• 沒有找到結果。

A Content-Based Reversible Data Hiding Scheme Based on Difference Expansion and Histogram Shifting 陳怡菁、林國祥

N/A
N/A
Protected

Academic year: 2022

Share "A Content-Based Reversible Data Hiding Scheme Based on Difference Expansion and Histogram Shifting 陳怡菁、林國祥"

Copied!
2
0
0

加載中.... (立即查看全文)

全文

(1)

A Content-Based Reversible Data Hiding Scheme Based on Difference Expansion and Histogram Shifting

陳怡菁、林國祥

E-mail: 9805515@mail.dyu.edu.tw

ABSTRACT

Steganography is a technology for covert communication. That is, secret data can be embedded into cover media and then it is difficult to determine whether this medium contains secret data or not. In some applications (e.g., medical and military images), the permanent errors resulting from data hiding is not allowable. Therefore, it motivates us to develop a reversible steganographic scheme.

In order to achieve imperceptibility and blind extraction, the difference expansion method is modified and integrated with the histogram shifting in this thesis. In the modified difference expansion scheme, local properties of image content are extracted to determine the number of embedded bits of each pixel pair to raise the embedding capacity.

To evaluate our proposed steganographic scheme, some popular images are tested. Experimental results demonstrate that compared with the existing method, our proposed steganographic scheme is capable of not only yielding a higher PSNR and NQM but also increase the embedding capacity.

Keywords : steganography、reversible data embedding、difference expansion Table of Contents

封面內頁 簽名頁 授權書 中文摘要 ABSTRACT 誌謝 目錄 圖目錄 表目錄

第一章 緒論 1.1 研究動機與目的 1.2 論文架構 第二章 相關研究 2.1 差值擴展 2.2 小波轉換

2.2.1 Haar函數離散小波轉換 2.2.2 5/3整數小波轉換

第三章 本論文之可逆資料隱藏法則 3.1 空間域

3.1.1 資料嵌入程序

3.1.2 資料擷取與內容還原程序 3.2 小波轉換域

3.2.1 資料嵌入程序

3.2.2 資料擷取與內容還原程序 第四章 實驗結果

4.1 視覺品質分析 4.1.1 空間域 4.1.2 小波轉換域

(2)

4.2 系統參數分析 4.2.1 空間域 4.2.2 小波轉換域 4.3 文獻比較 4.3.1 空間域 4.3.2 小波轉換域 第五章 結論 參考文獻 REFERENCES

[1]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Trans. on Image Processing, vol.

14, pp 253-266, 2005.

[2]C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. on Multimedia, vol. 5, pp 97-105, 2003.

[3]J. Tian “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits Syst. Video Technol, vol. 13, pp 890-896, 2003.

[4]S. K. Lee, Y. H. Suh, and Y. Sung Ho, “Lossless data hiding based on histogram modification of difference images,” in Proc. Pacific-Rim Conf. on Multimedia, LNCS 3333, pp 340-347, 2004.

[5]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” in Proc. IEEE Int’l, Symposium on Circuits and Systems, vol. 2, pp II-912-II-915, 2003.

[6]Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, “Robust lossless data hiding,” in Proc. IEEE Int’l Conf. on Multimedia & Expo, vol. 3, pp 2199-2202, 2004.

[7]A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. on Image Processing, vol. 13, pp 1147-1156, 2004.

[8]J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding – new paradigm in digital watermarking,” EURASIP Journal on Applied Signal Processing, vol. 2002, pp 185-196, 2002.

[9]M. Diljith Thodi, and J. Jeffrey Rodr?guez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. on image processing, vol. 3, pp 721-730, 2007.

[10]Sunil Lee, C. D. Yoo, and T. Kalker, “Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform,” IEEE Trans. on Information Forensics and Security, vol. 2, pp 321-330, 2007.

[11]L. Kamstra, and H. J. A. M. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Trans. on Image Processing, vol. 14, pp 2082-2090, 2005.

[12]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Trans. on Image Processing, vol.

14, no. 2, pp 253-266, 2005.

[13]H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, “A Novel Difference Expansion Transform for Reversible Data Embedding,”

IEEE Trans. on Information Forensics and Security, vol. 3, pp 456-465, 2008.

[14]Ching-Chiuan Lin, and Nien-Lin Hsueh, “A lossless data hiding scheme based on three-pixel block differences,” Pattern Recognition, vol.

41, no. 4, pp 1415-1425, 2008.

[15]Wen-Chung Kuo, and Dong-Jin Jiang, and Yu-Chih Huang, “A Reversible Data Hiding Scheme Based on Block Division,” Congress on Image and Signal Processing, vol. 1, pp 365-369, 2008.

[16]N. D. Venkata, T. D. kite, W. S. Geisler, B. L. Evans, and A. C. Bovi, “Image quality assessment based on a degradation model,” IEEE Trans. on Image Processing, vol. 9, pp 636-650, 2002.

[17]Wen-Nung Lie, Guo-Shiang Lin, and Shen-Long Cheng, “Dual protection of JPEG images based on informed embedding and two-stage watermark extraction,” IEEE Trans. on Information Forensics and Security, vol. 1, pp 330-341, 2006.

[18]D. C. Lou, and T. L. Yin, “Adaptive Digital Watermarking Using Fuzzy Logic Technique,” Optical Engineering, vol. 41, no. 10, pp 2675-2687, 2002.

參考文獻

相關文件

Laser Capture Microdissection Microdissection of Fluorescently of Fluorescently Labeled Embryonic Cranial Neural Crest Cells Labeled Embryonic Cranial Neural Crest Cells..

Project 1.3 Use parametric bootstrap and nonparametric bootstrap to approximate the dis- tribution of median based on a data with sam- ple size 20 from a standard normal

• Learn the mapping between input data and the corresponding points the low dimensional manifold using mixture of factor analyzers. • Learn a dynamical model based on the points on

In this chapter, the results for each research question based on the data analysis were presented and discussed, including (a) the selection criteria on evaluating

Mehrotra, “Content-based image retrieval with relevance feedback in MARS,” In Proceedings of IEEE International Conference on Image Processing ’97. Chakrabarti, “Query

SERVQUAL Scale and relevant scales to bus service quality, and based on service content and customer service related secondary data of H highway bus service company, to design the

Lin, “Automatic Music Genre Classification Based on Modulation Spectral Analysis of Spectral and Cepstral Features”, IEEE Trans.. on

A decision scheme based on OWA operator for an evaluation programme: an approximate reasoning approach. A decision scheme based on OWA operator for an evaluation programme: