透過您的圖書館登入
IP:3.12.34.178
  • 期刊

植基於雙影像之可逆式藏入法使用中間對折策略與區間量表

Reversible Data Hiding Scheme Based on Dual Image Using Central Folding and Interval Scale

摘要


Lu、Wu及Huang學者於2015年提出使用中間對折策略之可逆式雙影像藏入法,該方法設定了一個固定的數值決定藏入量,接著將藏入訊息轉為十進制並使用中間對折策略,減少數值的大小,而後對切數值將之藏入兩張偽裝影像中。作者的方法固定藏入量,因此,本論文透過區間量表變動藏入量,所提方法先將影像切割成1×2不重疊的區塊,接著透過區塊內相鄰像素差值帶入區間量表得知所能藏入的訊息量,來達成保持影像品質,同時藏入更多訊息的目的。實驗結果顯示本文所提出方法能夠藏入更多的訊息。

並列摘要


Lu et al. proposed a dual-image-based reversible data hiding method using center folding strategy in 2015. The method used a fixed value to decide the hiding capacity. The secret data transformed by decimal system and folded by using center folding strategy. The folded secret data then hidden into two stego-images. The hiding capacity of Lu et al.'s scheme is fixed that is non-flexibility. Thus, this paper applies an interval scale strategy to dynamically change the hiding payload. The proposed scheme divides the original image into several non-overlap blocks sized 1×2. Then, the scheme calculates the difference between two pixels in the block. The interval scale table is used to determine the hiding bits of the block to control the image quality and to obtain higher hiding capacity. The experimental results show that the proposed scheme can get higher capacity.

參考文獻


K. C. Choi, and C. M. Pun, “Adaptive image encryption for high capacity reversible data hiding,” 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, 2017.
F. Huang, X. Qu, H. J. Kim, and J. Huang, “Reversible data hiding in JPEG images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 26, No. 9, pp. 1610-1621, 2016.
K. H. Jung, and K. Y. Yoo, “High-capacity index based data hiding method,” Multimedia Tools and Applications, Vol. 74, No. 6, pp. 2179-2193, 2015.
W. C. Kuo, C. C. Wang, and H. C. Hou, “Signed digit data hiding scheme,” Information Processing Letters, Vol. 116, No. 2, pp. 183-191, 2016.
T. C. Lu, C. Y. Tseng, and J. H. Wu, “Asymmetric-histogram based reversible information hiding scheme using edge sensitivity detection,” Journal of Systems and Software, Vol. 116, pp. 2-21, 2016.

延伸閱讀