語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Novel image data-hiding methodologie...
~
Sarkar, Anindya.
Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics.
作者:
Sarkar, Anindya.
面頁冊數:
409 p.
附註:
Source: Dissertation Abstracts International, Volume: 71-05, Section: B, page: 3260.
附註:
Adviser: Bangalore S. Manjunath.
Contained By:
Dissertation Abstracts International71-05B.
標題:
Engineering, Electronics and Electrical.
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3398809
ISBN:
9781109726930
Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics.
Sarkar, Anindya.
Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics.
- 409 p.
Source: Dissertation Abstracts International, Volume: 71-05, Section: B, page: 3260.
Thesis (Ph.D.)--University of California, Santa Barbara, 2010.
In the modern age, the proliferation of digital multimedia content has led to it being used as a medium of secure communication. The art of secret communication using a covert medium like images is called steganography while the competing technique of detecting the presence of embedded data in media through statistically learnt features is called steganalysis. How can the communication be kept secure while transmitting images with hidden content? For that, the hiding should not introduce perceptual distortions and also be robust against steganalysis. The emphasis of current research has been focused more towards detection than developing novel hiding methods. Hence, the steganalysis performance of state-of-the-art detectors is near-perfect against current steganographic schemes. Our emphasis in this dissertation has been on developing novel, robust and secure hiding schemes that can resist steganalytic detection. The impact has been two-fold. Hiding schemes are characterized by three complementary requirements - security against steganalysis, robustness against distortions in the transmission channel, and capacity in terms of the embedded payload. Firstly, we show that our proposed schemes achieve significant improvements with respect to the above trade-offs. Secondly, since improvements in one field always fuels research in its complementary field, there has been a host of detection methods designed specifically in response to our proposed hiding methods.
ISBN: 9781109726930Subjects--Topical Terms:
226981
Engineering, Electronics and Electrical.
Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics.
LDR
:04709nmm 2200361 4500
001
280813
005
20110119095000.5
008
110301s2010 ||||||||||||||||| ||eng d
020
$a
9781109726930
035
$a
(UMI)AAI3398809
035
$a
AAI3398809
040
$a
UMI
$c
UMI
100
1
$a
Sarkar, Anindya.
$3
492940
245
1 0
$a
Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics.
300
$a
409 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-05, Section: B, page: 3260.
500
$a
Adviser: Bangalore S. Manjunath.
502
$a
Thesis (Ph.D.)--University of California, Santa Barbara, 2010.
520
$a
In the modern age, the proliferation of digital multimedia content has led to it being used as a medium of secure communication. The art of secret communication using a covert medium like images is called steganography while the competing technique of detecting the presence of embedded data in media through statistically learnt features is called steganalysis. How can the communication be kept secure while transmitting images with hidden content? For that, the hiding should not introduce perceptual distortions and also be robust against steganalysis. The emphasis of current research has been focused more towards detection than developing novel hiding methods. Hence, the steganalysis performance of state-of-the-art detectors is near-perfect against current steganographic schemes. Our emphasis in this dissertation has been on developing novel, robust and secure hiding schemes that can resist steganalytic detection. The impact has been two-fold. Hiding schemes are characterized by three complementary requirements - security against steganalysis, robustness against distortions in the transmission channel, and capacity in terms of the embedded payload. Firstly, we show that our proposed schemes achieve significant improvements with respect to the above trade-offs. Secondly, since improvements in one field always fuels research in its complementary field, there has been a host of detection methods designed specifically in response to our proposed hiding methods.
520
$a
We have contributed towards improving the steganalysis performance and also estimating the hiding capacities of the previously proposed statistical restoration (SR) methods. Since SR was mainly secure against histogram-based features, we have proposed a randomized block-based hiding scheme, tailored for JPEG-based steganalysis. Most detection schemes for JPEG images exploit the fact that hiding works in 8x8 blocks and significant statistical changes can be observed for block-based steganalysis. Our solution of hiding in randomized block locations desynchronizes the steganalyst and results in very low detection rates. We further improve the steganographic security by using matrix embedding and showing how it can be used along with suitable error correction coding schemes - matrix embedding was previously used only for passive (noise-free channels) steganography.
520
$a
For the secure steganographic methods, we have considered global image attacks and hence, the synchronization between the hiding coefficients is unaffected. However, practical attacks can also include cropping and geometric transformation based attacks. We propose a key-point based hiding method for data recovery after such attacks. The crux of the proposed method is a geometric transformation estimation algorithm which ensures that the received image can be properly aligned to the original, even after severe compression.
520
$a
We have also worked on extending the domain of applicability of the steganalysis features. It has been observed that apart from detecting images with hidden content, steganalysis features can also be used for distinguishing real images from tampered ones. This comes under the purview of image forensics where like steganalysis, we also solve a two-class (real and tampered images) classification problem. We propose robust re-sampling detection methods (re-sampling is commonly present in tampered images) and also show how seam carving can be used for image tampering and object removal.
590
$a
School code: 0035.
650
4
$a
Engineering, Electronics and Electrical.
$3
226981
690
$a
0544
710
2
$a
University of California, Santa Barbara.
$b
Electrical & Computer Engineering.
$3
492939
773
0
$t
Dissertation Abstracts International
$g
71-05B.
790
1 0
$a
Manjunath, Bangalore S.,
$e
advisor
790
1 0
$a
Madhow, Upamanyu
$e
committee member
790
1 0
$a
Chandrasekaran, Shivkumar
$e
committee member
790
1 0
$a
Gibson, Jerry
$e
committee member
790
1 0
$a
Clarke, Keith
$e
committee member
790
1 0
$a
Solanki, Kaushal
$e
committee member
790
$a
0035
791
$a
Ph.D.
792
$a
2010
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3398809
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000051962
電子館藏
1圖書
學位論文
TH 2010
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3398809
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入