Research on Reversible Data Hiding Techniques for BTC Compressed Images

碩士 === 靜宜大學 === 資訊管理學系 === 101 === The Internet has become a popular public communication channel to transmit digital media. However, digital media can be easily duplicated and tampered by illegal users and that is why integrity protect of the digital media becomes more and more important. In order...

Full description

Bibliographic Details
Main Authors: Lu, Wanyu, 盧琬瑜
Other Authors: Hu, Yuchen
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/13273422517163566312
id ndltd-TW-101PU000396006
record_format oai_dc
spelling ndltd-TW-101PU0003960062015-10-13T22:12:29Z http://ndltd.ncl.edu.tw/handle/13273422517163566312 Research on Reversible Data Hiding Techniques for BTC Compressed Images 適用於區塊截短碼的可回復式資訊隱藏技術之研究 Lu, Wanyu 盧琬瑜 碩士 靜宜大學 資訊管理學系 101 The Internet has become a popular public communication channel to transmit digital media. However, digital media can be easily duplicated and tampered by illegal users and that is why integrity protect of the digital media becomes more and more important. In order to solve this problem, the data hiding schemes that use digital medium as cover medium had been proposed. The secret data is then embedded into the cover medium to generate the stego-medium. The stego-medium is imperceptibility and it can avoid the assaulter notice and prevent attack. The data hiding schemes can be divided into two main categories: irreversible data hiding schemes and the reversible data hiding schemes. Reversible data hiding schemes have the characteristic of recovery to original media after the secret data was extracted. In this thesis, we proposed two reversible data hiding schemes for the compressed images of the block truncation coding (BTC) scheme. In the first scheme, the secret data is embedded into the compressed codes of BTC. Two data sets are generated to embed the secret data by using the histogram shifting technique. In the second scheme, the linear prediction technique is employed to process the data sets that will be used to embed the secret data. In other words, the secret data is embedded into the prediction error by using the histogram shifting technique. The experimental results demonstrate that the proposed schemes achieve good hiding capacity and acceptable visual quality of the stego images without data expansion. The embedded results of the proposed schemes still keep in the standard form of BTC compressed codes. Hu, Yuchen 胡育誠 2013 學位論文 ; thesis 62 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 靜宜大學 === 資訊管理學系 === 101 === The Internet has become a popular public communication channel to transmit digital media. However, digital media can be easily duplicated and tampered by illegal users and that is why integrity protect of the digital media becomes more and more important. In order to solve this problem, the data hiding schemes that use digital medium as cover medium had been proposed. The secret data is then embedded into the cover medium to generate the stego-medium. The stego-medium is imperceptibility and it can avoid the assaulter notice and prevent attack. The data hiding schemes can be divided into two main categories: irreversible data hiding schemes and the reversible data hiding schemes. Reversible data hiding schemes have the characteristic of recovery to original media after the secret data was extracted. In this thesis, we proposed two reversible data hiding schemes for the compressed images of the block truncation coding (BTC) scheme. In the first scheme, the secret data is embedded into the compressed codes of BTC. Two data sets are generated to embed the secret data by using the histogram shifting technique. In the second scheme, the linear prediction technique is employed to process the data sets that will be used to embed the secret data. In other words, the secret data is embedded into the prediction error by using the histogram shifting technique. The experimental results demonstrate that the proposed schemes achieve good hiding capacity and acceptable visual quality of the stego images without data expansion. The embedded results of the proposed schemes still keep in the standard form of BTC compressed codes.
author2 Hu, Yuchen
author_facet Hu, Yuchen
Lu, Wanyu
盧琬瑜
author Lu, Wanyu
盧琬瑜
spellingShingle Lu, Wanyu
盧琬瑜
Research on Reversible Data Hiding Techniques for BTC Compressed Images
author_sort Lu, Wanyu
title Research on Reversible Data Hiding Techniques for BTC Compressed Images
title_short Research on Reversible Data Hiding Techniques for BTC Compressed Images
title_full Research on Reversible Data Hiding Techniques for BTC Compressed Images
title_fullStr Research on Reversible Data Hiding Techniques for BTC Compressed Images
title_full_unstemmed Research on Reversible Data Hiding Techniques for BTC Compressed Images
title_sort research on reversible data hiding techniques for btc compressed images
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/13273422517163566312
work_keys_str_mv AT luwanyu researchonreversibledatahidingtechniquesforbtccompressedimages
AT lúwǎnyú researchonreversibledatahidingtechniquesforbtccompressedimages
AT luwanyu shìyòngyúqūkuàijiéduǎnmǎdekěhuífùshìzīxùnyǐncángjìshùzhīyánjiū
AT lúwǎnyú shìyòngyúqūkuàijiéduǎnmǎdekěhuífùshìzīxùnyǐncángjìshùzhīyánjiū
_version_ 1718074277964546048