跳到主要內容

臺灣博碩士論文加值系統

(216.73.217.76) 您好!臺灣時間:2026/04/23 21:36
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:徐培峯
研究生(外文):Pei-Feng Shiu
論文名稱:一個能有效抵抗JPEG壓縮破壞的浮水印方法
論文名稱(外文):A DCT based watermarking scheme surviving JPEG compression
指導教授:林家禎林家禎引用關係翁添雄
指導教授(外文):Chia-Chen LinTien-Hsiung Weng
口試委員:張真誠李金鳳
口試委員(外文):Chin-Chen ChangChin-Feng Lee
口試日期:2011-06-27
學位類別:碩士
校院名稱:靜宜大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:57
中文關鍵詞:浮水印DCTJPEG壓縮
外文關鍵詞:watermarkDCTJPEG compression
相關次數:
  • 被引用被引用:1
  • 點閱點閱:545
  • 評分評分:
  • 下載下載:44
  • 收藏至我的研究室書目清單書目收藏:0
本研究在此提出了一個植基於DCT技術的浮水印方法,這個方法的主要目的在於強化浮水印的強健性,使其浮水印能夠承受JPEG壓縮攻擊。為了達成這個目的,本研究提出的浮水印方法,會將其浮水印嵌入至圖片的DCT係數中。為了使被浮水印圖片能保持在視覺可察覺差異的圖像品質,本研究使用了數學餘數的概念,將浮水印嵌入至圖片中低頻帶的DCT係數。除此之外,本研究在提出的方法中,應用了投票機制以提高浮水印的強健性。而實驗結果證實了針對於JPEG壓縮攻擊,本研究所提出的方法,其浮水印強健性比Patra等人以及Lin等人的浮水印方法還要優秀。
In this thesis, a DCT-based watermarking technique is proposed. This scheme is designed to increase its robustness of hidden watermark so that the hidden watermark can withstand JPEG compression attack. To achive our objective, the proposed watermark scheme embeds watermark into the DCT coefficients. To remain the visual quality of watermarked images, only low-frequency DCT coefficients are selected to carry hidden watermark by the concept of mathematical remainder. To enhance the robustness of the watermark, a voting mechanism is applied in the scheme. Experimental results confirm that the robustness of hidden watermark against JPEG compression with our proposed scheme is better than that of Lin et al.’s scheme and Patra et al.’s scheme.
摘要 i
ABSTRACT ii
致謝 iii
目錄 iv
表目錄 v
圖目錄 vi
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究方法 2
1.3 效能參考指標 3
1.4 論文架構 4
第二章 相關技術 5
2.1 Discrete Cosine Transform (DCT)與JPEG壓縮技術 5
2.2 其他相關的浮水印方法 9
第三章 本研究提出的浮水印方法 26
3.1 浮水印資訊嵌入工作 27
3.2 浮水印資訊取出工作 34
3.3 浮水印投票機制 36
第四章 實驗與比較結果 38
4.1 浮水印方法的實驗結果 39
4.2 使用投票機制的實驗結果 42
4.3 抗JPEG壓縮攻擊結果 43
4.4 比較及討論 45
第五章 結論 55
參考文獻 56


[1]Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, Vol. 177, Issue 13, pp. 2768-2786, 2007.
[2]H.C. Huang, F.H. Wang and J.S. Pan, “Efficient and robust watermarking algorithm with vector quantization,” Electronics Letters, Vol. 37, pp. 826-828, 2001.
[3]H.C. Huang, F.H. Wang and J.S. Pan, “A VQ-based robust multiwatermarking algorithm,” IEICE Transactions on Fundamentals of Electronics, Vol. E85-A, pp. 1719-1726, 2002.
[4]Y.H. Ku and X. Sun, “The Chinese remainder theorem,” Journal of The Franklin Institute, Vol. 329, pp. 93-97, 1992.
[5]Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang and Hao-Kuan Tso, “A robust watermarking scheme using self-reference image,” Computer Standards & Interfaces, Vol. 28, pp. 356-367, 2006.
[6]D.C. Lou, H.K. Tso and J.L. Liu, “A copyright protection scheme for digital images using visual cryptography technique,” Computer Standards & Interfaces, Vol. 29, pp. 125-131, 2007.
[7]Tien-You Lee and Shinfeng D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, Vol. 41, pp. 3497-3506, 2008.
[8]Shinfeng D. Lin, Shih-Chieh Shie and J.Y. Guo, “Improving the robustness of DCT-based image watermarking against JPEG compression,” Computer Standards & Interfaces, Vol.32, pp.54-60, 2010.
[9]Chia-Chen Lin and Pei-Feng Shiu, “DCT-based reversible data hiding scheme,” Journal of Software, Vol. 5, No. 2, pp. 214-224, 2010.
[10]Chia-Chen Lin and Pei-Feng Shiu, “High capacity data hiding scheme for DCT-based images,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, pp. 220-240, 2010.
[11]Jagdish C. Patra, Jiliang E. Phua and Cedric Bornand, “A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Digital Signal Processing, Vol. 20, pp. 1597-1611, 2010.
[12]Jagdish C. Patra, A. Karthik and Cedric Bornand, “A novel CRT-based watermarking technique for authentication of multimedia contents,” Digital Signal Processing, Vol. 20, pp. 442-453, 2010.
[13]Jau-Ji Shen and Jia-Min Ren, “A robust associative watermarking technique based on vector quantization,” Digital Signal Processing, Vol. 20, pp. 1408-1423, 2010.
[14]Han-Min Tsai and Long-Wen Chang, “Secure reversible visible image watermarking with authentication,” Signal Processing: Image Communication, Vol. 25, pp. 10-17, 2010.
[15]Chun-Wei Yang and Jau-Ji Shen, “Recover the tampered image based on VQ indexing,” Signal Processing, Vol. 90, pp. 331-343, 2010.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊