透過您的圖書館登入
IP:3.15.218.254
  • 學位論文

資訊隱藏技術與其有效演算法之研究

A Study of Information Hiding and Its Efficiency Algorithm

指導教授 : 吳憲珠
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來,智慧財產的保護是一個極大的挑戰,也因此資訊隱藏相關的技術變得日益重要,取決於不同的需求及目的,本碩士論文針對資訊隱藏的相關主題提出三個不同的方法。在本論文中第一個方法提出以區塊為基礎的驗證浮水印機制,運用於確認二元影像的完整性。當取得一張要保護的二元影像時,首先將影像切割為個別不重複的區塊,接著利用雜湊函數對於區塊取得訊息摘要,並利用 XOR 運算結合浮水印與訊息摘要,最後再將得到的機密值藏入要保護的影像中。當保護後的二元影像遭到如隨機攻擊或偽造攻擊時,本論文所提出的方法可有效地偵測在影像中何處遭到竄改。在資訊隱藏的技術中,一般普遍運用於影像的資料隱藏方法為最低有效位元置換,但這個方法會造成原始影像的失真,以至於可能引起惡意人士的注意。隨後,最佳化的最低有效位元置換因而被提出改善這類的問題,但是這個方法必須花費大量的運算時間。因此,本論文的第二個方法提出一個高效能的演算法以解決這個問題,本方法將最佳化的最低有效位元位置的問題簡化為指派問題,結合匈牙利演算法的運算,進而可利用最少的記憶體及時間找出最佳解。 本論文的第三個方法提出一個高容量及高品質的可逆式資料隱藏技術。主要的概念為利用鄰近像素值相似性的特性將遮蔽的影像利用鄰近的像素分組為不重疊的群組。接著計算每各個群組之差值得到完整差值表,並加總每個誤差值的次數以建立一個差值長條圖,最後利用長條圖的位移來藏入資訊。由實驗的結果證明本論文所提出的方法之隱藏量及遮蔽影像的品質均明顯地優於傳統長條圖的位移方法。

並列摘要


Recently, protecting the intellectual property rights of digitized information is a serious challenge. For the reason above, related information hiding technologies are becoming more and more important. In accordance with different requests, there are three different schemes proposed in this thesis. The first scheme presents a new block-based authentication watermarking for verifying the integrity of binary images. The original protected image is partitioned into individual blocks. Each block obtains the hashing message by a hashing function. An exclusive-or operation is performed on the hashing message and watermark values and thus the authentication information is embedded into the protected image. If a binary image is tampered with by random modification or counterfeiting attack, the proposed technique can detect which locations have been altered. In many data hiding techniques, the simple least-significant-bit (LSB) substitution is a general scheme used to embed secret message in the cover image. This practice may injure the quality of the host image which increases the probability that malicious users will notice the existence of something within the stego-image. As a result, the optimal LSB substitution method was proposed to improve the quality of the image, but the optimal LSB substitution solution is not easy to find. Therefore, the second scheme proposed an efficient algorithm as an attempt to solve the above problem. In the second proposed scheme, the optimal LSB substitution problem is regarded as a general assignment problem, and then the Hungarian algorithm is used to find the actual optimal LSB substitution solution. Also the proposed scheme does not need a great deal of memory space. The third scheme proposed an effective reversible steganographic technique. The main concept is to utilize a similar property of all neighboring pixels. In the proposed scheme, the cover image is divided into non-overlapping groups by the neighboring pixel. Then each group is counted with an error value and then a complete error table can be derived. Then, the frequency of each error value is summed up and allows for the construction of the error histogram. Finally, the histogram shift scheme is used to hide data. The experimental results prove that by using the proposed scheme, the payload size and covered image quality are both obviously better than the original histogram shift scheme.

參考文獻


[1] A.M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Transactions on Image Processing, Vol. 13, 2004, pp. 1147-1156.
[3] P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, 2005, pp. 96-102.
[4] P. Barreto, H.Y. Kim, and V. Rijmen, “Toward a secure public-key blockwise fragile authentication watermarking,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, 2001, pp. 494-497.
[5] W. Bender, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, 1996, pp. 313-336.
[6] R.E Burkard, “Selected topics on assignment problems,” Discrete Applied Mathematics, Vol. 36, 2002, pp. 257-302.

延伸閱讀