現在位置首頁 > 博碩士論文 > 詳目
論文中文名稱:基於區塊截斷編碼高品質與大容量資料隱寫技術 [以論文名稱查詢館藏系統]
論文英文名稱:High-Quality and High-Capacity Data Hiding Based On Absolute Moment Block Truncation Coding [以論文名稱查詢館藏系統]
院校名稱:臺北科技大學
學院名稱:機電學院
系所名稱:自動化科技研究所
畢業學年度:107
畢業學期:第一學期
出版年度:107
中文姓名:陳柏諺
英文姓名:Bo-Yan Chen
研究生學號:105618004
學位類別:碩士
語文別:中文
口試日期:2018/07/05
論文頁數:42
指導教授中文名:陳永耀
指導教授英文名:Yung-Yao Chen
口試委員中文名:花凱龍;簡士哲;黃正民
口試委員英文名:Kai-Lung Hua;shih-che Chien;cheng-Ming Huang
中文關鍵詞:多媒體浮水印資料安全區塊截斷編碼技術
英文關鍵詞:Multimedia watermarkingInformation securityAbsolute moment block truncation coding (AMBTC)
論文中文摘要:每天有許多圖像透過互聯網來進行傳輸的動作,但是對於包含有個人隱私的圖像,如個人醫療圖像、透過公共網路來進行傳輸可能會被有心人士所盜取個資,因此數位浮水印技術對於保全個資以及機密訊息至關重要,另外大多數的圖像會經過資料壓縮技術應用在數位圖像,目的是減少圖像資料中的冗餘資訊,從而用更加高效的格式儲存和傳輸資料,影像壓縮可以分為有損資料壓縮與無失真資料壓縮。常見的應用有raw和tiff格式等。通過DCT變換後選擇性丟掉人眼不敏感的細節,實現高壓縮比率。本文提出一種基於區塊截斷編碼壓縮技術的資料隱寫技術,此技術用於透過圖像壓縮提高壓縮效率並且同時透過資料隱寫技術將機密訊息藏入圖像中確保通信安全,並且確保圖片保有最小化的失真,並且不會被有心人士所竊取機密。
在所提出的方法中,首先將圖像依照圖像的特性分類成兩種類型不同的區塊類型1.平滑區2.複雜區,兩種方案,根據兩種方案會有不同的資料隱寫技術,使得每個區塊有最多的資料隱寫並且最小化圖像的失真,實驗結果指出我們提出的方法不管在於影像品質或者資料隱寫的部份都優於其他比較論文。
論文英文摘要:The Internet-based applications are widely distributed. However, for the privacy concern, when uploading personal medical images to the Internet, the internet is for the public’s use and thus, an unreliable environment which makes it easy to head off sensitive information. Additionally, most digital transmitted images are compressed first so as to increase transmission efficiency. Image compressed can be classified as lossless compression and lossy compression such as GIF and JPEG are lossy compression. After the DCT transform, the signal components that are insensitive to human eyes are selectively lost and a high compression ratio is achieved. This paper proposed image steganography scheme based on block truncation coding and reduce the Internet transmission efficiency by compressing the image and to ensure secure communication by embedding secret information into the compressed image at the same time.
論文目次:目錄
中文摘要 ii
英文摘要 iii
誌 謝 iv
目錄 v
表目錄 vii
圖目錄 viii
第一章 緒論 1
1.1 研究背景與目的 1
1.2 數位浮水印的分類 4
1.3 論文架構 6
第二章 相關應用文獻 7
2.1 數位半色調技術 7
2.2 直接二元搜尋法 8
2.3 區塊截斷編碼(BTC) 13
2.4 Absoulation Moment Block Truncation Coding 16
2.5 Related AMBTC-Based Watermarking Methods 19
2.6 Our Contribution 20
第三章 Proposed 21
3.1 Rule 1&Rule 2: Watermarking in Smooth Block 22
3.2 Concept of DBSBTC Method 23
3.2 Rule 2:Watermarking in Complex Blocks 28
第四章 實驗結果 31
4.1 Definition of Image Quality Measures 32
4.2Performance Evaluation and Comparison 34
第五章 結論 38
References 40
論文參考文獻:[1] M. Zhao, J. Pan, S. Chen, “Entropy-based audio watermarking via the point of view on the compact particle swarm optimization,” J. Internet Technology, vol. 16, no. 3, pp. 485-493, May. 2015.
[2] H. Al-Otum, “Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique,” J. Visual Communication and Image Representation, vol. 25, no. 5, pp. 1064-1081, July 2014.
[3] I. Pan, T. Chang, P. Huang, “DWT-based watermarking using 2DLDA for color images,” J.Internet Technology, vol. 15, no. 7, pp. 1101-1109, Dec. 2014.
[4] M. Ali, C. Ahn, M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik, vol. 125, no. 1, pp. 428-434, Jan. 2014.
[5] Z. Xia, X. Wang, X. Sun, B. Wang, “Steganalysis of least significant bit matching using multi ‐ order differences,” Security and Communication Networks, vol. 7, no. 8, pp. 1283-1291, Aug. 2014.
[6] I. Dragoi, D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Tran. Image Processing, vol. 23, no. 4, pp. 1779-1790, April 2014.
[7] I. Dragoi, D. Coltuc, “On local prediction based reversible watermarking,” IEEE Tran. Image Processing, vol. 24, no. 4, pp. 1244-1246, April 2015.
[8] G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, C. Roux, “Reversible watermarking based on invariant image classification and dynamic
histogram shifting,” IEEE Tran. Information Forensics and Security, vol. 8, no. 1, pp. 111-120, Jan. 2013.
[9] F. Chen, H. He, Y. Huo, “Self-embedding watermarking scheme against JPEG compression with superior imperceptibility,” Multimedia Tools and Applications, vol. 76, no. 7, pp. 9681-9712, April 2017.
[10] T. Hsu, A. Yein, W. Hsieh, N. Chen, J. Chiang, T. Su,Reversible Watermarking Algorithm Based on Embedding Pixel Dependence,” J. Internet Technology, vol. 13, no. 4, pp. 571-580, Jul. 2012.
[11] T. Pan, S. Weng, Z. Zhou, S. Chu, J. F. Roddick, “Reversible Watermarking Based on Position Determination and Pixel Pairs,” J. Internet
Technology, vol. 17, no. 4, pp. 779-787, Jul. 2016.
[12] I. Chang, Y. Hu, W. Chen, C. Lo, “High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding,”
Signal Processing, vol. 108, no. 4, pp. 376-388, March 2015.
[13] Y. Huang, C. Chang and Y. Chen, “Hybrid secret hiding schemes based on absolute moment block truncation coding,” Multimedia Tools and Applications, vol. 76, no. 5, pp. 6159-6174, March 2017.
[14] J. Guo, M. Wu, “Improved block truncation coding based on the void-and-cluster dithering approach,” IEEE Tran. Image Processing, vol. 18, no. 1, pp.
211-213, Jan. 2009.
[15] J. Guo, C. Su, “Improved block truncation coding using extreme mean value scaling and block-based high speed direct binary search,” IEEE Signal Processing Letters, vol. 18, no. 11, pp. 694-697, Sept. 2011.
[16] M. Lema, O. Mitchell, “Absolute moment block truncation coding and its application to color images,” IEEE Trans. Communications, vol. 32, no. 10, pp. 1148-1157, Oct. 1984.
[17] D. Ou, W. Sun, “High payload image steganography with minimum distortion based on absolute moment block truncation coding,” Multimedia Tools and Applications, vol. 74, no. 5, pp. 9117-9139, Nov. 2015.
[18] W. Hong, T. Chen, Z. Yin, B. Luo, Y. Ma, “Data hiding in AMBTC images using quantization level modification and perturbation technique,” Multimedia Tools and Applications, vol. 76, no. 3, pp. 3761-3782, Feb. 2017.
[19] Y. Hu, C. Lo, W. Chen, C. Wen, “Joint image coding and image authentication based on absolute moment block truncation coding,” J. Electron Imaging, vol. 22, no. 1, pp. 1-11, Jan. 2013.
[20] C. Chang, H. Wu, T. Chung, “Applying histogram modification to embed secret message in AMBTC,” Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan,2014, pp. 489-493.
[21] C. Chang, Y. Liu, S. Nguyen, “A novel data hiding scheme for block truncation coding compressed images using dynamic programming strategy,” Proc. SPIE Conference on Graphic and Image Processing, Beijing, China, 2014, pp. 1-10.
[22] H. Yang, J. Yin, “A secure removable visible watermarking for BTC compressed images,” Multimedia Tools and Applications, vol. 74, no. 6, pp. 1725-1739, March 2015.
[23] C. Kim, D. Shin, L. Leng, C. Yang, “Lossless data hiding for absolute moment block truncation coding using histogram modification,” J. Real-Time Image Proc., pp. 1-14, Oct. 2016.
[24] N. Huynh, K. Bharanitharan, C. Chang, Y. Liu, “Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images,” Multimedia Tools and Applications, vol. 76, no. 3, pp. 1-17, Feb. 2017.
[25] Y. Chen, K. Chi, “Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding,”Multimedia Systems,pp. 1-13, July 2017.
[26] D. Lieberman, Jan P. Allebach, “A dual interpretation for direct binary search and its implications for tone reproduction and texture quality,” IEEE Tran. Image Processing, vol. 9, no. 11, pp. 1950-1963, Nov. 2000.
[27] The USC-SIPI Image Database [Available Online]. http://sipi.usc.edu/dat
論文全文使用權限:不同意授權