跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.103) 您好!臺灣時間:2025/11/22 01:24
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:吳秉澤
研究生(外文):Bing-Ze Wu
論文名稱:JPEG影像的竄改偵測機制
論文名稱(外文):A Tamper Detection Scheme for JPEG Images
指導教授:謝尚琳謝尚琳引用關係
指導教授(外文):Shang-Lin Hsieh
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:中文
論文頁數:78
中文關鍵詞:JPEG 壓縮離散餘弦轉換竄改偵測
外文關鍵詞:JPEG CompressionDiscrete Cosine TransformTemper Detection
相關次數:
  • 被引用被引用:2
  • 點閱點閱:183
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本論文提出一個影像竄改偵測的機制,此機制可以找出JPEG 影像被竄改的位置。
不同於其他機制只對未壓縮影像進行處理,本機制使用JPEG 影像做為輸入。本機
制先從原始影像中算出特徵值,做為浮水印嵌入到經過頻率域轉換的影像中。當有
JPEG 影像需要驗證時,本機制透過取出嵌入的浮水印比對找出被竄改的區域。根據
實驗結果,可確實找出經過JPEG 壓縮影像受到竄改的位置。
This paper presents a tamper detection scheme that can locate the tampered areas in JPEG
images. Unlike other schemes that deal with uncompressed images, the presented scheme
accepts JPEG image as input. The presented scheme calculates the difference values as
the watermark from the host JPEG image and embeds the watermark into the DCT
frequency domain of the image. When there is a JPEG image that needs to be verified, the
scheme compares the watermark to detect the tampered areas. The experimental result
shows the scheme can effectively detect the tampered areas of images that have been
compressed by JPEG.
誌謝 i
摘要 ii
ABSTRACT iii
圖目錄 vi
表目錄 vii
第一章 介紹 1
1.1 背景 1
1.2 動機 2
1.3 目標 3
1.4 論文架構 4
第二章 相關背景 5
2.1離散餘弦轉換(Discrete Cosine Transform(DCT)) 5
2.1.1 一維離散餘弦轉換 5
2.1.2 二維離散餘弦轉換 6
2.2 Torus Automorphism轉換 6
2.3中值濾波(Median Filter) 7
第三章 影像竄改偵測機制 8
3.1影像浮水印產生與嵌入 11
3.1.1. 前處理 11
3.1.2. 特徵抽取 11
3.1.3. DCT 12
3.1.4. 亂數打散 13
3.1.5. 特徵嵌入 14
3.2. 影像完整性驗證 18
3.2.1. 前處理、特徵抽取、DCT 18
3.2.2. 浮水印取出 18
3.2.3. 亂數反打散 19
3.2.4. 竄改驗證 19
3.2.5.雜訊處理 20
第四章 實驗結果 22
4.1. JPEG壓縮影像 24
4.2. 再次JPEG壓縮影像 31
4.3. JPEG壓縮且竄改影像 45
第五章 結論 54
參考文獻 55
附錄 60
[1]Li Chuanmu and Liu Lili, “An Image Authentication Scheme with Localization and Recovery,” Congress on Image and Signal Processing, Vol.5, pp.669-673, May, 2008.
[2]Chien-Chang Chen and Husan-An Ke, “Authenticate an Image under DCT Domain with Attack Recovery,” 2008 Workshop of Image Processing, Computer Graphics, and Multimedia Technologies, Taipei, Nov., 2008.
[3]S. Shefali and S.M.Deshpande, “Moment Invariants for Digital Image Authentication and Authorization,” International Conference on Control, Automation and Systems, pp.1296-1300, Oct. 2007.
[4]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, and Meng-Cheng Tsa,I, “A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation,” Fifth International Conference on Information Assurance and Security, Vol.2, pp. 615-618, Aug. 2009.
[5]Amira Hassine, Rhouma Rhouma and Safya Belghith, “A novel method for tamper detection and recovery resistant to Vector Quantization attack,” 6th International Multi-Conference on Systems, Signals and Devices, pp.1-6, Mar. 2009.
[6]Hao Luo, Shu-Chuan Chu, and Zhe-Ming Lu, “Self Embedding Watermarking Using Halftoning Technique,” Circuits, Systems, and Signal Processing, Vol. 27, pp.155-170, Apr. 2008.
[7]F.H. Yeh and G. C.Lee, “Toral fragile watermarking for localizing and recovering tampered image,” Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, pp.321-324, Dec. 2005.
[8]Yi Du and Ting Zhang, “A Reversible and Fragile Watermarking Algorithm Based on DCT,” International Conference on Artificial Intelligence and Computational Intelligence, Vol.1, pp.301-304, Nov. 2009.
[9]Junquan Hu, Jiwu Huang, Daren Huang, and Yun Q. Shi, “A DWT-based fragile watermarking tolerant of JPEG compression,” IWDW'02 Proceedings of the 1st international conference on Digital watermarking, pp.179-188, 2003.
[10]Ramesh Neelamani, Ricardo de Queiroz, Zhigang Fan, Sanjeeb Dash, and Richard G. Baraniuk, “JPEG compression history estimation for color images,” IEEE Transactions on Image Processing, Vol.15, pp.1365-1378, Jun. 2006.
[11]SanthoshKumar Sunderrajan, “Exposing Digital Forgeries in JPEG and Bitmap Images,” University of California, Mar. 2009.
[12]Weiqi Luo, Jiwu Huang, and Guoping Qiu “JPEG Error Analysis and Its Applications to Digital Image Forensics,” IEEE Transactions on Information Forensics and Security, pp.480-491, Jun. 2010.
[13]Guobo Li, Songwen Pei, Gang Chen, Wenjun Cao, and Baifeng Wu, “A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient,” 13th International Conference on Computer Supported Cooperative Work in Design, pp.107-112, Apr. 2009.
[14]Xiaojun Qi, Xing Xin, and Ran Chang, “Image authentication and tamper detection using two complementary watermarks,” 2009 16th IEEE International Conference on Image Processing (ICIP), pp.4257-4260, Nov. 2009.
[15]Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake, and Héctor Pérez-Meana, “Image Authentication Scheme Based on Self-embedding Watermarking,” Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Vol.5856, pp.1005-1012, 2009.
[16]Li Bo, Tao Xu, Shengli Ji, Hao Jin, and Aiqin Zhang, “A New Semi-fragile Watermarking Algorithm for Image Authentication,” 7th World Congress on Intelligent Control and Automation, pp.5928-5932, Jun. 2008.
[17]Clara Cruz, Jose Antonio Mendoza, Mariko Nakano Miyatake, Hector Perez Meana, and Brian Kurkoski, “Semi-Fragile Watermarking Based Image Authentication with Recovery Capability,”.International Conference on Information Engineering and Computer Science, pp.1-4, Dec.2009.
[18]Chih-Hung Lin, Tung-Shih Su and Wen-Shyong Hsieh, “Semi-Fragile Watermarking Scheme for Authentication of JPEG Images,” Tamkang Journal of Science and Engineering, Vol.10, No. 1, pp.57-66, 2007.
[19]Xiaoyun Wu, Jiwu Huang, Junquan Hu, and Yun-Qing Shi, “Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet,” Journal of Computers, Vol.17, No.2, pp.27-36, Jul. 2006.
[20]Shinfeng D. Lin and Ai-Lin Chiang, “Tamper Detection and Recovery Using a Reversible Watermarking Technique,” Journal of Computers, Vol. 20, No. 1, pp.2-10, Apr. 2009.
[21]Chiang-Lung Liu, “A JPEG-compliant method for image authentication and recovery,” Journal of Information Assurance and Security, Vol. 4, No. 6, pp.622-628, Nov. 2009.
[22]Chiang-Lung Liu, “A Novel Image Authentication and Recovery Method for Applications of Image Sharing,” Eighth International Conference on Intelligent Systems Design and Applications, Vol.2, pp.127-132, Nov. 2008.
[23]Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, and Bin-Yuan Huang, “A Recoverable Semi-Fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter,” Proceedings of the 5th international conference on Autonomic and Trusted Computing, Vol.5060, pp.629-640, 2008.
[24]Syed Ali Khayam, “The Discrete Cosine Transform (DCT): Theory and Application,” Technical Report WAVES-TR-ECE802.602, Michigan State University, 2003.
[25]Chin-Chen Chang, Ju-Yuan Hsiao, and Chi-Lung Chiang, “An Image Copyright Protection Scheme Based on Torus Automorphism,” First International Symposium on Cyber Worlds, pp.217-224, Nov. 2002.
[26]Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, 2001.
[27]PENG Lei, “Adaptive Median Filtering,”http://www.massey.ac.nz/~mjjohnso/notes/59731
/presentations/Adaptive%20Median%20Filtering.doc, retrieved on Jul. 10, 2010.
[28]Adobe Photoshop CS5, http://www.adobe.com/tw/products/photoshop/photoshop/, retrieved on Jul. 10, 2010.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top