Research on Reversible Data Hiding Techniques for BTC Compressed Images
碩士 === 靜宜大學 === 資訊管理學系 === 101 === The Internet has become a popular public communication channel to transmit digital media. However, digital media can be easily duplicated and tampered by illegal users and that is why integrity protect of the digital media becomes more and more important. In order...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/13273422517163566312 |
id |
ndltd-TW-101PU000396006 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101PU0003960062015-10-13T22:12:29Z http://ndltd.ncl.edu.tw/handle/13273422517163566312 Research on Reversible Data Hiding Techniques for BTC Compressed Images 適用於區塊截短碼的可回復式資訊隱藏技術之研究 Lu, Wanyu 盧琬瑜 碩士 靜宜大學 資訊管理學系 101 The Internet has become a popular public communication channel to transmit digital media. However, digital media can be easily duplicated and tampered by illegal users and that is why integrity protect of the digital media becomes more and more important. In order to solve this problem, the data hiding schemes that use digital medium as cover medium had been proposed. The secret data is then embedded into the cover medium to generate the stego-medium. The stego-medium is imperceptibility and it can avoid the assaulter notice and prevent attack. The data hiding schemes can be divided into two main categories: irreversible data hiding schemes and the reversible data hiding schemes. Reversible data hiding schemes have the characteristic of recovery to original media after the secret data was extracted. In this thesis, we proposed two reversible data hiding schemes for the compressed images of the block truncation coding (BTC) scheme. In the first scheme, the secret data is embedded into the compressed codes of BTC. Two data sets are generated to embed the secret data by using the histogram shifting technique. In the second scheme, the linear prediction technique is employed to process the data sets that will be used to embed the secret data. In other words, the secret data is embedded into the prediction error by using the histogram shifting technique. The experimental results demonstrate that the proposed schemes achieve good hiding capacity and acceptable visual quality of the stego images without data expansion. The embedded results of the proposed schemes still keep in the standard form of BTC compressed codes. Hu, Yuchen 胡育誠 2013 學位論文 ; thesis 62 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 靜宜大學 === 資訊管理學系 === 101 === The Internet has become a popular public communication channel to transmit digital media. However, digital media can be easily duplicated and tampered by illegal users and that is why integrity protect of the digital media becomes more and more important. In order to solve this problem, the data hiding schemes that use digital medium as cover medium had been proposed. The secret data is then embedded into the cover medium to generate the stego-medium. The stego-medium is imperceptibility and it can avoid the assaulter notice and prevent attack. The data hiding schemes can be divided into two main categories: irreversible data hiding schemes and the reversible data hiding schemes. Reversible data hiding schemes have the characteristic of recovery to original media after the secret data was extracted.
In this thesis, we proposed two reversible data hiding schemes for the compressed images of the block truncation coding (BTC) scheme. In the first scheme, the secret data is embedded into the compressed codes of BTC. Two data sets are generated to embed the secret data by using the histogram shifting technique. In the second scheme, the linear prediction technique is employed to process the data sets that will be used to embed the secret data. In other words, the secret data is embedded into the prediction error by using the histogram shifting technique. The experimental results demonstrate that the proposed schemes achieve good hiding capacity and acceptable visual quality of the stego images without data expansion. The embedded results of the proposed schemes still keep in the standard form of BTC compressed codes.
|
author2 |
Hu, Yuchen |
author_facet |
Hu, Yuchen Lu, Wanyu 盧琬瑜 |
author |
Lu, Wanyu 盧琬瑜 |
spellingShingle |
Lu, Wanyu 盧琬瑜 Research on Reversible Data Hiding Techniques for BTC Compressed Images |
author_sort |
Lu, Wanyu |
title |
Research on Reversible Data Hiding Techniques for BTC Compressed Images |
title_short |
Research on Reversible Data Hiding Techniques for BTC Compressed Images |
title_full |
Research on Reversible Data Hiding Techniques for BTC Compressed Images |
title_fullStr |
Research on Reversible Data Hiding Techniques for BTC Compressed Images |
title_full_unstemmed |
Research on Reversible Data Hiding Techniques for BTC Compressed Images |
title_sort |
research on reversible data hiding techniques for btc compressed images |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/13273422517163566312 |
work_keys_str_mv |
AT luwanyu researchonreversibledatahidingtechniquesforbtccompressedimages AT lúwǎnyú researchonreversibledatahidingtechniquesforbtccompressedimages AT luwanyu shìyòngyúqūkuàijiéduǎnmǎdekěhuífùshìzīxùnyǐncángjìshùzhīyánjiū AT lúwǎnyú shìyòngyúqūkuàijiéduǎnmǎdekěhuífùshìzīxùnyǐncángjìshùzhīyánjiū |
_version_ |
1718074277964546048 |