Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion

碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 97 === As the technology advances, people can easily exchange messages via the Internet, but it also brings security worries. In order to protect the information will not be illegal person stealed, scholars proposed the information hiding technique to embed secret mess...

Full description

Bibliographic Details
Main Authors: Pei-Lun Chen, 陳培倫
Other Authors: Tzu-Chuen Lu
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/87120727269901118468
id ndltd-TW-097CYUT5396016
record_format oai_dc
spelling ndltd-TW-097CYUT53960162015-10-13T12:05:42Z http://ndltd.ncl.edu.tw/handle/87120727269901118468 Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion 有效利用整數小波轉換及區間間隔之資訊隱藏技術 Pei-Lun Chen 陳培倫 碩士 朝陽科技大學 資訊管理系碩士班 97 As the technology advances, people can easily exchange messages via the Internet, but it also brings security worries. In order to protect the information will not be illegal person stealed, scholars proposed the information hiding technique to embed secret messages into pictures, images, audios, and other multimedia to generate stego media for the protection of private information. This paper proposes an information hiding method that exploits the Integer Wavelet Transform and Replace Function. First of all, the cover image is transformed into frequency coefficients through the Integer Wavelet Transform. Then, Run-Length Encoding is used to compress the secret message. Furthermore, the compression result is embedded into the frequency coefficients by using the Modulus Function and Least Significant Bit Matching in order to obtain the stego image. When the receiver receives the stego image, the compression result can be extracted from the frequency coefficients from the stego image by using the Modulus Function and Binary Function. The original secret message can then be retrieved by exploiting the Run-Length Decoding. Both the embedding and extracting processes are very efficient, yet, the embedding capacity of the secret message and the quality of the stego image may reach a certain standard. The above information hiding techniques can effectively achieve the effects of bullying enemy. However, the technology would destroy the cover image. In addition, the cover image can not be reversed completely. For some special areas, such as medical, military and the technique is unsuitable. In order to solve this problem, this paper proposes an efficient reversible hiding scheme based on interval expansion. The proposed scheme expands the interval between pixels to III embed information in the cover image. The receiver can extract the concealed message and restore the original image from the stego image. Tzu-Chuen Lu 呂慈純 2009 學位論文 ; thesis 39 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 97 === As the technology advances, people can easily exchange messages via the Internet, but it also brings security worries. In order to protect the information will not be illegal person stealed, scholars proposed the information hiding technique to embed secret messages into pictures, images, audios, and other multimedia to generate stego media for the protection of private information. This paper proposes an information hiding method that exploits the Integer Wavelet Transform and Replace Function. First of all, the cover image is transformed into frequency coefficients through the Integer Wavelet Transform. Then, Run-Length Encoding is used to compress the secret message. Furthermore, the compression result is embedded into the frequency coefficients by using the Modulus Function and Least Significant Bit Matching in order to obtain the stego image. When the receiver receives the stego image, the compression result can be extracted from the frequency coefficients from the stego image by using the Modulus Function and Binary Function. The original secret message can then be retrieved by exploiting the Run-Length Decoding. Both the embedding and extracting processes are very efficient, yet, the embedding capacity of the secret message and the quality of the stego image may reach a certain standard. The above information hiding techniques can effectively achieve the effects of bullying enemy. However, the technology would destroy the cover image. In addition, the cover image can not be reversed completely. For some special areas, such as medical, military and the technique is unsuitable. In order to solve this problem, this paper proposes an efficient reversible hiding scheme based on interval expansion. The proposed scheme expands the interval between pixels to III embed information in the cover image. The receiver can extract the concealed message and restore the original image from the stego image.
author2 Tzu-Chuen Lu
author_facet Tzu-Chuen Lu
Pei-Lun Chen
陳培倫
author Pei-Lun Chen
陳培倫
spellingShingle Pei-Lun Chen
陳培倫
Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion
author_sort Pei-Lun Chen
title Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion
title_short Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion
title_full Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion
title_fullStr Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion
title_full_unstemmed Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion
title_sort efficient information hiding techniques based on integer wavelet transform and interval expansion
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/87120727269901118468
work_keys_str_mv AT peilunchen efficientinformationhidingtechniquesbasedonintegerwavelettransformandintervalexpansion
AT chénpéilún efficientinformationhidingtechniquesbasedonintegerwavelettransformandintervalexpansion
AT peilunchen yǒuxiàolìyòngzhěngshùxiǎobōzhuǎnhuànjíqūjiānjiāngézhīzīxùnyǐncángjìshù
AT chénpéilún yǒuxiàolìyòngzhěngshùxiǎobōzhuǎnhuànjíqūjiānjiāngézhīzīxùnyǐncángjìshù
_version_ 1716853091943317504