請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34717
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 貝蘇章(Soo-Chang Pei) | |
dc.contributor.author | Yin-Hsia Yen | en |
dc.contributor.author | 顏吟霞 | zh_TW |
dc.date.accessioned | 2021-06-13T06:24:28Z | - |
dc.date.available | 2016-07-29 | |
dc.date.copyright | 2011-07-29 | |
dc.date.issued | 2011 | |
dc.date.submitted | 2011-07-25 | |
dc.identifier.citation | [1] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits and Systems for Video Technology, Vol. 13, No. 8, August 2003, pp.890-896.
[2] A. M. Alattar, “Reversible watermark using difference expansion of triplets,” in Proc. Int. Conf. Image Process, Vol. 1. Barcelona, Spain, 2003, pp. 501-504. [3] A. M. Alattar, “Reversible watermark using difference expansion of quads,” in Proc. IEEE Int. Conf. Acoustic, Speech, Signal Process, Vol. 3. Toulouse, France, 2004, pp. 377-380. [4] A. M. Alattar, “Reversible watermark using difference expansion of a generalized integer transform,” IEEE Trans. Image Process, Vol. 13, No. 8, August 2004, pp.1147-1156. [5] V. Sachnev and H. J. Kim, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. on Circuits and Systems for Video Technology., Vol. 19, No. 7, July 2009, pp.989-998. [6] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su., “Reversible data hiding,” IEEE Trans. on Circuits and Systems for Video Technology., Vol. 16, No. 3, Mar. 2006, pp.354-362. [7] C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, Vol. 141, Mar. 2002, pp.123-138. [8] J. Fridrich, M. Goljanb, and R. Du, “Invertible authentication watermark for JPEG images,” in IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, April 2001, pp.223-227. [9] C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, Vol. 177, 2007, pp.2768-2786. [10] M. Noorkami and R. M. Mersereau, “A framework for robust watermarking of H.264-encoded video with controllable detection performance,” IEEE Trans. Inform. Forensics Security, Vol. 2, No. 1, Mar. 2007, pp.14-23. [11] X. Gong and H. M. Lu, “Towards fast and robust watermarking scheme for H.264 video,” in Proc. 10th IEEE ISM, Dec. 2008, pp.649-653. [12] S. Kim, Y. Hong, and C. Won, “Data hiding on H.264/AVC compressed video,” Image Anal. Recog., Vol. 4633, 2007, pp.698-707. [13] S. Kapotas, E. Varsaki, and A. Skodras, “Data hiding in H.264 encoded video sequences,” in Proc. IEEE 9th Workshop MMSP, Oct. 2007, pp.373-376. [14] G. Qiu, P. Marziliano, A. Ho, D. He, and Q. Sun. “A hybrid watermarking scheme for H.264/AVC video,” in Proc. ICPR 17th, Aug. 2004, pp.865-868. [15] J. Zhang, A. T. S. Ho, and G. Qiu, “Robust video watermarking of H.264/AVC,” IEEE Trans. on Circuits and Systems—II: Express Briefs, Vol. 54, No. 2, Feb. 2007, pp.205-209. [16] M. Noorkami and R. M. Mersereau, “Compressed-domain video watermarking for H.264,” in Proc. ICIP, Vol. 2, Sep. 2005, pp.11-14. [17] C. V. Nguyen, D. Tay. And G. Deng, “A fast watermarking system for H.264/AVC video,” in Proc. IEEE APCCAS, Dec. 2006, pp.81-84. [18] L. H. J. Kamstra and A. M. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Trans. Image Process, Vol. 14, No. 12, Dec. 2005, pp.2082-2090. [19] S. Lee, C. D. Yoo, and T. Kalker, “Reversible image watermarking based on integer-to-integer wavelet transform,” IEEE Trans. Information. Forensics Security, Vol. 2, No. 3, Sep. 2007, pp.321-330. [20] D. M. Thodi and J. J. Rofriguez, “Reversible watermarking by prediction-error expansion,” in Proc. IEEE Southwest Symp. Image Anal. Interpretation, Lake Tahoe, CA, Mar. 2004, pp.21-25 [21] D. M. Thodi and J. J. Rofriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Processing, Vol. 16, No. 3, Mar. 2007, pp.721-730. [22] M. Kuribayashi, M. Morii, and H. Tanaka, “Reversible watermark with large capacity based on the prediction error expansion,” IEICE Trans. Fundamentals, Vol. 91, No. 7, 2008, pp.1780-1790 [23] Y. Hu, H.-K, Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits and Systems for Video Technology., Vol. 19, No. 2, Feb. 2009, pp. 250-260. [24] C. C. Lin and N. L. Hsueh, “A lossless data hiding scheme based on three-pixel block differences,” Pattern Recognition, Vol. 41, No. 4, 2008, pp.1415-1425 [25] K. L. Chung, Y. H. Huang, W. N. Yang, Y. C. Hsu and C. H. Chen, “Capacity maximization for reversible data hiding based on dynamic programming approach,” Applied Mathematics and Computation, Vol. 208, No. 1, 2009, pp.284-292 | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34717 | - |
dc.description.abstract | 近年來,由於科技的快速發展與網際網路的普及使得多媒體資料的取得及下載變得十分方便;然而,科技的進步雖然增進了工作效率卻也使得盜版與不法使用變得更加容易。為此,保護智慧財產權這項議題變得相當重要,換句話說,資訊隱藏技術的研究與發展是不容忽視的重要趨勢。
資訊隱藏 (Information Hiding) 是一門古老的科學,其中包含了兩大議題﹕資料隱藏 (Data Hiding) 和浮水印 (Watermarking)。資料隱藏是將重要的資料嵌入於不受人注意的寄主媒介中,藉此分散敵人的注意力﹔然而,浮水印則是將產品資訊(例如商標)隱藏在數位化的產品中以達到著作權宣告的目的。 此論文中,我們將會敘述現有的兩個資料隱藏技術,分別是由Adnan M. Alattar 和 Vasiliy Sachnev 所提出。其中一個方法是針對Jun Tian 提出的差值擴張技術(difference expansion technique)的延伸,將三個像素當作一個單位進行資料嵌入,提供了我們將此技術應用到彩色影像的靈感。另一方法則是利用四周圍的像素關係先做一個預測後再加以藏入資料,其主要的特點為藉由調整參數達到省略隱藏資料的位置標記(location map),換言之,增加藏入的資料量(embedding capacity)。我們將針對這兩種演算法做一個比較並試圖加以改良,期許能得到更佳的表現與突破。同時,我們也希望這個新提出的方法不僅能適用於靜止的彩色影像亦能和現有的視訊技術做結合、擴大其應用層面。 | zh_TW |
dc.description.abstract | The booming of powerful sharing/transmission tools of digital media contents has created an urgent need to explore the algorithms of information hiding which is widely adopted in copyright protection, content authentication, and media asset management. Digital watermarking or data hiding is the process of embedding information into a digital medium such as an image, audio or video. However, for many data hiding scheme, there exist a drawback that the process usually introduces irreversible degradation of the original content. Although this degradation is slight, it may not acceptable in applications dictating high fidelity, e.g. military and medical uses, and hence, there is an essential for a reversible data embedding.
In this thesis, we would present a lossless data hiding algorithm for color images and videos based on Jun Tian’s difference expansion (DE) technique. Tian used a difference expansion transform of a pair of pixels to embed a large amount of data into gray scale images. In this work, we would apply the prediction errors to a cover media with the concept of difference expansion of triplets, which is a derivation of DE method. The performance of the proposed reversible data hiding scheme is evaluated by using different images and compared with two methods, proposed by Adnan M. Alattar and V. Sachnev et al. Further, we would like to employ this algorithm to the blocked-based DCT coefficients, that is to say, the video contents. We expected the results indicate that the proposed method allowed a high embedding capacity and less image degradation | en |
dc.description.provenance | Made available in DSpace on 2021-06-13T06:24:28Z (GMT). No. of bitstreams: 1 ntu-100-R98942097-1.pdf: 4312423 bytes, checksum: 7ad28afeb8a0cce0337285771a236655 (MD5) Previous issue date: 2011 | en |
dc.description.tableofcontents | 誌謝 i
中文摘要 ii ABSTRACT iii CONTENTS iv LIST OF FIGURES vii LIST OF TABLES ix Chapter 1 Introduction 1 Chapter 2 Related Works in Digital Data Hiding 5 2.1 Watermark Classification 5 2.2 LSB Replacement 7 2.3 Reversible Data Hiding 7 2.3.1 Reversible Data hiding Using a Difference Expansion 7 2.3.2 Reversible Data Hiding Using Histogram Modification 9 Chapter 3 Difference Expansion Based Algorithm 11 3.1 Reversible Watermarking Using Difference Expansion of Triplets 11 3.1.1 Introduction 11 3.1.2 Algorithm 16 3.1.3 Simulation Results 20 3.2 Reversible Watermarking Algorithm by Using Sorting and Prediction 31 3.2.1 Introduction 31 3.2.2 Algorithm 35 3.2.3 Simulation Results 38 Chapter 4 Digital Color Image Data Hiding 49 4.1 Improvement of DE of Cross-spectral Triplets with a Constant Prediction 49 4.1.1 Introduction 49 4.1.2 Algorithm 51 4.1.3 Simulation Results 54 4.2 Improvement of DE of Cross-spectral Triplets with an Adaptive Prediction from Adjacent Pixel Value 58 4.2.1 Introduction 58 4.2.2 Algorithm 60 4.2.3 Simulation Results 63 4.3 Improvement of DE of Cross-spectral Triplets with an Adaptive Prediction from a Rhombus Pattern 67 4.3.1 Introduction 67 4.3.2 Algorithm 69 4.3.3 Simulation Results 72 4.4 Discussion 76 Chapter 5 Digital Data Hiding in Video 79 5.1 Introduction 79 5.2 Proposed Method 81 5.2.1 Algorithm 81 5.2.2 Simulation Results 83 5.3 Application in Videos 85 5.3.1 Introduction 85 5.3.2 Simulation Results 87 Chapter 6 Conclusion and Future Work 91 REFERENCE 92 | |
dc.language.iso | en | |
dc.title | 數位彩色影像與視訊之資料隱藏技術 | zh_TW |
dc.title | Reversible Color Image and Video Data Hiding Using Difference Expansion Methods | en |
dc.type | Thesis | |
dc.date.schoolyear | 99-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 李枝宏(Ju-Hong Lee),曾建誠(Chien-Cheng Tseng),徐忠枝 | |
dc.subject.keyword | 可回復式資料隱藏技術,數位浮水印,差值擴張技術, | zh_TW |
dc.subject.keyword | Lossless data hiding,prediction error expansion,reversible watermarking, | en |
dc.relation.page | 94 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2011-07-25 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
顯示於系所單位: | 電信工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-100-1.pdf 目前未授權公開取用 | 4.21 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。