跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.41) 您好!臺灣時間:2026/01/14 04:23
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:莊潤洲
研究生(外文):Chuang Lou Zou
論文名稱:影像被竄改之偵測技術研究
論文名稱(外文):The Study of Image Tampering Detection
指導教授:張真誠張真誠引用關係
指導教授(外文):Chuang Chin chen
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2000
畢業學年度:88
語文別:英文
論文頁數:52
中文關鍵詞:影像認證數位簽章單向雜湊函數四元樹失真壓縮
外文關鍵詞:Image AuthenticationDigital SignatureOne-Way Hash FunctionQuadtreeLossy compression
相關次數:
  • 被引用被引用:1
  • 點閱點閱:420
  • 評分評分:
  • 下載下載:16
  • 收藏至我的研究室書目清單書目收藏:0
近年來網際網路的發展越來越蓬勃,而由於影像可以被用來作為公司行號的商標、電子商務的廣告圖樣、多媒體的主要內容等,因此在網際網路上經常舉目可見。但就在藉由網路來提供這些影像的同時,也衍生出許多影像的安全問題,例如影像被非法拷貝與更改。那是由於影像非常容易被複製及竄改的緣故,因此如何去保護影像的智慧財產權將是一個重要的研究主題。在這一篇論文中,我們將會採用影像認證法來保護影像,當影像被竄改時,透過影像認證法,就可以指出影像被竄改之處,因而達到偵測影像完整性之目的。
在本碩士論文之中,我們將推出兩種新的影像認證法。第一種方法是植基於RSA的數位簽章以及四元樹的結構來達成影像完整性之偵測,透過數位簽章我們可以證明這些影像的所有權並且也可以指出影像中何處曾被竄改過,在另一方面,我們利用四元樹結構來組織這些數位簽章,因此在影像的偵測部分將會更有效率。
由於傳統的影像認證法是不允許JPEG的失真壓縮,那是因為JPEG失真壓縮法會將藏入影像的簽章給破壞掉。可是JPEG的失真壓縮在網際網路中卻是經常被使用的,因此我們希望所提出影像認證技術可以禁得起JPEG的失真壓縮。為了改進傳統的影像驗證法之效益,在第二個方法我們提出了另一個新的影像認證技術,不僅可以偵測影像中何處被竄改處又可以允許JPEG的失真壓縮。我們的方法會去取出一些重要的DCT係數,並且在這些重要的係數上設定一個可以容許壓縮的範圍,當這張影像沒有被過度修改或是過度壓縮時,其DCT係數將可以被正確地取回。如此這個影像認證法就可以禁得起JPEG的失真壓縮。
Nowadays, Internet has become more and more popular. However, images are most oftenly used in Internet. Images can be used as the trademarks of company symbolization, electronic commerce (EC), multimedia, etc. However, there are also some security issues of images. Among them, the illegal like illegal copy and modification of image is a popular security problem which oftenly occurs in our daily life. Therefore, how to protect the intellectual property of images is an important research topic. The thesis planes to use image authentication to protect the images. Based on the image authentication, the modified places of the images will be pointed out; thus the images can preserve the image integrity.
This thesis proposes two new methods for image authentication. The first method uses the RSA signatures and quadtree structure to achieve the image integrity. Based on those digital signatures, we can claim the authorship of the image and detect efficiently whether the image has been modified or not. On the other hand, we use quadtree structure to organize digital signatures; thus the detection procedure will be more efficient.
The traditional image authentication methods cannot allow JPEG lossy compression since the JPEG lossy compression may destroy the signatures embedded in images. However, JPEG lossy compression method is often required and popularly used everywhere. Thus, the JPEG lossy compression should be taken into consideration. To improve the traditional methods, we propose a new image authentication that not only can prevent images tampered with but also allow reasonable JPEG lossy compression. Our method will extract some significant DCT coefficients and set a compression tolerant range of them. An extracted DCT coefficient will be survived after the image is not further modified or lossily compressed.
Contents
Abstract (in Chinese)ii
Abstract (in English)iv
Acknowledgmentsvi
List of Figuresvii
List of Tablesviii
Chapter 1Introduction1
1.1 Motivation1
1.2 A Survey of Image Authentication2
1.3 Organization of this thesis2
Chapter 2An Efficient Image Tampering Detection Algorithm
Based on Quadtree Structure4
2.1 The Previous Work6
2.1.1 The Signing Procedure of TDDA6
2.1.2 The Verification Procedure of TDDA7
2.2 The Propose Method8
2.2.1 The Signing Procedure of FITDA9
2.2.2 The Verification Procedure of FITDA13
2.3 Discussions and Analyses18
Chapter 3An New Image Authentication for Tolerating
JPEG lossy compression23
3.1 JPEG lossy compression technique 25
3.2 The Propose Method26
3.2.1. The Signing Procedure26
3.2.2. The Verification Procedure32
3.3. Discussions and Analyses36
Chapter 4Conclusions47
Bibliography49
Bibliography
[1]C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks In Images,” IEEE Transactions on Image Processing, Vol. 8, pp. 58-68, 1999.
[2]C. T. Hsu and J. L. Wu, “Multi-resolution Watermarking For Digital Images,” IEEE Transactions on Circuits and System II: Analog and Digital Signal Procedure, Vol. 45, pp. 1097-1101, 1998.
[3]I. Pitas, “A Method For Watermark Casting On Digital Image,” IEEE Transactions on Circuits and video technique, Vol. 8, pp. 1097-1101, 1998.
[4]R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking Three-Dimensional Polygonal Models Through Geometric And Topological Modifications,” IEEE Transactions on Selected Areas in Communications, Vol. 16, pp. 551-560, 1998.
[5]C. L. Podilchuk, Z. Wenjun, “Image-Adaptive Watermarking Using Visual Models,” IEEE Transactions on Selected Areas in Communications, Vol. 16, pp. 525-539, 1998.
[6]C. Busch, W. funk, and S. Wolthusen, “An Adaptive Digital Image Watermarking Technique For Copyright Protection,” IEEE Truncations on Consumer Electronics, Vol. 45, pp. 1005-1015, 1999.
[7]M. S. Hwang, C. C. Chang, and K. F. Hwang, “A Watermarking Technique Based On One-Way Hash Functions,” IEEE Truncations on Consumer Electronics, Vol. 45, pp. 286-294, 1999.
[8]K. S. Ng, L. M. Cheng, and M. K. Wong, “Adaptive Watermarking By Using Pixel Position Shifting Technique,” IEEE Truncations on Consumer Electronics, Vol. 45, pp. 1057-1064, 1999.
[9]Z. H. Wei, O. Qin, and Y. Q. Fu, “Perceptual Digital Watermarking of Images Using Wavelet Transform,” IEEE Truncations on Consumer Electronics, Vol. 44, pp. 1267-1272, 1998.
[10]C. T. Hsu and J. L. Wu, “DCT-Based Watermarking For Video,” IEEE Truncations on Consumer Electronics, Vol. 44, pp. 206-216, 1998.
[11]M. P. Queluz, “Towards Robust Content Based Technique For Image Authentication,” IEEE Multimedia Signal Processing, 1998, pp. 297-302.
[12]P. W. Wong, “A Public Key Watermark For Image Verification And Authentication,” ICIP Image Processing, Vol. 1, pp. 455-459, 1998.
[13]S. Bhattacharjee and M. Kutter, “Compression Tolerant Image Authentication,” ICIP Image Processing, Vol. 1, pp. 437-441, 1998.
[14]M. Wu and B. Liu, “Watermarking For Image Authentication,” ICIP Image Processing, Vol. 2, pp. 437-441, 1998.
[15]C. R. Yang, M. S. Hwang, and Y. L. Tang, “Tampering Double Detection Algorithm,” Eighth National Conference on Science and Technology of National Defense, Tao-Yuan, Nov. 1999.
[16]G. L. Friedman, “The Trustworthy Digital Camera: Restoring Credibility To The Photographic Image,” IEEE Transactions on Consumer Electronics, Vol. 39, no. 4, pp.905-910, November 1993.
[17]P. W. Wong, “A Public Key Watermark For Image Verification and Authentication,” IEEE International Conference on Multimedia Computing and Systems, Vol. 2, pp. 209-213, October 1998.
[18]M. Schneider and S. F. Chang, “A Robust Image Content Based Digital Signature For Image Authentication,” International Conference on Image Processing, Vol. 3, pp. 227-230, September 1996.
[19]D. Kundur and D. Hatzinakos, “Digital Watermarking For Telltale Tamper Proofing And Authentication,” Proceedings Of The IEEE, Vol. 87, no. 7, JULY 1999.
[20]R. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, February 1978.
[21]W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard, New York, Van Nostrand Reinhold, 1993.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 卓英豪(民77)。談教師的權利與義務。教育資料文摘,22,5-8。
2. 汪紹銘(民83)。教師聘任契約與權利保護請求權。法律評論,60,25-31。
3. 李聲吼(民86)。人力資源發展的意義與內涵。人力發展月刊,36,28-35。
4. 吳清山(民86)。迎接教師當頭家的時代─談教師評審委員會的組織與運作。北縣教育,16,13-17。
5. 吳清山(民84)。美國九十年代教育改革的動向。教師天地,78 ,71-76。
6. 吳三靈(民85)。規劃設置教師評審委員之研究。人事月刊,23,71-83。
7. 方德隆(民85)。師資培育多元化之挑戰:教師資格檢定、教育實習與教師聘任問題之探討。教育資料文摘,37,75-83。
8. 丁志權(民86)。高級中等以下學校教師評審委員會設置辦法評析。教師之友,38,1-5。
9. 丁志權(民85c)。教師法施行細則評析。教師之友,37,1-8。
10. 薛化元(民84)。教師法通過後的省思。國民教育,36(2),20-21。
11. 歐用生(民85)。落實中小學教師聘任制度。教育實習輔導,2,13-16。
12. 黃英忠(民85)。人力資源管理的理念與應用。人力發展月刊,34,36-45。
13. 黃政傑(民86)。發揮學校教評會的功能。北縣教育,16,10-12。
14. 張鈿富(民86)。學校教師評審委員會的組織與運作。北縣教育,16,29-32。
15. 秦夢群(民88)。台北縣教評會運作與成效之研究。北縣教育,26,47-54。