透過您的圖書館登入
IP:3.145.23.123
  • 學位論文

無失真資料隱藏技術之研究

A Study on Reversible Data Hiding

指導教授 : 吳美宜

摘要


無失真資料隱藏技術近年來成為令人關注的新興領域,原因是在一些專業領域裡,例如醫學、軍事或是法庭上所需的影像資訊等,是無法容許任何的改變與失真。無失真的資料隱藏技術最大的好處為嵌入秘密資訊後,仍可以取回原始來源資料,不會有任何失真的情況發生。然而,對於大多的無失真資料隱藏技術而言,卻顯少在無失真編碼上實現,另外依據先前實行於調色盤影像上的無失真資料隱藏技術,這些演算法可嵌入的資訊量卻十分有限。 本論文針對無失真的資料隱藏來進行研究,提出二個無失真資料隱藏技術,一種為基於算術編碼之無失真資料隱藏技術,是將資料隱藏的機制置入算術編碼法中,使得修改後之算術編碼演算法,不僅能做到無失真的壓縮,同時又可達到無失真資料隱藏,以進行秘密資料通訊的目的;另一種為高資訊量的調色盤可逆式資料隱藏技術,其作法主要是利用疊代的方式,針對出現機率最高與最低的顏色來進行資料隱藏的技術。從實驗結果顯示,第二方法不僅擁有很高的嵌入容量,從偽裝影像中不僅能取出秘密訊息,亦可回復原始的調色盤影像。而本研究所提出的二種方法,都可以成功地嵌入並取出秘密資訊,同時亦可完整回復原始媒體。

並列摘要


Lossless (reversible) data hiding technique has become an emerging field and attracts many scholars attention in recent years. Most of the existing data hiding algorithms are lossy. Permanent distortion is introduced into the host image during the embedding process. In some application, such as legal, military and medical imaging, permanent distortion is not allowed. Lossless data hiding technique which can recover the original host signal perfectly after extracting the secret data plays an important role in these case. In this thesis, we propose two novel reversible data hiding methods. The first one is based on the arithmetic coding that hides data during the process of doing arithmetic coding. Using this method, secret data could be embedded and extracted without any distortion on the cover media. The second one method is a high capacity reversible data hiding method for palette-based images. The main idea is to select the most and least frequently used colors, and make use of the color pair for lossless data embedding during everyone of the iterations. Experimental results show that the second proposed methods can achieve a very high embedding capacity and revert to the extract copy of the original palette images. Our methods not only can successful embedded and extracted secret data but also recover original digital media efficiently.

參考文獻


[2] D. Artz, “Digital Steganography: Hiding Data within Data,” IEEE Internet Computing, vol. 5, no.3, pp. 75-80, 2001.
[3] R. L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the Association for Computing Machinery, vol. 21, no. 2, pp. 120-126, Feb. 1978.
[4] N. Bourbakits and C. Alexopoulos, “Picture Data Encryption Using Scan Patterns,” Pattern Recognition, vol.25, no. 6, pp. 567-581, 1992.
[8] F. A. P. Petitcolas, “Watermarking Schemes Evaluation,” IEEE Signal Processing, vol. 17, no. 5, pp. 58–64, Sep. 2000.
[10] J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, Dec. 1997.

延伸閱讀