版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、利用編碼技術來隱藏秘密信息利用編碼技術來隱藏秘密信息Chair Professor Chin-Chen Chang (張真誠)n National Tsing Hua Universityn National Chung Cheng Universityn Feng Chia University .tw/ccc2IntroductionnInformation HidingCover imageHiding systemSecret messageStego image1 0 1 0 1 0 0 1 0 1 1 1 1 0 03Introducti
2、on (Cont.)nCover Carriers nImagenVideonSoundnText4Data: 1 1 0 1SenderReceiver1 1 1 1?. . . . . . . .Data: 1 0 1 0 1 0 11 0 1 0 1 1 1. . . . . . . .Corrected data:1 0 1 0 1 0 15(7, 4) Hamming CodingnEncodingData: 1 1 0 12p1 p2 d1 p3 d2 d3 d41 0 1 0 1 0 1d1 d2 d4 = p1 1 1 1 = 1d1 d3 d4 = p2 1 0 1 = 0d
3、2 d3 d4 = p3 1 0 1 = 0d1 d2 d3 d4Encoded dataEncodingp1 p2 d1 p3 d2 d3 d46(7, 4) Hamming Coding (Cont.)nError DetectionReceived data:1 0 1 0 1 1 1Error Position10100 0 0 1 1 11110 1 1 0 0 111601 0 1 0 1 010111Corrected data:1 0 1 0 1 0 1CorrectingParity check matrix HError bit(7, 4) Hamming Coding (
4、Cont.)The (7,4) Hamming code can be applied to data hiding based on the pixel domain and AMBTC domain. 7Matrix Coding Method8Example: 7,4 Hamming code, the parity check matrix H is :Embedding process: Cover vector Extraction process: Stego vector y = Change one bit in x according to coset leader ass
5、ociated to syndrome = Change one bit in x according to coset leader associated to = Change one bit in according to coset leader associated to = 0010100000111101100111010101H110m 1010100 x 110111001mHxSyndrome110mHy 100000000000100010000000010000010000100000001101010010000009Matrix Coding Method base
6、d on the pixel domain0001111011001110101010000101100001010000010010000011000000011000001000000110000001001000010111110963412911Cover ImageParity check matrix H(1010100)T = (1 1 1)TSecret data: 1 1 0 00 0 10000101000001010000010010000011000000011000001000000110000001001000010111010963412911Stego Imag
7、enEmbedding10Matrix Coding Method (Cont.) based on the pixel domain000111101100111010101(0010100)T = (1 1 0)TExtracted secret data: 1 1 0 00000101000001010000010010000011000000011000001000000110000001001000010111010963412911Stego ImagenExtracting 7 pixels embed 3 bitsMatrix Coding Method based on th
8、e AMBTC algorithmn 1124876496257249611812514456418297211114Matrix Coding Method based on the AMBTC algorithmnAMBTC algorithm (Absolute moment block truncation coding)1224876496257249611812514456418297211114100000011100001116064646464646416016016064646464160160Reconstructed block 0/1 bitmap Original
9、blockAverage=100High mean value = 160Low mean value = 64The flowchart of the proposed scheme embedding phase 13An example of the proposed scheme embedding phase 14An example of the proposed scheme embedding phase 15 Phase 1p Embed secret into the bitmapsAn example of the proposed scheme embedding ph
10、ase 16 Phase 2p Embed secret into (H, L)Final ResultAn example of the proposed scheme extraction phase 17 Phase 1p Extract secret from bitmapsAn example of the proposed scheme extraction phase 18 Phase 2p Extract secret from quantization pairsExperimental results19Test imagesExperimental resultsSche
11、meCriteriaLenaZeldaElainJetBoatGoldhillAverageAMBTCPSNR (dB)33.2336.7433.8333.2531.7632.8733.61Proposed schemePSNR (dB)28.9232.2529.4128.1429.17HC (bits)169,250168480172,479168,388170,103172,771170,245Chang et al.s scheme1PSNR (dB)30.7134.2631.2630.9931.0230.4931.45HC (bits)114,688114,688
12、114,688114,688114,688114,688114,688Chuang and Changs scheme2PSNR (dB)30.4533.9831.0730.5229.8430.5231.06HC (bits)13,05113,16913,24812,63711,98912,48612,763201 C.C. Chang, Y.J. Liu, and S.T. Nguyen, “Hiding Secret Information in Block Truncation Code Using Dynamic Programming Strategy,” In Proceeding
13、s of 6th International Graphic and Image Processing, vol. 9443, Beijing, China, 2014.2 J.C. Chuang and C.C. Chang, “Using a simple and fast image compression algorithm to hide secret information,” International Journal of Computers & Applications, vol. 28, no. 4, pp. 329-333, 2006.21ConclusionsnBased on the property of Hamming
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年度福州市城市空气质量监测服务合同2篇
- 2024年度物联网智能家居建设项目分包合同3篇
- 2024年度二手安防设备交易及维护合同2篇
- 2024年度福州二手住宅买卖合同条款
- 二零二四年度工程保险合同理赔程序3篇
- 2024年度建筑工程智能家居系统集成合同2篇
- 正规的方转账协议方转款协议范本
- 《太阳能吸附制冷》课件
- 2024年度软件开发项目特许经营权协议3篇
- 甲乙双方关于2024年度版权许可合同
- 人工草坪铺设合同协议书
- 七年级上册道德与法治《3.1认识自己 》说课稿(2022课标)
- DL∕T 5372-2017 水电水利工程金属结构与机电设备安装安全技术规程
- 2024-2030年中国先进过程控制(APC)行业市场发展趋势与前景展望战略分析报告
- 产品材质渲染智慧树知到期末考试答案章节答案2024年浙江旅游职业学院
- 2024年广西应急厅事业单位笔试真题
- 国家电网公司变电运维管理规定-第9分册-并联电容器组运维细则
- 2024-2030年酒店项目可行性研究报告
- 2024-2030年中国设计和建造责任险行业市场现状供需分析及市场深度研究发展前景及规划战略投资分析研究报告
- 教育部产学研项目申报书(3篇模板)
- 农贸市场卫生管理核心制度
评论
0/150
提交评论