Title

具有高實用性與隱私權保護之資料隱藏技術研究

Translated Titles

Study on Data Hiding with the High Practicality and Privacy Preserving

Authors

鄭富豪

Key Words

隱私權保護 ; 加密影像 ; 資料隱藏技術 ; 高安全性 ; 高實用性 ; 低失真性 ; Privacy Preserving ; Encryption Image ; Data Hiding ; High Security ; High Practicality ; Low Distortion.

PublicationName

虎尾科技大學電機工程研究所學位論文

Volume or Term/Year and Month of Publication

2015年

Academic Degree Category

碩士

Advisor

陳政宏

Content Language

繁體中文

Chinese Abstract

近年來,由於雲端科技蓬勃發展,使得存放於雲端資料庫上個人資料的隱私權保護成為熱門研究課題。其中,加密影像資料隱藏技術提供了影像所有人以加密形式存放影像於資料庫上,影像內容在未經授權狀況下,無法解密還原影像內容,但是,透過資料隱藏技術可以從加密影像中取得一些次級重要訊息進行資訊處理。本研究論文提出一個具有隱私權保護的新型加密影像資料隱藏技術,新方法可以有效達到高安全性、高隱藏量且具有非常低的失真性。基本上,在加密影像中做資料隱藏技術的研究,其研究難度是非常高地。這是由於在加密影像中進行額外訊息嵌入,會破壞加密影像內容,導致日後原始影像無法還原,而且加密影像的額外訊息可嵌入量是非常低的。本研究論文提出一個新型的資料嵌入演算法,主要是利用透過犧牲非常少的原始影像失真性,來達到顯著地隱藏量提昇。最重要地,新方法可以獨自從加密影像中直接取出額外嵌入的訊息,因此,可以有效地保護影像內容的隱私權,並且在訊息取出後,加密影像可獨立進行影像復原處理。從大量實驗結果與分析比較的數據中證明,本研究論文與現存的加密影像資料隱藏技術相比,無論在隱藏量提昇、原始影像失真性或影像內容隱私權保護均可達到顯著的改善。

English Abstract

The awaking of cloud technology for the past few years has made the privacy preserving of personal information in the cloud database become a popular subject to study. Data hiding for encrypted images offers users to encrypt images on the database. The contents of the image cannot be decrypted without being authorized. However, with the data hiding technique one can still acquire the access of certain secondary important information. This thesis poses a new image data hiding technique with ways to preserve users’ privacy. It is not only highly secured, with high embedding capacity, but it also has the lowest distortion. Generally speaking, it is particularly difficult to carry on researches on data hiding techniques in encrypted images. Embedding extra information in encrypted images will usually damage the contents of images. The original images will not be able to be reduced later on. Moreover, the capacity of the extra information which can be embedded onto the encrypted images is also extremely low. This thesis poses a new data embedding algorithm which raises the capacity of embedding through ways to have the lowest distortion. Most importantly, this method extracts embedded information directly from encrypted images; thus, the privacy of the content can be effectively protected, and encrypted images can be recovered independently after the information is extracted. A great number of experiments and data have proven that comparing with the existed data hiding techniques, this new technique has greatly improved in turns of the capacity of data hiding, the distortion of the original images and the preserving of privacy.

Topic Category 電機資訊學院 > 電機工程研究所
工程學 > 電機工程
Reference
  1. [1] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding–A Survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.
    連結:
  2. [2] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,”IBM Syst. J., vol. 35, no. 3–4, pp. 313–336, 1996.
    連結:
  3. [3] N. Provos and P. Honeyman “Hide and Seek: An Introduction to Steganography,”IEEE Security & Privacy, vol. 1, no. 3, pp. 32–44, 2003.
    連結:
  4. [4] P. Moulin and J. A. O'Sullivan, “Information-Theoretic Analysis of Information Hiding,” IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563–593, 2003.
    連結:
  5. [5] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Lett., vol. 13, no. 5, pp. 285–287, 2006.
    連結:
  6. [7] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized- LSB Data Embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, 2005.
    連結:
  7. [8] L. Sweeney, “K-Anonymity: A Model for Protecting Privacy,”International Journal of Uncertainty Fuzziness and Knowledge-Based System, vol. 10, no. 5, pp. 557–570, 2002.
    連結:
  8. [9] C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,”IEEE Trans. Image Processing, vol. 8, no. 1, pp. 58–68, 1999.
    連結:
  9. [10] B. Chen and G. W. Wornell, “Quantization index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding,”IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443, 2001.
    連結:
  10. [11] N. Memon, and P. W. Wong, “A Buyer-Seller Watermarking Protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, 2001.
    連結:
  11. [12] D. C. Lou, N. I. Wu, C. M. Wang, Z. H. Lin, and C. S. Tsai, “A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity,” J. Syst. Software, vol. 83, no. 7, pp. 1236–1248, 2010.
    連結:
  12. [13] K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, 2010.
    連結:
  13. [14] W. Hong and T. S. Chen, “Reversible Data Embedding for High Quality Images Using Interpolation and Reference Pixel Distribution Mechanism,” J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131–140, 2011.
    連結:
  14. [15] C. Qin, C. C. Chang, Y. H. Huang, and L. T. Liao, “An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism,” IEEE Trans. Circuits Syst. Video Technol., vol. 23, no 7, pp. 1109–1118, 2013.
    連結:
  15. [16] S. W. Jung, L. T. Ha, and S. J. Ko, “A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System,” IEEE Signal Process.Lett., vol. 18, no. 2, pp. 95–98, 2011.
    連結:
  16. [18] C. C. Chang, C. C. Lin, and Y. H. Chen, “Reversible Data-Embedding Scheme Using Differences Between Original and Predicted Pixel Values,”IET Inform. Security, vol. 2, no. 2, pp. 35–46, 2008.
    連結:
  17. [19] D. M. Thodi and J. J. Rodriguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, 2007.
    連結:
  18. [20] C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, 2008.
    連結:
  19. [21] C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognit. , vol. 37, no. 3, pp. 469–474, 2004.
    連結:
  20. [22] D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,”Pattern Recognit.Lett., vol. 24, pp. 1613–1626, 2003.
    連結:
  21. [23] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods.” Proc. Inst. Elect. Eng., vol. 152, no. 5, pp. 611–615, 2005.
    連結:
  22. [24] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function,” J. Syst. Softw., vol. 81, pp. 150–158, 2008.
    連結:
  23. [25] N. I. Wu, K. C. Wu, and C. M. Wang, “Exploring pixel-Value Differencing and Base Decomposition for Low Distortion Data Embedding,”Appl. Soft Comput., vol. 12, no. 2, pp. 942–960, 2012.
    連結:
  24. [26] J.Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003.
    連結:
  25. [28] Y. Y. Tsai, D. S. Tsai, and C. L. Liu, “Reversible Data Hiding Scheme Based on Neighboring Pixel Differences,” Digit. Signal Process., vol. 23, no. 3, pp. 919–927, 2013.
    連結:
  26. [29] D. Kundur and K. Karthik, “Video Fingerprinting and Encryption Principles for Digital Rights Management,” Proc. IEEE, vol. 92, no. 6, pp. 918–932, 2004.
    連結:
  27. [31] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, “A Commutative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain,” Signal Processing: Image Commun., vol. 26, no. 1, pp. 1–12, 2011.
    連結:
  28. [33] X. Zhang, “Reversible Data Hiding in Encrypted Images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, 2011.
    連結:
  29. [34] W. Hong, T. Chen, and H. Wu, “An Improved Reversible Data Hiding in Encrypted Images Using Side Match,” IEEE Signal Process. Lett., vol. 19, no 4, pp. 199–202, 2012.
    連結:
  30. [35] X. Liao and C. W.Shu, “Reversible Data Hiding in Encrypted Images Based on Absolute Mean Difference of Multiple Neighboring Pixels,” J. Vis. Commun. Image Represent., vol. 28, pp. 21–27, 2015.
    連結:
  31. [6] N. I. Wu and M. S. Hwang, “Data Hiding: Current Status and Key Issues,” International Journal of Network Security, vol. 4, no. 1, pp. 1–9, 2007.
  32. [17] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible Image Watermarking Using Interpolation Technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, 2010.
  33. [27] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Trans. CircuitsSyst. Video Technol., vol. 16, no. 8, pp. 354–362, 2006.
  34. [30] S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative Encryption and Watermarking in Video Compression,”IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, 2007.
  35. [32] W. Puech, M. Chaumont, and O. Strauss, “A Reversible Data Hiding Method for Encrypted Images,” in: SPIE Electronic Imaging,Security, Forensics, Steganography, and Watermarking of MultimediaContents, vol. 6819, 2008.