A Study of Dynamic Reversible and Optimal Data Hiding Algorithms

碩士 === 國立中興大學 === 資訊科學與工程學系 === 103 === Abstract This thesis proposes three data hiding algorithm; namely, reversible data hiding using dynamic adjustable histogram shifting algorithm (DAHS); a data hiding algorithm with the optimal capacity based on exploiting modification direction (OPEMD); a univ...

Full description

Bibliographic Details
Main Authors: Yu-Jung Chang, 張育榮
Other Authors: 王宗銘
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/k9hk47
id ndltd-TW-103NCHU5394086
record_format oai_dc
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中興大學 === 資訊科學與工程學系 === 103 === Abstract This thesis proposes three data hiding algorithm; namely, reversible data hiding using dynamic adjustable histogram shifting algorithm (DAHS); a data hiding algorithm with the optimal capacity based on exploiting modification direction (OPEMD); a universal exploiting modification direction algorithm (UNIEMD)。 The first algorithm we present is DAHS algorithm, which achieves reversibility using a histogram-shifting approach. The message embedding in our algorithm can be divided into three stages. In the first phase, according to parameters input by the user, an embedding location is selected as the ratio of 75-85% of histogram peak to decrease image distortion caused by the hidden message. The second phase selects the ratio of 65-75% of histogram peak as the embedding point to continue the multi-level reversible message embedding. This aims to increase the capacity by allowing more levels of reversible message embedding. The third phase deals with the overflow or underflow problem. In particular, we reselect the opposite direction of the zero point in the histogram and conceal secret messages using the original parameters given by users to further increase the capacity. Experimental results show that our two-stage approach can effectively reduce the distortion of the image and increase the embedding capacity. In comparison with our competitors, our DAHS algorithm provides more embedding levels, thus increasing the total embedding capacity. Our proposed algorithm offers considerable flexibility, allowing the user to reassign new parameters until a desirable capacity is produced. We propose the second algorithm, OPEMD, which is an extension of the conventional EMD algorithm. Our algorithm inputs a single parameter, n, representing how many pixels are combined together to conceal a secret digit in the (2n+1)-ary notational system. We develop a universal encoding technique which uses large number operations to effectively convert secret bits into (2n+1)-ary digits. In our implementation, we employ relevant operation functions provided in the GNU multiple precision arithmetic library (GMP). Our OPEMD algorithm offers three advantages. First, our message conversion is so effective that the maximal bit loss due to conversion is less than one bit, achieving nearly optimal capacity. Our algorithm requires a single parameter, thus d to establish database to get optimal capacity. Finally, the utilization the universal encoding scheme avoids the bias of message conversion so the produced digits are more uniformly distributed, significantly reducing the risk of steganalytic attack from visualizing histogram of a stego image. We recommend the third algorithm, a universal exploiting modification direction algorithm (UNIEMD). Given a parameter n, we group n pixels into a number of sub-groups automatically to maximize the embedding capacity. Once the number of pixels in each sub-group is determined, we apply our OPEMD algorithm to embed secret messages providing the maximal and optimal embedding capacity. Our UNIEMD algorithm provides two benefits. First, our algorithm offers the optimal and maximal data hiding at the same time, increasing the embedding capacity substantially. Second, the pixel grouping is conducted automatically which not only maximizes the capacity but also increases the difficulty for eavesdroppers to unveil information for possible steganalytic attack. In conclusion, we introduce three data hiding algorithms. The first algorithm provides higher embedding capacity than our counterparts. The second algorithm provides nearly optimal capacity, thanks to the universal encoding scheme we recommend. Finally, given a single parameter, the third algorithm automatically group pixels thus, offering both optimal and high embedding capacity. Our algorithms are feasible to data hiding applications.
author2 王宗銘
author_facet 王宗銘
Yu-Jung Chang
張育榮
author Yu-Jung Chang
張育榮
spellingShingle Yu-Jung Chang
張育榮
A Study of Dynamic Reversible and Optimal Data Hiding Algorithms
author_sort Yu-Jung Chang
title A Study of Dynamic Reversible and Optimal Data Hiding Algorithms
title_short A Study of Dynamic Reversible and Optimal Data Hiding Algorithms
title_full A Study of Dynamic Reversible and Optimal Data Hiding Algorithms
title_fullStr A Study of Dynamic Reversible and Optimal Data Hiding Algorithms
title_full_unstemmed A Study of Dynamic Reversible and Optimal Data Hiding Algorithms
title_sort study of dynamic reversible and optimal data hiding algorithms
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/k9hk47
work_keys_str_mv AT yujungchang astudyofdynamicreversibleandoptimaldatahidingalgorithms
AT zhāngyùróng astudyofdynamicreversibleandoptimaldatahidingalgorithms
AT yujungchang dòngtàikěhuífùshìyǔzuìjiāhuàzīxùnyǐncángyǎnsuànfǎzhīyánjiū
AT zhāngyùróng dòngtàikěhuífùshìyǔzuìjiāhuàzīxùnyǐncángyǎnsuànfǎzhīyánjiū
AT yujungchang studyofdynamicreversibleandoptimaldatahidingalgorithms
AT zhāngyùróng studyofdynamicreversibleandoptimaldatahidingalgorithms
_version_ 1719129436138242048
spelling ndltd-TW-103NCHU53940862019-05-15T22:25:05Z http://ndltd.ncl.edu.tw/handle/k9hk47 A Study of Dynamic Reversible and Optimal Data Hiding Algorithms 動態可回復式與最佳化資訊隱藏演算法之研究 Yu-Jung Chang 張育榮 碩士 國立中興大學 資訊科學與工程學系 103 Abstract This thesis proposes three data hiding algorithm; namely, reversible data hiding using dynamic adjustable histogram shifting algorithm (DAHS); a data hiding algorithm with the optimal capacity based on exploiting modification direction (OPEMD); a universal exploiting modification direction algorithm (UNIEMD)。 The first algorithm we present is DAHS algorithm, which achieves reversibility using a histogram-shifting approach. The message embedding in our algorithm can be divided into three stages. In the first phase, according to parameters input by the user, an embedding location is selected as the ratio of 75-85% of histogram peak to decrease image distortion caused by the hidden message. The second phase selects the ratio of 65-75% of histogram peak as the embedding point to continue the multi-level reversible message embedding. This aims to increase the capacity by allowing more levels of reversible message embedding. The third phase deals with the overflow or underflow problem. In particular, we reselect the opposite direction of the zero point in the histogram and conceal secret messages using the original parameters given by users to further increase the capacity. Experimental results show that our two-stage approach can effectively reduce the distortion of the image and increase the embedding capacity. In comparison with our competitors, our DAHS algorithm provides more embedding levels, thus increasing the total embedding capacity. Our proposed algorithm offers considerable flexibility, allowing the user to reassign new parameters until a desirable capacity is produced. We propose the second algorithm, OPEMD, which is an extension of the conventional EMD algorithm. Our algorithm inputs a single parameter, n, representing how many pixels are combined together to conceal a secret digit in the (2n+1)-ary notational system. We develop a universal encoding technique which uses large number operations to effectively convert secret bits into (2n+1)-ary digits. In our implementation, we employ relevant operation functions provided in the GNU multiple precision arithmetic library (GMP). Our OPEMD algorithm offers three advantages. First, our message conversion is so effective that the maximal bit loss due to conversion is less than one bit, achieving nearly optimal capacity. Our algorithm requires a single parameter, thus d to establish database to get optimal capacity. Finally, the utilization the universal encoding scheme avoids the bias of message conversion so the produced digits are more uniformly distributed, significantly reducing the risk of steganalytic attack from visualizing histogram of a stego image. We recommend the third algorithm, a universal exploiting modification direction algorithm (UNIEMD). Given a parameter n, we group n pixels into a number of sub-groups automatically to maximize the embedding capacity. Once the number of pixels in each sub-group is determined, we apply our OPEMD algorithm to embed secret messages providing the maximal and optimal embedding capacity. Our UNIEMD algorithm provides two benefits. First, our algorithm offers the optimal and maximal data hiding at the same time, increasing the embedding capacity substantially. Second, the pixel grouping is conducted automatically which not only maximizes the capacity but also increases the difficulty for eavesdroppers to unveil information for possible steganalytic attack. In conclusion, we introduce three data hiding algorithms. The first algorithm provides higher embedding capacity than our counterparts. The second algorithm provides nearly optimal capacity, thanks to the universal encoding scheme we recommend. Finally, given a single parameter, the third algorithm automatically group pixels thus, offering both optimal and high embedding capacity. Our algorithms are feasible to data hiding applications. 王宗銘 2015 學位論文 ; thesis 97 zh-TW