跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.134) 您好!臺灣時間:2025/12/21 20:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林冠喻
研究生(外文):Guan-Yu Lin
論文名稱:應用細菌演算法之數位浮水印應用
論文名稱(外文):Bacterial foraging for watermarkings applications
指導教授:黃祥哲
指導教授(外文):Hsiang-Cheh Huang
學位類別:碩士
校院名稱:國立高雄大學
系所名稱:電機工程學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:中文
論文頁數:85
中文關鍵詞:數位浮水印離散餘弦轉換細菌搜尋法模糊理論
外文關鍵詞:WatermarkDiscrete Cosine TransformBacterial foragingFzzy theory
相關次數:
  • 被引用被引用:0
  • 點閱點閱:281
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來,隨著網路的蓬勃發展,影像,聲音、影片、圖片等多媒體都開始以數位化的形式在網際網路流傳,因此許多問題也由此而生,非法的複製以及盜用,已經變成無法制止的地步。因此,有效的數位浮水印技術則是可以嚇阻這些不法行為的方法之一。
在本篇論文中,提出一種基於細菌演算法以及離散餘弦轉換的數位浮水印系統。並且我們針對於如何在浮水印的強韌性與透明度兩個互相牴觸的特性中,找出一個平衡點。嵌入浮水印的方法是使用離散餘弦轉換並修改其相關係數,使用細菌演算法模擬細菌的找尋食物的特性來搜尋浮水印的嵌入的相關位置。在萃取出浮水印時,對應於浮水印嵌入方法,不需要原始影像即可萃取浮水印,採用本方法,可以有效的提高浮水印的強韌性以及嵌入浮水印的影像之品質。
In recent years, along with the booming application of the Internet, digital files and associated multimedia contents can be easily acquired in our daily lives. With the inherent characteristics of lossless copying and easy spreading, the intellectual property or ownerships of the multimedia contents have become a rising problem. Data hiding and watermarking techniques aiming at protecting copyright-related issues are of considerable interest in academia and industry.
In this thesis, we mainly focus on improving the requirements of watermarking applications, including the watermark robustness and the invisibility in the frequency domain. Since the requirements tend to have conflicts, we employ bacterial foraging for training the watermarking algorithm and obtain the optimized solution. With the simulations presented, bacterial foraging provides a systematic way to balance the contributions by the watermarking requirements, and to offer another scope for designing an effective algorithm for watermarking.
摘要 i
ABSTRACT ii
致謝 iii
目錄 iv
圖目錄 vii
表目錄 ix
第一章 緒論 1
1.1 研究動機 1
1.2 研究方向與方法 2
1.3 論文架構與組織 3
第二章 數位浮水印介紹與嵌入取出方法 5
2.1 數位浮水印介紹 5
2.2 常見的浮水印嵌入方法 7
2.2.1 空間域方法 7
2.2.2 頻率域方法 8
2.2.2.1 離散餘弦轉換(Discreate Cosine Transform) 8
2.2.2.2 DCT浮水印嵌入步驟 9
2.2.2.3 DCT浮水印抽取步驟 11
2.3 數位影像處理攻擊 12
2.3.1 低通濾波器(Low pass filter) 12
2.3.2 中值濾波器(Median filter) 13
2.3.3 JPEG壓縮 14
2.4 影像評估標準 14
2.4.1峰訊雜比(Peak Signal-to-Noise Ratio, PSNR) 15
2.4.2位元正確率(Bit Correct Ratio, BCR) 15
2.5 DCT浮水印嵌入結果 16
第三章 細菌演算法 19
3.1 細菌演算法起源 19
3.2 細菌的搜尋方法 20
3.3趨化(Chemotaxis) 22
3.4再生(Reproduction) 22
3.5分散與淘汰(Elimination and dispersal) 22
3.6細菌最佳化演算法 23
第四章 模糊理論 27
4.1模糊理論起源 27
4.2 明確集合 28
4.3 模糊集合 29
4.4 歸屬函數定義 30
4.5 模糊推論 31
4.6 模糊控制 33
第五章 細菌演算法之DCT浮水印技術 37
5.1消失與淘汰事件移除 38
5.2突變事件 38
5.3修正趨化移動方式 39
5.4 DCT浮水印之細菌最佳化演算法 42
5.5 適應函數 43
5.6 程式流程 44
第六章 模擬結果 47
6.1 模擬環境 47
6.2 參數說明 48
6.2.1 實驗參數設定 49
6.3 JPEG攻擊之細菌演算法結果 50
6.3.1採用Lena之JPEG模擬結果 50
6.3.2採用F16之JPEG模擬結果 54
6.4 Median filter 攻擊之細菌演算法結果 57
6.4.1採用Lena之Median filter模擬結果 57
6.4.2採用F16之Median filter模擬結果 60
6.5 Low pass filter攻擊之細菌演算法結果 63
6.5.1採用Lena之Low pass filter模擬結果 63
6.5.2採用F16之Low pass filter模擬結果 66
第七章 結論與未來展望 71
7.1 結論 71
7.2 未來展望 72
參考文獻 73
參考文獻

[1]F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
[2]G. Voyatzis and I. Pitas, “The use of watermarks in the protection of digital multimedia products,” Proceedings of the IEEE, vol. 87, no.7, pp. 1197-1207, 1999.
[3]K. M. Passino, “Biomimicry of bacterial foraging,” IEEE Control Systems Magazine, vol. 22, no. 3, pp.52-67, June, 2002.
[4]R. G. Schyndel, A. Z. Tirkel and C. F. Osborne, “A digital watermark,” in Proc IEEE Int. Conf. Image Processing, vol. 2 pp.86-90, 1994.
[5]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol.35, no.3&4, pp. 313-336, 1996.
[6]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol.34, no.3, pp.671-683, 2001.
[7]A. Leest, M. Veen, and F. Bruekers, “Reversible image watermarking,” IEEE International Conference on Image Processing, vol.2, pp.731-734, 2003.
[8]B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, “Reversible image watermarking by histogram modification for Integer DCT coefficients,” IEEE Workshop on Multimedia Signal Processing, pp.143-146, 2004.
[9]Z. Ni, Y. Q. Shi, Nirwan Ansari, and Wei Su, “Reversible Data Hiding,” IEEE Trans. on Circuits and Systems for Video Technology, vol.16, no.3, pp.354-362, March 2006
[10]D. Coltuc, A. Tremeau, E. J. Delp and P. W. Wong, “Simple Reversible watermarking Schemes,” Proceedings of SPIE: Steganography, watermarking Multimedia Contents VII, vol.5681, pp.561-568, 2005.
[11]D. C. Wu and W. H. Tsai, “Image hiding in spatial domain using an image differencing approach,” IEEE Proceedings, Image and Signal Processing, vol.147, no.1, pp. 29-37, 2000.
[12]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits and systems for Video Technology, vol.13, no.8 August 2003
[13]C. C. Thien and J. C. Lin, “A simple and high-hiding capacity medhod for hiding digit- by digit data in images based on modulus function,” Pattern Recognition, vol.36, no.3, pp.2875-2881, 2003.
[14]A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Processing, vol.13, no.8, pp.1147-1156, August 2004.
[15]I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, December 1997.
[16]C.I. Podilchuk, and W. Zeng, “Image-adaptive Watermarking Using Visual Models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp.525-539, May, 1998
[17]C. T. Hsu, and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transsactions on Image Processing, vol. 8, no. 1, 1999.
[18]I. J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, issue: 12, pp.1673-1687, 1997.
[19]W. Luo, G. L. Heileman and C. E. Pizano, “Fast and robust watermarking of JPEG files,” Proceedings of Image Analysis and Interpretation, vol. 1, pp.158-162, 2002
[20]C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, vol.2 no.4, pp.209-224, December, 2000.
[21]M. J. Tsai, K. Y. Yu and Y. Z. Chen, “Joint wavelet and spatial transformation for digital watermarking,” IEEE trans. on Consumer Electronics, vol.46 no.1, pp.241-245, February, 2000.
[22]M. S. Hsieh, D. C. Tseng, and Y. H. Huang, “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. on Industrial Electronics, vol.48, no.5, pp.875-882, 2001.
[23]W. B. Lee, T. H. Chen, “A public verifiable copy protection technique for still images,” The Journal of systems and Software, pp.195-204, 2002.
[24]F.A.P. Peticolas, R.j. Adnerson, “Attacks on copyright marking systems,” in Second International Information Hiding Workshop, pp. 219-239, 1998.
[25]F.A.P. Peticolas, R.j. Adnerson, “Evaluation of copyright marking systems,” 1999 IEEE International Conterence on Multimedia Compution and Systems, vol.1, pp.574-579, 1999.
[26]L. A Zadeh, “Fuzzy Sets,” Information and Control, vol.8. 338-353, 1965.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊