透過您的圖書館登入
IP:3.147.78.174
  • 學位論文

基於CSD資料表示與交錯式整數轉換之可回復式資料隱藏

REVERSIBLE DATA HIDING BASED ON CSD DATA REPRESENTATION AND AN INTERLEAVING INTEGER TRANSFORM

指導教授 : 汪順祥
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在本篇論文,我們提出了二個可回復式資料隱藏的方法。第一個可回復式資料隱藏的方法,是將原始影像切割成非重疊的影像區塊,並且將所要嵌入的資料,由原本的二位元表示方式轉換成CSD的表示方式。其中,將影像切割成小的區塊,是為了增加其藏入資料量的容量。而利用CSD的表式方式,則是由於它具有最少的非零個數,因此能夠減少像數值的改變。我們經由全部影像區塊作整數轉換之後的差值直方圖,將所要嵌入的資料藏入影像中,並且修改些微的像素值來達到資料隱藏的目的。 第二個可回復式資料隱藏的方法,是基於一種交錯式整數轉換和直方圖位移。此方法充分利用整張影像中的每一個像素值,在藏入機密訊息後的偽裝影像,每個像素值的改變量均小於或等於1,確保原始影像和偽裝影像的相似度。我們所提出的這二個方法,將隱藏資料取出之後,皆能夠恢復其原始影像。由實驗結果可看出,我們所提出的這二個方法皆具有較高的PSNR值(在相同的隱藏容量)。

並列摘要


This thesis presents two reversible data hiding methods. The first reversible data hiding method divides an input image into non-overlapping blocks and embeds CSD represented data. We divide the original image into smaller blocks, in order to increase the data capacity. The CSD data representation has a minimum number of nonzero digits thus it can decrease alteration of the pixels. Based on an integer transform, we calculate the mean and difference values of the adjacent pixels. Based on the histogram of the difference values, we modify difference values slightly to embed data into the image. The second reversible data hiding method embeds data based on an interleaving integer transform and histogram shifting. The increment of each pixel values is smaller than or is equal to 1, thus the original image and the camouflage image are remained similarly. These two methods can recover the original image without any distortion from the marked image after the hidden data have been extracted. Experimental results show that these two methods outperform the prior works in terms of a larger payload or a higher PSNR (at the same payload).

參考文獻


[1] J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
[4] J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding—New Paradigm in Digital Watermarking,” EURASIP J. Appl. Signal Processing, vol. 2002, no. 2, pp. 185–196, Feb. 2002.
[5] C. De Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management,” IEEE Tran. Multimedia, vol. 5, pp. 97–105, Mar. 2003.
[9] G. Xuan, Y.Q. Shi, C. Yang, Y. Zheng, D. Zou, and P. Chai, “Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique,” IEEE Int. Conf. Multimedia and Expo, PP. 1520-1523, July 2005.
[10] J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Tran. Circuits and Systems for Video Technology, vol. 13, issue 8, pp. 890-896, Aug. 2003.

延伸閱讀