透過您的圖書館登入
IP:3.147.66.149
  • 學位論文

高容量JPEG資訊隱藏及其在影像分享、驗證與修復之應用

High-Capacity JPEG Data Hiding and its Applications to Image Sharing, Authentication, and Recovery

指導教授 : 林志青

摘要


本論文基於Joint Photographic Experts Group (JPEG) 技術提出了資訊隱藏、影像分享、影像驗證與修復之方法。資訊隱藏是藉由將機密資料藏於掩護影像,使得攻擊者無法從偽裝影像中察覺出機密資料的存在,以達到保護機密資料的一種方式;然而,大部份資訊隱藏方法所產生的偽裝影像大小並不經濟。因此,將偽裝影像壓縮以節省儲存空間是必要的,但壓縮經常會破壞藏於偽裝影像的機密資料。為了解決這個問題,我們提出了一個高容量可逆式JPEG資訊隱藏方法。這個方法將機密資料藏於JPEG壓縮碼。在機密資料被無失真取出後,原來用於藏機密資料的JPEG壓縮碼,也可以完整重建回來。 機密影像分享藉由將機密影像產生n張有雜訊的分存來保護機密影像。任意k份分存 (2  k  n),可以還原機密影像,但少於k份分存,則無法還原機密影像。這種性質(不是機密影像被還原就是只有雜訊),只有當被分享的影像為最高機密才有用處;然而,在真實世界中,並不是所有的影像都為最高機密,分享的影像有可能是每天需要處理的重要影像,而不是最高機密影像。因此,還原重要影像可能會涉及到某些品質層次。為了可以根據收集分存的數量多寡,來還原重要影像的多種品質,我們提出了一個漸進式影像分享方法。這個方法所產生的每個分存都非常的小,所以這些小分存可以成功地藏於JPEG壓縮碼,使得這些隱藏於JPEG壓縮碼下的小分存在一個不友善的環境傳送時,可以減低被攻擊的機率。 影像驗證是用來檢驗影像的完整性。有些具有自我修復能力的影像驗證方法除了可以偵測影像是否遭到惡意竄改,而且在影像被偵測遭到竄改時,也可進而修復;然而,當影像遭到更嚴重破壞時,所遺留的修復資料並不足以用來修復。因此,我們提出了一個影像驗證與交叉修復方法來保護一組n張JPEG影像。這個方法可以檢驗該組n張JPEG影像有哪幾張被竄改,而且還可以藉由其它未被竄改的JPEG影像之間的相互合作來修復被竄改的JPEG影像。

並列摘要


This dissertation proposes three techniques for data hiding, image sharing, and image authentication with cross recovery based on Joint Photographic Experts Group (JPEG). Data hiding is used to protect secret data by embedding them in a cover image such that attackers cannot identify a hidden secret in the stego-image. However, the stego-images generated by many existing data hiding techniques are not economic in size, and therefore the compression to the stego-images is needed to reduce storage space. Unfortunately, the compression usually destroys the hidden secret in the stego-images. To solve this dilemma, a reversible JPEG data hiding method with high hiding capacity is proposed. The secret data are embedded in a JPEG code. In the decoding process, following lossless extraction of the hidden secret data, the JPEG code used to embed the secret data can also be reconstructed without any error. Secret image sharing is used to protect a secret image by splitting the secret image into n noise-like shadows. Any k of the n shadows can reconstruct the secret image, but fewer than k shadows cannot. This all-or-nothing property is useful when the image being shared is top secret. However, in the real world, not all images are top secret. The shared image might be a daily-used important image but not a top-secret one, and therefore the reconstruction of the important image can involve certain quality levels. To reconstruct the important image with various quality levels based on the number of collected shadows, a progressive image sharing method with compact shadows is proposed. All n shadows are very compact, and so can be hidden successfully in the JPEG codes of cover images to reduce the probability of being attacked when transmitted in an unfriendly environment. Image authentication is used to verify the integrity of an image. Some Image authentication schemes with self-recovery ability not only identify unauthorized manipulations of the image but also recover the tampered areas with approximation of the original ones. However, when the image is seriously damaged, the recovery data left are insufficient to recover the the seriously damaged image. Therefore, an image authentication and cross-recovery method is proposed to protect a group of n JPEG image. The proposed method can verify which JPEG images in the group are tampered with, and recover the tampered JPEG images approximately through the cooperation of the survived members.

參考文獻


[1] D. C. Wu and W. H. Tsai, “Spatial-domain image hiding using image differencing,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 147, No. 1, pp. 29-37, 2000.
[2] C. C. Chang, M. H. Lin, and Y. C. Hu, “A fast and secure image hiding scheme based on LSB substitution,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 4, pp. 399-416, 2001.
[3] C. C. Thien and J. C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, Vol. 36, No. 13, pp. 2875-2881, 2003.
[4] D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.
[5] Y. C. Hu and M. H. Lin, “Secure image hiding scheme based upon vector quantization,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 18, No. 6, pp. 1111-1130, 2004.

被引用紀錄


余宛臻(2012)。身分法之「母職」研究〔碩士論文,國立中正大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201613504707
楊晏儒(2013)。女性就業與照顧處境的抉擇〔碩士論文,國立中正大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201613532223
周琬琳(2014)。腦神經倫理之道德責任的歸屬: 人格同一性判準的再建構〔博士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0412201512010057
吳比(2016)。中國代孕之規範建構〔碩士論文,國立清華大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0016-0901201710380806

延伸閱讀