透過您的圖書館登入
IP:3.138.204.208
  • 學位論文

可以忍受失真壓縮處理的資訊隱藏技術

Lossy Compression-Tolerant Data Hiding

指導教授 : 施國琛

摘要


在網際網路快速發展的時代中,資訊在公開網路上傳遞的數量也越來越多,有時候我們並不希望我們所傳遞的重要資訊或資料,被其他不相關的人所檢閱,因此漸漸的有了加解密技術的產生,但是只靠加解密技術已經不再能夠滿足現在的需求,因為加解密後所得的資訊會變為亂碼,在網路上傳遞亂碼不就是告訴大家這是重要的資訊,所以如果我們可以將亂碼隱藏在一份有意義的資料中,欺騙過破壞或偷窺者,便可以解決這樣的顧慮,在這篇論文中所提出的方法就是在於解決這方面問題,可以讓使用者將他們所要傳遞的重要資訊隱藏在一張圖形中,讓其他人誤會使用者只是在傳遞一張不重要的圖形,事實上裡面藏有其他重要的資訊。 有此可知,資訊隱藏技術既然是在於隱藏一份資訊,所做出來的技術就需要符合幾項條件,首先當我們將資料隱藏到一份有意義的資料中時,對於這份有意義的資料不能破壞太多,否則就喪失隱藏的原意,讓其他的使用者發現我們有東西隱藏在裡面,另外所能隱藏的量越多越好,這樣可以方便使用者隱藏多一點的東西。本文所提出的資訊隱藏方式是利用圖形來隱藏重要資訊,除了符合一般方法所擁有的這兩種特性外,我們的方法還可以使我們的圖形在忍受失真壓縮後,完整的將原本隱藏在內的資訊萃取出來,因為現在已經很少人使用沒有失真壓縮的圖形在網路上傳輸了,而且傳輸失真壓縮過的圖形檔案大小比較小,對於使用者來說是比較方便的,另外在失真壓縮後還能完整的取出原來的所有資料,才適合隱藏文字或不能損失任何位元的資料。

關鍵字

資訊隱藏 VQ JPEG 圖形失真壓縮

並列摘要


Lossy compression-tolerant data hiding methods are proposed in this thesis. Data hiding hides the confidential data secretly. The unauthorized people are difficult to detect hidden data. It provides a secure channel to transmit confidential information. Nowadays, it is a very important technique when we are progressively going to computer network age. There are many hiding method that have proposed. But the most of methods will lost an amount of hiding data after do the lossy compression process. However, there are few people will transmit no lossy compression image in the public internet. When people use our method, the receiver can extracts complete data correctly from the lossy compression image. It is fit to hide text data and transmit image in public internet environment now. The propose methods hide data in an image in conjunction with a lossy compression. The image which hides data is called a stego-image. The reverse algorithm extracts data correctly after receiving the stego-image (i.e., the image which hides data). Our mechanism saves the amount of data transmitted on the Internet. Also, it is difficult for human visual system to detect the difference between the original image and the steog-image. Besides, it can speed up transmission of stego-images and is regular that transmit lossy compression image on the internet now.

並列關鍵字

Data Hiding VQ JPEG Lossy Image Compression

參考文獻


Adelson, E. H. (1990), “Digital Signal Encoding and Decoding Apparatus”, U.S. Patent, No.4939515.
Barnett, R., and Pearson, D. E. (1998), “Attack Operators for Digitally Watermarked Images”, IEE Proceedings-Vision, Image and Signal Processing, Vol. 145, Issue 4, pp. 271–279.
Barnett, R., and Pearson, D. E. (1998), “Frequency Mode L.R. Attack Operator for Digitally Watermarked Images”, Electronics Leters, Vol. 34, No. 19, pp. 1837–1839.
Braudaway, G.. W., Magerlein, K. A. and Minzer, F. C. (1996), “Protecting Publicly-Available Images with a Visible Image Watermark”, in the Proceedings of SPIE International Conference on Electronic Imaging, San Jose, CA, Vol. 2659, pp. 126-133.
Celik, M.U., Sharma, G., Tekalp, A.M. and Saber, E. (Feb. 2005), “Lossless Generalized-LSB Data Embedding”, IEEE Transactions on Image Processing, Vol. 14, Issue 2, pp.253 – 266.

被引用紀錄


周素美(2005)。數位相片瑕疵偵測〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2005.00451

延伸閱讀