




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、利用編碼技術來隱藏秘密信息利用編碼技術來隱藏秘密信息Chair Professor Chin-Chen Chang (張真誠)n National Tsing Hua Universityn National Chung Cheng Universityn Feng Chia University .tw/ccc2IntroductionnInformation HidingCover imageHiding systemSecret messageStego image1 0 1 0 1 0 0 1 0 1 1 1 1 0 03Introducti
2、on (Cont.)nCover Carriers nImagenVideonSoundnText4Data: 1 1 0 1SenderReceiver1 1 1 1?. . . . . . . .Data: 1 0 1 0 1 0 11 0 1 0 1 1 1. . . . . . . .Corrected data:1 0 1 0 1 0 15(7, 4) Hamming CodingnEncodingData: 1 1 0 12p1 p2 d1 p3 d2 d3 d41 0 1 0 1 0 1d1 d2 d4 = p1 1 1 1 = 1d1 d3 d4 = p2 1 0 1 = 0d
3、2 d3 d4 = p3 1 0 1 = 0d1 d2 d3 d4Encoded dataEncodingp1 p2 d1 p3 d2 d3 d46(7, 4) Hamming Coding (Cont.)nError DetectionReceived data:1 0 1 0 1 1 1Error Position10100 0 0 1 1 11110 1 1 0 0 111601 0 1 0 1 010111Corrected data:1 0 1 0 1 0 1CorrectingParity check matrix HError bit(7, 4) Hamming Coding (
4、Cont.)The (7,4) Hamming code can be applied to data hiding based on the pixel domain and AMBTC domain. 7Matrix Coding Method8Example: 7,4 Hamming code, the parity check matrix H is :Embedding process: Cover vector Extraction process: Stego vector y = Change one bit in x according to coset leader ass
5、ociated to syndrome = Change one bit in x according to coset leader associated to = Change one bit in according to coset leader associated to = 0010100000111101100111010101H110m 1010100 x 110111001mHxSyndrome110mHy 100000000000100010000000010000010000100000001101010010000009Matrix Coding Method base
6、d on the pixel domain0001111011001110101010000101100001010000010010000011000000011000001000000110000001001000010111110963412911Cover ImageParity check matrix H(1010100)T = (1 1 1)TSecret data: 1 1 0 00 0 10000101000001010000010010000011000000011000001000000110000001001000010111010963412911Stego Imag
7、enEmbedding10Matrix Coding Method (Cont.) based on the pixel domain000111101100111010101(0010100)T = (1 1 0)TExtracted secret data: 1 1 0 00000101000001010000010010000011000000011000001000000110000001001000010111010963412911Stego ImagenExtracting 7 pixels embed 3 bitsMatrix Coding Method based on th
8、e AMBTC algorithmn 1124876496257249611812514456418297211114Matrix Coding Method based on the AMBTC algorithmnAMBTC algorithm (Absolute moment block truncation coding)1224876496257249611812514456418297211114100000011100001116064646464646416016016064646464160160Reconstructed block 0/1 bitmap Original
9、blockAverage=100High mean value = 160Low mean value = 64The flowchart of the proposed scheme embedding phase 13An example of the proposed scheme embedding phase 14An example of the proposed scheme embedding phase 15 Phase 1p Embed secret into the bitmapsAn example of the proposed scheme embedding ph
10、ase 16 Phase 2p Embed secret into (H, L)Final ResultAn example of the proposed scheme extraction phase 17 Phase 1p Extract secret from bitmapsAn example of the proposed scheme extraction phase 18 Phase 2p Extract secret from quantization pairsExperimental results19Test imagesExperimental resultsSche
11、meCriteriaLenaZeldaElainJetBoatGoldhillAverageAMBTCPSNR (dB)33.2336.7433.8333.2531.7632.8733.61Proposed schemePSNR (dB)28.9232.2529.4128.1429.17HC (bits)169,250168480172,479168,388170,103172,771170,245Chang et al.s scheme1PSNR (dB)30.7134.2631.2630.9931.0230.4931.45HC (bits)114,688114,688
12、114,688114,688114,688114,688114,688Chuang and Changs scheme2PSNR (dB)30.4533.9831.0730.5229.8430.5231.06HC (bits)13,05113,16913,24812,63711,98912,48612,763201 C.C. Chang, Y.J. Liu, and S.T. Nguyen, “Hiding Secret Information in Block Truncation Code Using Dynamic Programming Strategy,” In Proceeding
13、s of 6th International Graphic and Image Processing, vol. 9443, Beijing, China, 2014.2 J.C. Chuang and C.C. Chang, “Using a simple and fast image compression algorithm to hide secret information,” International Journal of Computers & Applications, vol. 28, no. 4, pp. 329-333, 2006.21ConclusionsnBased on the property of Hamming
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年劳动合同续签审批表
- 2025标准合同样本:广告制作合同示范文本
- 2025实习生合同协议书(带封面模板)
- 2025年城市供水特许经营合同协议及注意事项(合同协议范本)
- 2025年辽宁省营口市中考二模语文试题
- 我眼中的计算机-计算机开机背后的故事
- 2025年助理物流师试题
- 2025年班主任德育工作个人总结模版
- 幼儿园趣味互动课件
- 2024年及2025年一季度上市银行业绩解读:非息短期扰动业绩基本面向好趋势不变213mb
- 公安机关业务技术用房建设标准正文
- GB/T 29076-2021航天产品质量问题归零实施要求
- GB/T 18656-2002工业系统、装置与设备以及工业产品系统内端子的标识
- GB 29449-2012轮胎单位产品能源消耗限额
- 人教版地理七年级下册《巴西》课件
- 医院住院病人健康教育表
- 实习证明模板下载版新版
- IVD医疗器械的机器视觉视觉读码器机器视觉图形图像识别诊断图像判别 解决方案
- 医院二级库管理制度(大全)
- 关键工序清单(土建专业)
- 华为内部控制PPT培训课件
评论
0/150
提交评论