跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.184) 您好!臺灣時間:2025/12/01 01:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳鼎介
研究生(外文):Ding-Jie Chen
論文名稱:基於秘密分享與傅利葉-梅林轉換之抗RST影像智慧財產權保護機制
論文名稱(外文):An RST-Resilient Image Intellectual Property Protection Scheme Based on Fourier-Mellin Transform and Secret Sharing
指導教授:謝尚琳謝尚琳引用關係
指導教授(外文):Shang-Lin Hsieh
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:105
中文關鍵詞:傅利葉梅林轉換秘密分享不變量
外文關鍵詞:Fourier-Mellin trnsformSecret sharingRST-invariants
相關次數:
  • 被引用被引用:0
  • 點閱點閱:212
  • 評分評分:
  • 下載下載:23
  • 收藏至我的研究室書目清單書目收藏:0
在許多的浮水印嵌入系統中,浮水印的取回原理主要建立在已知浮水印嵌入時的嵌入位置。然而幾何失真會重新排列浮水印的嵌入位置,因而導致浮水印取回的失敗。本篇論文所提出的機制便是針對解決幾何失真中的旋轉、縮放、平移為目標。
所提出的機制包含了兩階段:私有分享生成及秘密取回。在私有分享生成階段,該機制會經由RST-不變量的領域取得影像特徵,再根據秘密分享機制去產生相對應的私有分享以供驗證。在秘密取回階段,同樣於RST-不變量的領域取得影像特徵,與所保存的私有分享結合即可取回秘密影像來做著作權的驗證。
從實驗中顯示這個機制可以抵抗下列幾種影像處理:平均模糊、對比調整、高斯模糊、JPEG (失真壓縮)、中值濾波、亮度調整、銳利化、均勻雜訊掺入、變動雜訊掺入、輕微的仿射轉換、輕微的擠壓、輕微的擴張、縮放、像素行列移除、旋轉、旋轉混和輕微裁剪、旋轉混和縮放、等化、列印再掃描。
In many watermarking systems, the main principle to retrieve the watermark is based on the knowledge of the positions for embedding the watermark. However, the geometric distortions rearrange the watermark embedding positions, and this often results in the failure of the watermark retrieval. In this thesis, the proposed scheme aims at resisting the rotation, scaling, and translation of the geometric distortions.
The scheme contains a private share generation phase and a secret image retrieval phase. In the private share generation phase, the scheme employs the RST-invariant domain to obtain the feature share of the host image, and then generate the corresponding private share based on the secret sharing scheme for authentication. In the secret image retrieval phase, the feature share of the suspect image is retrieved from the RST-invariant domain, and then combined with the private share to regain the secret image for copyright authentication.
The experimental results show that the scheme can withstand several attacks such as averaging, contrast adjustment, Gaussian blurring, JPEG compression, median filtering, Brightness-adjustment, sharpening, uniform noise adding, variance noise adding, slight affine transformation, slight pinching, slight punching, rescaling, lines removing, rotating, rotating with cropping, rotating with scaling, equalization, and print-and-scan.
ACKNOWLEDGEMENTS i
ENGLISH ABSTRACT ii
CHINESE ABSTRACT iii
TABLE OF CONTENTS iv
LIST OF FIGURES ix
LIST OF TABLES xii
CHAPTER
1 INTRODUCTION 1
1.1 Motivation 1
1.2 Thesis Organization 5
2 RELATED BACKGROUND 6
2.1. Visual Secret Sharing Scheme 6
2.2. The Discrete Fourier Transform and its Properties 7
2.2.1 The Translation Property 8
2.2.2 The Rotation Property 9
2.2.3 The Scaling Property 11
2.3 The Log-Polar Mapping 12
2.3.1 The Rotation Property 13
2.3.2 The Scaling Property 13
2.4 The Fourier-Mellin Transform 15
2.5 The RST-Invariant 15
2.6 The Power Law Transform 16
3 THE PRPOSED IMAGE PROTECTION SCHEME 17
3.1 The Major Parts in the Proposed Scheme 18
3.1.1. Preprocessing 18
3.1.2. Feature Extraction 21
3.1.3. ISS Encoding & Decoding 26
3.1.4. Scrambling & Unscrambling 29
3.1.5. Feature Tiling 30
3.1.6. Reduction 31
3.1.7. Postprocessing 32
3.2. The Algorithm of the Private Share Generation Phase 33
3.3. The Algorithm of the Secret image Retrieval Phase 35
4 EXPERIMENTAL RESULTS 38
4.1. Uniqueness Experiment 40
4.2. Robustness Experiment 43
4.2.1 Averaging 45
4.2.2 Contrast 47
4.2.3 Gaussian-blurring 49
4.2.4 JPEG 51
4.2.5 MEDIAN 53
4.2.6 Brightness-adjustment 55
4.2.7 Sharpening 57
4.2.8 Uniform-noise-addition 59
4.2.9 Variable-noise-addition 61
4.2.10 AFFINE 63
4.2.11 Cropping 65
4.2.12 LATESTRNDDIST 67
4.2.13 Pinch 69
4.2.14 Punch 71
4.2.15 RESC 73
4.2.16 RML 75
4.2.17 RNDDIST 77
4.2.18 Rotation 79
4.2.19 ROTCROP 83
4.2.20 ROTSCALE 85
4.2.21 Other attacks 87
4.3. Masking Experiment 88
4.4. Generalization Experiment 90
4.5. Comparison 91
5 CONCLUSIONS 93
REFERENCES 95
APPENDIXES
DATA OF GENERALIZATION EXPERIMENT 99
1 Averaging 99
2 Contrast 99
3 Gaussian-blurring 99
4 JPEG 100
5 MEDIAN 100
6 Brightness-adjustment 100
7 Sharpening 101
8 Uniform-noise-addition 101
9 Variable-noise-addition 101
10 AFFINE 102
11 Cropping 102
12 LATESTRNDDIST 102
13 Pinch 103
14 Punch 103
15 RESC 103
16 RML 104
17 RNDDIST 104
18 ROTCROP 104
19 Rotation 105
20 ROTSCALE 105
[1]Chin-Chen Chang, Ju-Yuan Hsiao, and Chi-Lung Chiang, "An Image Copyright Protection Scheme Based on Torus Automorphism," Proceeding of the First International Symposium on Cyber Worlds, pp. 217-224, November 2002.
[2]Chin-Chen Chang and Jun-Chou Chuang, "An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy," Pattern Recognition Letters of Elsevier Science Inc., Vol.23, Issue 8, pp. 931-941, June 2002.
[3]G. Voyatzis and I. Pitas, "Applications of Toral Automorphisms in Image Watermarking," IEEE Proceedings of International Conference on Image Processing, Vol.1, pp. 237-240, September 1996.
[4]Chuen-Ching Wang, Shen-Chuan Tai, and Chong-Shou Yu, "Repeating Image Watermarking Technique by the Visual Cryptography," IEICE Transactions of Fundamentals, Vol.E83-A, No.8, August 2000.
[5]Ping Wah Wong and Nasir Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification," IEEE Transactions on Image Processing, Vol.10, No.10, October 2001.
[6]Shinfeng D. Lin and Chin-Feng Chen, "A Robust DCT-based Watermarking for Copyright Protection," IEEE Transaction of Consumer Electronics, Volume 46, Issue 3, pp. 415-421, August 2000.
[7]Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, Vol.16, No.12, December 1997.
[8]Shang-Lin Hsieh and Bin-Yuan Huang, "A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation," Proceedings of International Computer Symposium, pp. 661-666, December 2004.
[9]Shang-Lin Hsieh, Hsuan-Chieh Huang, and I-Ju Tsai, "A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint Images," IEEE Conference on Information Technology: New Generations, pp. 482-489, April 2006.
[10]Ming-Shing Hsieh, Din-Chang Tseng, and Yong-Huai Huang, "Hiding Digital Watermarks Using Multi-resolution Wavelet Transform," IEEE Transactions on Industrial Electronics, Vol.48, No.5, October 2001.
[11]Xiangui Kang, Jiwu Huang, Yun Q. Shi, and Yan Lin, "A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression," IEEE Transaction on Circuits and Systems for Video Technology, Vol. 13, No.8, August 2003.
[12]Joseph J. K. O Ruanaidh and Shelby Pereira, "A Secure Robust Digital Image Watermark," SPIE Proceedings of Electronic Imaging: Processing, Printing and Publishing in Color, pp. 150-163, May 1998.
[13]Shelby Pereira and Thierry Pun, "Robust Template Matching for Affine Resistant Image Watermarks," Proceeding of 3rd International Information Hiding Workshop, pp. 207–218, September 1999.
[14]Joseph J. K. O Ruanaidh and Thierry Pun, "Rotation, Scale and Translation Invariant Digital Image Watermarking," IEEE Proceeding of Internal Conference on Image Processing, pp. 536-539, October 1997.
[15]Ching-Yung Lin, Min Wu, Jeffrey A. Bloom, Ingemar J. Cox, Matt L. Miller, and Yui Man Lui, "Rotation, Scale, and Translation Resilient Watermarking for Images," IEEE Transactions on Image Processing, Vol. 10, No. 5, May 2001.
[16]Harold S. Stone, Bo Tao, and Morgan McGuire, "Analysis of Image Registration Noise Due to Rotationally Dependent Aliasing," Technique Report of NEC Research Institute, TR 98-018, 1998.
[17]Moni Naor and Adi Shamir, "Visual Cryptography," Advances in Cryptology Eurocrypt'94, pp. 1-12, Springer-Verlag, Berlin, 1995.
[18]Bin-Yuan Huang and Shang-Lin Hsieh, "A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation," Master Thesis, Tatung University, July 2004
[19]Hsuan-Chieh Huang and Shang-Lin Hsieh, "A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint Images," Master Thesis, Tatung University, July 2005
[20]Stirmark benchmark,
http://www.petitcolas.net/fabien/watermarking/stirmark/.
[21]USC-SIPI image database,
http://sipi.usc.edu/database/.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
1. 林于荻、王思峰、陳禹辰(2004),知識分享之障礙:以Schein的組織文化理論架構為基礎的探索性個案研究,東吳經濟商學學報,47,59-89。
2. 林文政(2001),製造業人力資源專業職能之研究,中山管理評論,9(4),621-654。
3. 李天賞、杜金璋(1991),組織承諾的概念與測量,交大管理學報,11(1),51-74。
4. 白大昌(2003),組織文化、非正式網絡與組織公民權行為(OCB)之關係研究,中州學報,17,231-244。
5. 王誕生、徐其力(2003),組織文化與知識分享動機對知識分享之影響研究,中山管理評論,11(3),409-431。
6. 林妙雀(2003),企業之智慧資本與分享組織文化對組織管理績效影響之實證研究,管理評論,24(1),55-81。
7. 林鉦棽(1996),組織公正、信任、組織公民行為之研究:社會交換理論之觀點,管理科學學報,13(3),391- 415。
8. 林鉦棽、陳威菖(2003),工作疏離感在組織公民行為形成歷程的中介角色:以大高雄區域金融業從業人員為例,輔仁管理評論,10(1),91-117。
9. 林鉦棽(2003),以組織承諾及工作滿足為實徵切入分析組織公民行為與員工工作考績之結構模式比較,人力資源管理學報,3(2),93-113。
10. 林鉦棽(2004),休閒旅館業從業人員的組織公正、組織信任、組織公民行為關係:社會交換理論之觀點,中華管理學報,5(3),91-112。
11. 林鉦棽、李彥廷(2004),工作生活品質對服務品質與組織公民行為的影響,東吳經濟商學學報,46,1-30。
12. 房美玉(2002),臺灣半導體產業之組織文化對於內外工作動機與工作績效及工作滿意度間關連性的影響,管理評論,21(3),69-96。
13. 邱淑芬、韓志翔、林盈君(2002),員工參與制度與組織公民行為之關係:以臺灣電子產業為例,管理學報,19(6)1009-1043。
14. 吳秉恩(2004),企業人力資源管理定位與功能轉型,人力資源管理學報,4(3),1-27。
15. 吳萬益 林文寶(2002),主管行為特性、組織文化、組織學習方式與經營績效關係之研究,輔仁管理評論,9(1),71-93。