透過您的圖書館登入
IP:3.226.254.255
  • 學位論文

具有高實用性與隱私權保護之資料隱藏技術研究

Study on Data Hiding with the High Practicality and Privacy Preserving

指導教授 : 陳政宏
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來,由於雲端科技蓬勃發展,使得存放於雲端資料庫上個人資料的隱私權保護成為熱門研究課題。其中,加密影像資料隱藏技術提供了影像所有人以加密形式存放影像於資料庫上,影像內容在未經授權狀況下,無法解密還原影像內容,但是,透過資料隱藏技術可以從加密影像中取得一些次級重要訊息進行資訊處理。本研究論文提出一個具有隱私權保護的新型加密影像資料隱藏技術,新方法可以有效達到高安全性、高隱藏量且具有非常低的失真性。基本上,在加密影像中做資料隱藏技術的研究,其研究難度是非常高地。這是由於在加密影像中進行額外訊息嵌入,會破壞加密影像內容,導致日後原始影像無法還原,而且加密影像的額外訊息可嵌入量是非常低的。本研究論文提出一個新型的資料嵌入演算法,主要是利用透過犧牲非常少的原始影像失真性,來達到顯著地隱藏量提昇。最重要地,新方法可以獨自從加密影像中直接取出額外嵌入的訊息,因此,可以有效地保護影像內容的隱私權,並且在訊息取出後,加密影像可獨立進行影像復原處理。從大量實驗結果與分析比較的數據中證明,本研究論文與現存的加密影像資料隱藏技術相比,無論在隱藏量提昇、原始影像失真性或影像內容隱私權保護均可達到顯著的改善。

並列摘要


The awaking of cloud technology for the past few years has made the privacy preserving of personal information in the cloud database become a popular subject to study. Data hiding for encrypted images offers users to encrypt images on the database. The contents of the image cannot be decrypted without being authorized. However, with the data hiding technique one can still acquire the access of certain secondary important information. This thesis poses a new image data hiding technique with ways to preserve users’ privacy. It is not only highly secured, with high embedding capacity, but it also has the lowest distortion. Generally speaking, it is particularly difficult to carry on researches on data hiding techniques in encrypted images. Embedding extra information in encrypted images will usually damage the contents of images. The original images will not be able to be reduced later on. Moreover, the capacity of the extra information which can be embedded onto the encrypted images is also extremely low. This thesis poses a new data embedding algorithm which raises the capacity of embedding through ways to have the lowest distortion. Most importantly, this method extracts embedded information directly from encrypted images; thus, the privacy of the content can be effectively protected, and encrypted images can be recovered independently after the information is extracted. A great number of experiments and data have proven that comparing with the existed data hiding techniques, this new technique has greatly improved in turns of the capacity of data hiding, the distortion of the original images and the preserving of privacy.

參考文獻


[1] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding–A Survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.
[2] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,”IBM Syst. J., vol. 35, no. 3–4, pp. 313–336, 1996.
[3] N. Provos and P. Honeyman “Hide and Seek: An Introduction to Steganography,”IEEE Security & Privacy, vol. 1, no. 3, pp. 32–44, 2003.
[4] P. Moulin and J. A. O'Sullivan, “Information-Theoretic Analysis of Information Hiding,” IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563–593, 2003.
[5] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Lett., vol. 13, no. 5, pp. 285–287, 2006.

延伸閱讀