透過您的圖書館登入
IP:3.139.90.131
  • 學位論文

在JPEG XR 影像上做資訊隱藏之新研究

A New Study on Information Hiding via JPEG XR Images

指導教授 : 蔡文祥

摘要


With the convenience of the Internet, information exchanges through the Internet become very frequent nowadays. The JPEG XR image is a new image file format which supports high compression ratios and becomes more and more popular in information communication. In this study, three methods for data hiding applications via JPEG XR images are proposed, including covert communication, image authentication, and copyright protection. For covert communication, a data hiding method via JPEG XR images for use in covert communication is proposed, which encodes selected quantization parameters of highpass frequency bands to embed secret messages. In addition, a technique to generate a stego-image with the original cover image file size being kept for reducing the possibility of arousing notice from attackers is also proposed. For image authentication, a block-based authentication method based on embedding DC_LP coefficients as authentication signals into the highpass coefficients of the image blocks is proposed, which can be employed to verify the integrity and fidelity of JPEG XR images by comparing the extracted authentication signals with those computed from the current image content. For copyright protection, a removable visible watermarking method based on modifying the DC_LP coefficients in JPEG XR images by certain number division operations is proposed. Specifically, the remainders of dividing the DC_LP coefficients by a pre-selected integer number are embedded into the highpass coefficients of image blocks as watermark signals which can be losslessly removed if necessary. Measures to enhance the security of each of the proposed methods are also suggested. Good experimental results show the feasibility of the proposed methods.

關鍵字

JPEG XR 資訊隱藏

並列摘要


無資料

並列關鍵字

JPEG XR Information hiding

參考文獻


[16] I. S. Lee and W. H. Tsai, “Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes,” International Journal of Network Security, Vol. 10, No. 1, pp. 1-10, Jan 2010.
[2] D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, June 2003.
[5] C.C. Chang, T.S. Chen and L.Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Science, Vol. 141, No. 1, pp. 123-138, 2002.
[6] A. Jain and I. Sen Gupta, “A JPEG compression resistant steganography scheme for raster graphics image,” TENCON 2007 - 2007 IEEE Region 10 Conference, Taipei, Taiwan, Oct. 2007.
[8] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Transactions on Image Processing, Vol. 14, No. 2, 2005, pp. 253-266.

被引用紀錄


郭淑惠(2016)。阻力或助力--探討教師面對校外壓力團體之經驗與因應之道〔碩士論文,國立中正大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201614045766

延伸閱讀