執行資料隱藏、以位元對邏輯運算於亮度部分執行資料隱藏及以相位差為基於色調與飽和度執行資料隱藏等三種方式。這六種資料隱藏的效果經過實驗證明,在資料隱藏量與視覺都能達到很好的效果,不但可偵測竄改,經過略微修改後,亦可適用於任何多媒體資訊之數位資訊隱藏與典藏,符合可逆、無漏失、良好影像視覺效果與高資訊隱藏率等條件,效果非常良好。
摘要(英) Abstract
Due to the fast development of scientific technologies, cryptography has been widely used for information security. However, the using of cryptograph is easy to be detected. The use of those provided on public network or commercial enciphering products has to worry about the trapdoor problem. If we use private security system, the private protocol or particular transmission preambles will attract the attention of intelligentsia and hackers to access and attack it. Nowadays, due to the popular application of multi-media and transmission via network, the data embedding technologies have been widely applied for information protection, data monitoring and tracking, copyright protection, and source authentication. Under such situation, hiding confidential information or encryption scheme inside an image and covered by its unsuspicious outlook can gain double security.
Recently, the development of data hiding techniques to hide annotations, confidential data, or side information into multimedia attracts the attention of researchers in various fields, especially in digital library. One of the essential tasks in digital library is the digitization of arts together with the corresponding textural descriptions. Although there are some standard interleaving algorithms for hiding the relating textural description into an image or video, the textural information is prone to be easily accessed and extracted by hackers. The data hiding mechanism can be utilized in the application of digital library and can obtain some benefits, such as the saving of storage, content authentication, and file management. However, most of traditional data hiding schemes focus on the recovery of covert information. The common shortcoming is that the original image will be distorted due to the processing of bit-substitution, quantization and truncation.
In this dissertation, we propose some lossless data hiding methods based on pixel decomposition, pair-wise logical computation (PWLC) and phase difference which can achieve the goal of complete recovering of covert information and lossless reconstruction of original image simultaneously. Among the above three rationales, the rational of PWLC has proposed to remedy the shortcoming that most of the data hiding mechanism can not reconstruct the hidden information and original host image simultaneously. In addition, it also obtains high data hiding capacity and good visual quality. Furthermore, the task of tampering detection can also be achieved in the proposed method to ensure content authentication. Experimental results demonstrate the feasibility and validity of our proposed method.
關鍵字(中) ★ 數位典藏
★ 像素分解
★ 數位浮水印
★ 資料隱藏
★ 位元對邏輯運算
關鍵字(英) ★ watermark
★ data hiding
★ pair-wise logical computation
★ pixel decomposition
★ digital library
論文目次 Contents
Contents
List of Tables
List of Figures
Chapter 1. Introduction page 1
1.1 Overview
1.2 Survey of Related Works
1.3 Overview of the Dissertation
1.4 Organization of the Dissertation
Chapter 2. Overview of Image Data Hiding Techniques page 7
2.1 Spatial Domain Data Hiding Techniques
2.2 Frequency Domain Data Hiding Techniques
2.3 Other Data Hiding Techniques
Chapter 3. Pair-Wise Logical Computation Data Hiding page 17
3.1 PWLC Data Hiding
3.2 Boundary_based PWLC Data Hiding
3.3 Hidden Data Extraction
3.4 Data Hiding Capacity
3.5 Concluding Remarks
Chapter 4. Binary Images Data Hiding page 29
4.1 The Proposed Method
4.2 Experimental Results
4.3 Concluding Remarks
Chapter 5. Gray-scale Images Data Hiding page 42
5.1 The Proposed Method
5.2 Experimental Results
5.3 Concluding Remarks
Chapter 6. Color Images Data Hiding page 54
6.1 The Proposed Methods
6.2 Experimental Results
6.4 Concluding Remarks
Chapter 7. Conclusions and Future Works page 89
References page 91
參考文獻 References
[1] M. Steinder, S. Iren, and P. D. Amer, “Progressively Authenticated Image Transmission”, in Proceedings Military Communications Conference, Vol.1, Pages 641-645, 1999
[2] C. S. Lu and H. Y. M. Liao, “Multipurpose Watermarking for Image Authentication and Protection”, IEEE Transactions on Image Processing, Vol.10, Issue.10, Pages 1579 –1592, Oct. 2001.
[3] M. Liehua and G. R Arce, “A Class of Authentication Digital Watermarks for Secure Multimedia Communication”, IEEE Transactions on Image Processing, Vol.10, Issue.11, Pages 1754 –1764, Nov. 2001
[4] P. W. Wong and N. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification”, IEEE Transactions on Image Processing, Vol.10, Issue.10, Pages 1593 -1601, Oct. 2001
[5] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm", Pattern Recognition, Vol. 34, No. 3, Pages 671-683, March 2001
[6] C. Rauber, J. O. Ruanaidh, and T. Pun, “Secure Distribution of Watermarked Images for a Digital Library of Ancient Papers”, In Second ACM Conference on Digital Libraries, Philadelphia, PA, Pages 123-130, July 1997, http://cuiwww.unige.ch/~rauber
[7] F. Mintzer, “Developing digital libraries of cultural content for Internet access”, IEEE Communications Magazine, Vol. 37, Pages 72-78, 1999.
[8] J. Jiang and A. Armstrong, “Data hiding approach for efficient image indexing, Electronics Letters”, IEE, Vol. 38, No. 23, Pages 1424-1425, 2002.
[9] C. L. Tsai, K. C. Fan, C. D. Chung, and T. C. Chuang, “Reversible and Lossless Data Hiding with Application in Digital Library”, IEEE 38th International Carnahan Conference on Security Technology, New Mexico, U.S.A., Pages 226-232, Oct 11-14, 2004.
[10] J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying”, IEEE Journal on Selected Areas in Communications, Vol.13, Pages 1495–1504, Oct. 1995
[11] S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O’Gorman, “Document marking an identification using both line and word shifting,” Proceedings INFORMCOM, Boston, MA, Pages 853–860, Apr 1995
[12] H. Lu, A. C. Kot, and J. Cheng, “Secure Data Hiding in Binary Document Images for Authentication”, IEEE, 2003
[13] M. Y. Wu and J. H. Lee, “A Novel Data Embedding Method for Binary Facsimile Images”, in Proceeding of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan, R.O.C., Dec. 1998
[14] Y. Y. Chen, H. K. Pan, and Y. C. Tseng, “A Secure Data Hiding Scheme for Binary Images”, in IEEE Symposium on Computers and Communications, 2000
[15] Y. C. Tseng and H. K. Pan, “Secure and Invisible Data Hiding in 2-color Images”, in Proceedings IEEE INFOCOM 2001, Pages 887-896, 2001.
[16] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Reversible Data Hiding”, In Proceedings of International Conference on Image Processing, IEEE, Vol. 2, Pages 157-160, 2002
[17] J. Tian, “High Capacity Reversible Data Embedding and Content Authentication”, IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, Pages 517-520, April 2003
[18] J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding – New Paradigm in Digital Watermarking”, Special Issue on Emerging Applications of Multimedia Data Hiding, Vol. 2, Pages 185-196, 2002
[19] J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding for all Image Formats”, In Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, Vol. 4675-63, Pages 572-583, 2002
[20] J. Tian, “Wavelet-based reversible watermarking for authentication”, In Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, Vol. 4675-74, Pages 679-690, 2002
[21] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular Interpretation of Histogram for Reversible Watermarking”, In IEEE 4th Workshop on Multimedia Signal Processing, Pages 345-350, 2001
[22] G. Xuan, J. Chen, J. Zhu, Y. Q. Shi, Z. Ni, and W. Su, “Lossless Data Hiding based on Integer Wavelet Transform”, IEEE International Workshop on Multimedia Signal Processing, 2002
[23] M. Awrangjeb and M. S. Kankanhalli, “Lossless Watermarking Considering the Human Visual System”, International Workshop on Digital Watermark 2003, LNCS2939, Pages 581-592, 2003
[24] S. W. Kim, S. Suthaharan, H.K. Lee, and K.R. Rao, “Image watermarking scheme using visual model and BN distribution”, Electronic Letters, IEE, Vol. 35, No. 3, Pages 212-214, February, 1999
[25] Y. S. Kim, O. H. Kwon, and R. H. Park, “Wavelet based watermarking method for digital images using the human visual system”, Electronic Letters, IEE, Vol.35, No. 6, Pages 466-468, March 1999
[26] C. L. Tsai, K. C. Fan, C. D. Chung, and T. C. Chuang, “Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-wise Logical Computation Mechanism”, Pattern Recognition, Vol. 38, Issue 11, Pages 1993-2006, November 2005
[27] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular Interpretation of Bijective Transforms in Lossless Watermarking for Media Asset Management”, IEEE Transactions on Multimedia, Vol. 5, No. 1, Pages 97-105, March 2003
[28] D. C. Wu and W. H. Tsai, “Spatial-domain image hiding using image differencing”, IEE Proceedings in Vision, Image, and Signal Processing, Vol. 147, Issue 1, Pages 29-37, Feb. 2000
[29] R. G. Schyndel, A. Z. Tirkel, and C. F. Osborne. “A Digital Watermark”, Proc. International Conference on Image Processing, Vol.2, Pages 86-90, 1994
[30] R. B. Wolfgang and E. J. Delp, “A watermark for digital images”, Proceedings ICIP, Vol.3, Pages 219-223, 1996
[31] A. Z. Tirkel, C. F. Osborne, and T. E. Hall, “Image and watermark registration”, Signal Processing, Vol.66, No.3, Pages 373-383, 1998
[32] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain”, Signal Processing, Vol.66, No.3, Pages 385-403, 1998
[33] R. B. Wolfgang and E. J. Delp, “A Watermarking Technique for Digital Imagery: Future Studies”, Proceedings International Conference On Image Science, Systems and Technology, Las Vegas, Nevada, Juillet, 1997
[34] A. Tirkel, G. Rankin, R. van Schydel, W. Ho, N. Mee, and C. Osborne, “Electronic Water Mark”, Proceedings DICTA 1993, Pages 666-672, Dec 1993
[35] G. Caronni, “Assuming Ownership Rights for Digital Images”, Proceedings Reliable IT System, VIS 1995, 1995
[36] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “The Data Hiding Technique to Support an Watermarking”, NIKKEI Electronics, Vol. 1, Pages 149-162, 1997
[37] K. Matui, “The Basis of the Digital Watermarking”, Morikata publication stock company, Chapter 3, Pages 91-99, 1998
[38] S. Lee and H. Imai. “A New Method of Selecting Blocks for the Digital Watermark using DCT”, Proceedings SCIS, Pages 28-31, Dec. 1993
[39] T. Nakamura, H. Ogawa, and Y. Takahashi, “A Watermarking Technique for Still Images”, NTT R&D, Vol. 47, No.6, Pages 711-714
[40] H. Inoue, A. MiyazakI, and T. Katsura, “A digital watermark for image signals using a controlled quantization method of the wavelet coefficients”, Proceedings International Technique Conference on Circuits/System Computer and Communication, Vol.1, Pages 113-116, Jul. 1998
[41] O. H. Kwon, Y. S. Kim, and R. H. Park, “Wavelet based watermarking method for digital images using the human visual system”, Proceedings International Symposium on Circuits and Systems, Vol.4, Pages 80-83, 1999
[42] A. G. Bors and I. Pitas, “Image Watermarking Using DCT Domain Constraints”, Proceedings ICICS, Vol.3, Pages 231–234, 1996
[43] W. L. Tang and Y. Aoki, “A DCT-based Coding of Images In Watermarking”, Proceedings ICICS, Vol.1, Pages 510 –512, 1997
[44] E. Koch and J. Zhao, “Towards robust and hidden image copyright labeling”, Proce. Workshop on Nonlinear Signal and Image Processing, Marmaros, Greece, Jun 1995
[45] E. Koch and J. Zhao, “Embedding robust labels into images for copyright protection”, Technical report, FRAUNHOFER Institute for Computer Graphics, Darmstadt, Germany, 1994
[46] T. Leighton I. Cox, J. Killian and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, Pages 1673 –1687, Dec.1997
[47] O. H. Kwon, Y. S. Kim, and R. H. Park, “Watermarking for still images using the human visual system in the DCT domain”, Proceedings International Symposium on Circuits and Systems, Vol.4, Pages 76-79, 1999
[48] J. Huang and Y. Q. Shi, “Embedding strategy for image watermarking in DCT domain”, Proceedings APCC/OECC 1999 on Communication, Vol.2, Pages 981-984, 1999
[49] C. H. Lee, H. S. Oh, Y. Baek, and H. K. Lee, “Adaptive digital image watermarking using variable size of blocks in frequency domain”, Proceedings TENCON 1999, Vol.1, Pages 702-705, 1999
[50] P. Premaratne and C. C. Ko, “A novel watermark embedding and detection scheme for images in DFT domain”, Proceedings International Conference on Image Processing and Its Applications, Vol.2, Pages 780-783, 1999
[51] V. Solachidis and I. Pitas, “Circularly Symmetric Watermark Embedding”, IEEE Transaction on Image Processing, Vol. 10, No. 11, Nov 2001
[52] S. Kang, and Y. Aoki, “Data Hiding System by Fresnel Transform,” Proc. IEEE TENCON, Vol.1, Pages 625–628, 1999
[53] S. Kang and Y. Aoki, “Digital Image Watermarking by Fresnel Transform and its Robustness”, Proceedings ICIP, Vol.2, Pages 221-225, 1999
[54] S. Kang and Y. Aoki, “Data hiding system by Fresnel transform”, Proceedings of IEEE, Vol.1, Pages 625-628, 1999.
[55] S. Kang and Y. Aoki, “Image data embedding system for watermarking using Fresnel transform”, Proceedings International Conference on Multimedia Computing and Systems, Vol.1, Pages 885-889, 1999
[56] A. E. Jacquin, “Image coding based on a fractal theory of iterated contrastive image transformations”, IEEE Transactions on Image Processing, Jan 1992.
[57] P. Bas, J. M. Chassery, and F. Davoine, “Using the fractal code to watermark images”, Proceedings ICIP, Vol.1, Pages 469-473, 1998
[58] J. L. Dugelay and S. Roche, “Fractal transform based large digital watermark embedding and robust full blind extraction”, Proceedings International Conference on Multimedia Computing and Systems, Vol.2, Pages 1003-1004, 1999
[59] B. Chen and G. W. Wornell, “Digital watermarking and information embedding using dither modulation”, Proceedings IEEE Second Workshop on Multimedia Signal Processing, Pages 273 –278, 1998
[60] M. Wu, E. Tang, and B. Liu, “Data Hiding in Digital Binary Image”, IEEE International Conference on Multimedia and Exposition, New York, Vol. 1, 2000
[61] Q. G. Mei, E. K. Wong, and N. D. Memon, “Data hiding in binary text documents”, Security and Watermarking of Multimedia Contents III, Proceedings of SPIE 2001, San Jose, CA, Vol. 4314, No. 4314, Pages 369-375, 2001
[62] H. Lu, J. Wang, and A. C. Kot, “An objective distortion measure for binary document images based on human visual perception”, Proceedings of 16th International Conference on Pattern Recognition, Vol. 4, Pages 239-42, 2002
[63] C. H. Tzeng, Z. F. Yang and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping with Security Protection”, IEEE Transactions on Communications, Vol. 52, Issue. 5, Pages 791-800, May 2004
[64] M. H. Lin, Y. C. Hu and C. C. Chang, “Both Color and Gray Scale Secret Images Hiding in a Color Image”, International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 16, Pages 697-713, 2002
[65] J. Tian, “Reversible Watermarking by Difference Expansion”, Multimedia and Security Workshop at ACM Multimedia, Vol. 5, No. 1, Pages 97-105, Dec 2002
[66] A. A. Kassim and W. S. Lee, “Embedded Color Image Coding Using SPIHT with Partially Linked Spatial Orientation Trees”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 2, Pages 203-206, Feb. 2003
指導教授 莊堯棠(Yau-Tarng Juang) 審核日期 2006-4-25
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明