透過您的圖書館登入
IP:18.226.177.223
  • 學位論文

植基於JPEG格式的資訊隱藏演算法

JPEG-Based Steganographic Algorithms

指導教授 : 陳朝欽
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


藏密學是用於資訊隱藏的一種方法,隨著網路通訊的持續成長,愈益凸顯它的重要性。現在,已經有非常多的藏密演算法或藏密軟體已經被開發出來了,其中也包括了把資訊藏入於JPEG 影像之隱藏技術。JPEG是數位相機常使用的影像格式並廣泛應用在網路上。 這篇論文提供了兩個方法改進F5資訊隱藏演算法的藏密容量。第一個方法屬於前處理的方法,在F5資訊隱藏演算法執行前,我們會隨機修改量化後的DCT係數去得到更多的非零的量化後的DCT係數來藏訊息。第二個方法裡,在F5資訊隱藏演算法執行後,我們在JPEG影像裡會稍微修改每個DCT區塊的結束位置的資訊去增加藏密容量。我們只要在量化後的DCT 8×8 區塊內修改一個DCT係數就能多儲存三位元的資料。縱使PSNR的數值有一點降低,我們提出的演算法跟許多經典的資訊隱藏演算法相比,藏密容量卻有顯著的進步。

關鍵字

資訊隱藏

並列摘要


Steganography is a method of data hiding. It is more and more important while the Internet communication grows up. Now, many steganographic algorithms or software have already been developed including image hiding techniques for JPEG images. JPEG is the most common image format used by digital cameras and transmitted in the Internet. This thesis proposes two methods to increase the capacity of F5 embedding algorithm. The first method is a pre-processing method, we randomly modifies the qDCT coefficients before the F5 embedding algorithm to get more nonzero qDCT coefficients to embed message. In the second method, we slightly modify the end of block (EOB) information in a JPEG image to increase the capacity of embedding after the F5 embedding algorithm. We change a qDCT coefficient on each qDCT 8×8 block to embed 3 more bits of message. Although the PSNR value is slightly decreased, our proposed algorithm significantly increases the capacity of embedding compared with many classical steganographic algorithms.

並列關鍵字

無資料

參考文獻


[Frid2003] J. Fridrich, M. Goljan, and D. Hogea, “New methodology for breaking steganographic techniques for JPEGs,” Proceedings of SPIE: Security and Watermarking of Multimedia Contents, Vol. 5020, 143-155, 2003.
[John1998] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, 26-34, 1998.
[Liu2008] C. L. Liu, and S. R. Liao, “High-Performance JPEG Steganography using complementary embedding strategy,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008.
[Penn1992] W. B. Pennebaker, and J. L. Mitchell, “JPEG still image data compression standard,” New York: Van Nostrand Reinhold, 1992.
[Prov2003] N. Provos, and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, 32-44, 2003.

延伸閱讀