以作者查詢圖書館館藏 、以作者查詢臺灣博碩士 、以作者查詢全國書目 、勘誤回報 、線上人數：15 、訪客IP：184.108.40.206
姓名 吳敏豪(Min-Hao Wu) 查詢紙本館藏 畢業系所 資訊工程學系 論文名稱
(Reversible Information Hiding Techniques for Medical Images)
★ USB WORM KILLER: Cure USB Flash Worms Through a USB Flash Worm ★ Discoverer- Rootkit即時偵測系統 ★ 一項Android手機上詐騙簡訊的偵測與防禦機制 ★ SRA系統防禦ARP欺騙劫持路由器 ★ 針對遠端緩衝區溢位攻擊之自動化即時反擊系統 ★ 即時血清系統: 具攻性防壁之自動化蠕蟲治癒系統 ★ DNSPD: Entrap Botnets Through DNS Cache Poisoning Detection ★ TransSQL: A Translation and Validation-based Solution for SQL-Injection Attacks ★ A Spam Mail-based Solution for Botnet Detection and Network Bandwidth Protection ★ Shark: Phishing Information Recycling from Spam Mails ★ FFRTD: Beat Fast-Flux by Response Time Differences ★ Antivirus Software Shield against Antivirus Terminators ★ MAC-YURI : My ACcount, YoUr ResponsIbility ★ KKBB: Kernel Keylogger Bye-Bye ★ CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment ★ PrivacyGuard：A Kernel-based Solution to Enhance the User Privacy When Using Private Browsing 檔案 [Endnote RIS 格式] [Bibtex 格式] [相關文章] [文章引用] [完整記錄] [館藏目錄] 至系統瀏覽論文 (2021-6-30以後開放) 摘要(中) 真正資訊隱藏技術是將機密資訊從負載影像嵌入後，在將影像傳送給對方後，在由對方利用相同演算法將機密訊息取出。真正可逆資訊隱藏是可以完完全全取出機密訊息並且讓影像恢復原始樣貌。對於一些敏感的影像的應用，例如：醫學影像、軍事影像或是衛星影像等方面是很重要影像。因為這類的敏感影像是不容許出現些微的失真，這種情況造成應用上誤判。本論文將設計具影像可逆式資訊隱藏技術在這類的敏感影像。故而發展出真正可逆式資訊隱藏技術，它目的是將機密取出後可以徹底地還原出原始影像的容貌，可以避免發生任何因藏入後的影像失真並且不讓秘密訊息的任何型態被第三者所偵測到。
摘要(英) The real reversible information concealment technique embeds secret information from the image carrier. After the information is embedded in the image carrier, the image is transferred from the Internet. Secret information is extracted with the same algorithm that is used to recover the stego image, which hides the information image. This concealment technique can completely extract the image and return it to its original appearance. Image quality is very important for sensitive imaging applications, such as medical, military, and satellite imaging. These sensitive images must not appear even slightly distorted; the recovered images can be misinterpreted if any distortion is present. In this dissertation, we propose a reversible information concealment technique for sensitive images. Using the proposed method, real reversible information concealment techniques can avoid image distortion while being undetected by application software.
In this dissertation, we first discuss four types of information concealment based on a histogram mechanism. In our proposed scheme, both natural and non-natural images can be processed. In the pre-processing phase, images are processed by analysis and overflow (or underflow). In the analysis of these images, natural and non-natural images can be distinguished. The overflow/underflow process can prevent overflowing/underflowing of pixels after the secret information is embedded. Furthermore, various prediction strategies can be used to increase the image capacity and quality. For example, a side-match scheme employs the surrounding pixels or a 3 × 3 block to predict the values of the pixels that are divided into two, four, eight, or more classes in the natural images. From that point, a weight strategy uses the predicted pixel values of each of the proximate sides and doubles or triples these pixels for the respective sides. A threshold strategy is then used to prevent image pixel underflow/overflow. A similar dynamic programming approach is then used after each prediction to select the highest image quality for the next predicted image. Then, a difference image is generated to find the peak and zero points using the histogram method. The selected pixels are situated between the peak and zero points by shifting and embedding. Accordingly, a stego image is obtained. The peak signal-to-noise ratio (PSNR) can be maintained at approximately 48 dB, while human perception is not affected under image visual quality of approximately 30 dB. Based on our experimental results, the capacity of the proposed method is higher than those of existing methods.
關鍵字(中) ★ Nature image
★ Non-nature image
★ Information hiding
★ weighted average
★ Dynamic program process
關鍵字(英) ★ 自然影像
論文目次 中文摘要 i
List of Figures vi
List of Tables vii
Chapter 1. Introduction 1
Chapter 2. Related Work 7
2.1. Ni et al.’s method 7
2.2. Li et al.’s method 9
2.3. Method of Sachnev et al. 12
2.4. Yang and Tsai’s scheme 14
Chapter 3. Reversible Information hiding in Image Systems by Means of Histogram-shifting Strategy 15
3.1. Proposed Scheme 15
3.2. Pre-processed phase 16
3.3. Embedding algorithm 20
3.4. Extracting and reversing the algorithm 25
3.5. Experiments and Discussions 27
3.6. Summaries 32
Chapter 4. Reversible Information Hiding in Image Systems on the Basis of Similar Dynamic Program Prediction Strategy 33
4.1. Proposed Scheme 34
4.2. Pre-processing of underflow or overflow 36
4.3. Embedding algorithm 38
4.4. Extraction and reversal algorithm 42
4.5. Other prediction algorithms 45
4.6. Experiment results 46
4.7. Summaries 57
Chapter 5. Conclusion and Future Work 58
參考文獻  M. Al Ameen, J. Liu, and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,” Journal of medical systems, vol. 36, pp. 93-101, 2012.
 Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on circuits and systems for video technology, vol. 16, pp. 354-362, 2006.
 C. Lin and N. Hsueh, “A lossless data hiding scheme based on three-pixel block differences,” Pattern Recognition, vol. 41, pp. 1415-1425, 2008.
 P. Tsai, Y. Hu, and H. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, pp. 1129-1143, 2009.
 X. Zeng, L. Ping, and Z. Li, “Lossless data hiding scheme using adjacent pixel difference based on scan path,” Journal of Multimedia, vol. 4, pp. 145-152, 2009.
 J. Y. Hsiao, K. F. Chan, and J. Morris Chang, “Block-based reversible data embedding,” Signal Processing, vol. 89, pp. 556-569, 2009.
 Y. C. Li, C. M. Yeh, and C. C. Chang, “Data hiding based on the similarity between neighboring pixels with reversibility,” Digital Signal Processing, vol. 20, pp. 1116-1128, 2010.
 Z. Zhao, H. Luo, Z. M. Lu, and J. S. Pan, “Reversible data hiding based on multilevel histogram modification and sequential recovery,” AEU-International Journal of Electronics and Communications, vol. 65, pp. 814-826, 2011.
 H. Luo, F. X. Yu, H. Chen, Z. L. Huang, H. Li, and P. H. Wang, “Reversible data hiding based on block median preservation,” Information Sciences, vol. 181, pp. 308-328, 2011.
 J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Techn., vol. 13, pp. 890-896, 2003.
 A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,”IEEE Transactions on Image Processin , vol. 13, pp. 1147-1156, 2004.
 H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, “A novel difference expansion transform for reversible data embedding,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 456-465, 2008.
 V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 989-999, 2009.
 O. M. Al-Qershi and B. E. Khoo, “High capacity data hiding schemes for medical images based on difference expansion,” Journal of Systems and Software, vol. 84, pp. 105-112, 2011.
 M. Liu, H. S. Seah, C. Zhu, W. Lin, and F. Tian, “Reducing location map in prediction-based difference expansion for reversible image data embedding,” Signal Processing, vol. 92, pp. 819-828, 2012.
 C. H. Yang and Y. C. Lin, “Reversible data hiding of a VQ index table based on referred counts,” Journal of Visual Communication and Image Representation, vol. 20, pp. 399-407, 2009.
 Z. M. Lu, J. X. Wang, and B. B. Liu, “An improved lossless data hiding scheme based on image VQ-index residual value coding,” Journal of Systems and Software, vol. 82, pp. 1016-1024, 2009.
 J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” in Photonics West 2001-Electronic Imaging, 2001, pp. 197-208.
 J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding: new paradigm in digital watermarking,” EURASIP Journal on Applied Signal Processing, vol. 2002, pp. 185-196, 2002.
 Y. Li, C. Yeh, and C. Chang, “Data hiding based on the similarity between neighboring pixels with reversibility,” Digital Signal Processing, vol. 20, pp. 1116-1128, 2010.
 C.T. Wang and H.F. Yu, “A Markov-based reversible data hiding method based on histogram shifting,” Journal of Visual Communication and Image Representation, pp. 798-811, 2012.
 C. H. Yang and M. H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” Image Processing, IET, vol. 4, pp. 223-234, 2010.
 K. S. Kim, M. J. Lee, H. Y. Lee, and H. K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, vol. 42, pp. 3083-3096, 2009.
 C. C. Lin and N. L. Hsueh, “A lossless data hiding scheme based on three-pixel block differences,” Pattern Recognition, vol. 41, pp. 1415-1425, 2008.
 C. H. Yang and M. H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” IET image processing, vol. 4, pp. 223-234, 2010.
 P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, pp. 1129-1143, 2009.
 L. Kamstra and H. J. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Transactions on Image Processing, pp. 2082-2090, 2005.
 D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, pp. 721-730, 2007.
 I. C. Chang, Y. C. Hu, W. L. Chen, and C. C. Lo, “High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding,” Signal Processing, vol. 108, pp. 376-388, 2015.
 Y. Yang, W. Zhang, D. Liang, and N. Yu, “Reversible data hiding in medical images with enhanced contrast in texture area,” Digital Signal Processing, vol. 52, pp. 13-24, 2016.
指導教授 許富皓(Fu-Hau Hsu) 審核日期 2016-7-21 推文 網路書籤 Google bookmarks del.icio.us hemidemi myshare