Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion
碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 97 === As the technology advances, people can easily exchange messages via the Internet, but it also brings security worries. In order to protect the information will not be illegal person stealed, scholars proposed the information hiding technique to embed secret mess...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/87120727269901118468 |
id |
ndltd-TW-097CYUT5396016 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097CYUT53960162015-10-13T12:05:42Z http://ndltd.ncl.edu.tw/handle/87120727269901118468 Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion 有效利用整數小波轉換及區間間隔之資訊隱藏技術 Pei-Lun Chen 陳培倫 碩士 朝陽科技大學 資訊管理系碩士班 97 As the technology advances, people can easily exchange messages via the Internet, but it also brings security worries. In order to protect the information will not be illegal person stealed, scholars proposed the information hiding technique to embed secret messages into pictures, images, audios, and other multimedia to generate stego media for the protection of private information. This paper proposes an information hiding method that exploits the Integer Wavelet Transform and Replace Function. First of all, the cover image is transformed into frequency coefficients through the Integer Wavelet Transform. Then, Run-Length Encoding is used to compress the secret message. Furthermore, the compression result is embedded into the frequency coefficients by using the Modulus Function and Least Significant Bit Matching in order to obtain the stego image. When the receiver receives the stego image, the compression result can be extracted from the frequency coefficients from the stego image by using the Modulus Function and Binary Function. The original secret message can then be retrieved by exploiting the Run-Length Decoding. Both the embedding and extracting processes are very efficient, yet, the embedding capacity of the secret message and the quality of the stego image may reach a certain standard. The above information hiding techniques can effectively achieve the effects of bullying enemy. However, the technology would destroy the cover image. In addition, the cover image can not be reversed completely. For some special areas, such as medical, military and the technique is unsuitable. In order to solve this problem, this paper proposes an efficient reversible hiding scheme based on interval expansion. The proposed scheme expands the interval between pixels to III embed information in the cover image. The receiver can extract the concealed message and restore the original image from the stego image. Tzu-Chuen Lu 呂慈純 2009 學位論文 ; thesis 39 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 97 === As the technology advances, people can easily exchange messages via the Internet, but it also brings security worries. In order to protect the information will not be illegal person stealed, scholars proposed the information hiding technique to embed secret messages into pictures, images, audios, and other multimedia to generate stego media for the protection of private information.
This paper proposes an information hiding method that exploits the Integer Wavelet Transform and Replace Function. First of all, the cover image is transformed into frequency coefficients through the Integer Wavelet Transform. Then, Run-Length Encoding is used to compress the secret message. Furthermore, the compression result is embedded into the frequency coefficients by using the Modulus Function and Least Significant Bit Matching in order to obtain the stego image. When the receiver receives the stego image, the compression result can be extracted from the frequency coefficients from the stego image by using the Modulus Function and Binary Function. The original secret message can then be retrieved by exploiting the Run-Length Decoding. Both the embedding and extracting processes are very efficient, yet, the embedding capacity of the secret message and the quality of the stego image may reach a certain standard.
The above information hiding techniques can effectively achieve the effects of bullying enemy. However, the technology would destroy the cover image. In addition, the cover image can not be reversed completely. For some special areas, such as medical, military and the technique is unsuitable. In order to solve this problem, this paper proposes an efficient reversible hiding scheme based on interval expansion. The proposed scheme expands the interval between pixels to
III
embed information in the cover image. The receiver can extract the concealed message and restore the original image from the stego image.
|
author2 |
Tzu-Chuen Lu |
author_facet |
Tzu-Chuen Lu Pei-Lun Chen 陳培倫 |
author |
Pei-Lun Chen 陳培倫 |
spellingShingle |
Pei-Lun Chen 陳培倫 Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion |
author_sort |
Pei-Lun Chen |
title |
Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion |
title_short |
Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion |
title_full |
Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion |
title_fullStr |
Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion |
title_full_unstemmed |
Efficient Information Hiding Techniques based on Integer Wavelet Transform and Interval Expansion |
title_sort |
efficient information hiding techniques based on integer wavelet transform and interval expansion |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/87120727269901118468 |
work_keys_str_mv |
AT peilunchen efficientinformationhidingtechniquesbasedonintegerwavelettransformandintervalexpansion AT chénpéilún efficientinformationhidingtechniquesbasedonintegerwavelettransformandintervalexpansion AT peilunchen yǒuxiàolìyòngzhěngshùxiǎobōzhuǎnhuànjíqūjiānjiāngézhīzīxùnyǐncángjìshù AT chénpéilún yǒuxiàolìyòngzhěngshùxiǎobōzhuǎnhuànjíqūjiānjiāngézhīzīxùnyǐncángjìshù |
_version_ |
1716853091943317504 |