跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.213) 您好!臺灣時間:2025/11/09 06:24
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳松鑫
研究生(外文):Chen, SONG-XIN
論文名稱:利用阿諾德貓圖與多門檻值分割技術對彩色影像作竄改偵測與還原之浮水印方法
論文名稱(外文):A Watermarking Scheme for Tamper Detection and Recovery of Color Images by Using Arnold's Cat Map and Multilevel Thresholding
指導教授:吳大鈞
指導教授(外文):WU, DA-CHUN
口試委員:李哲瑋陳明瑤陳慶永
口試日期:2017-07-18
學位類別:碩士
校院名稱:國立高雄第一科技大學
系所名稱:電腦與通訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:72
中文關鍵詞:竄改偵測影像還原矩量保持門檻值分割法阿諾德貓圖曼哈頓距離
外文關鍵詞:Tamper detectionImage recoveryManhattan distanceMoment-preserving thresholdingArnold's cat map
相關次數:
  • 被引用被引用:0
  • 點閱點閱:336
  • 評分評分:
  • 下載下載:5
  • 收藏至我的研究室書目清單書目收藏:0
隨著網際網路的進步與發展,許多人將自行創作的圖片或日常生活照分享至網路上,不但以瀏覽器可輕易下載,而且可藉各種軟體修改或編輯再重新分享到網路上。為了檢測影像的真實性與避免影像被竄改,本論文提出了對彩色影像嵌入還原資訊與驗證訊號之新方法,當影像遭到竄改或破壞,可擷取驗證訊號進行竄改偵測,並擷取還原資訊進行影像還原。本論文將彩色影像分割成非重疊區塊,並提出區塊對應的方法。藉由阿諾德貓圖轉換方法將影像各區塊之還原資訊與驗證訊號隱藏在與該區塊之曼哈頓距離較遠的目標區塊中,避免兩個區塊過於靠近而無法還原區塊內容。本論文提出以矩量保持二值化方法達到四值化效果之新方法,由所提的方法產生各區塊之還原資訊。當影像區塊遭到攻擊或破壞,以還原資訊還原的影像能更近似於原始影像。由實驗得知,以本論文所提方法嵌入還原資訊與驗證訊號後之影像可以保持良好的影像品質,還原後影像之視覺效果也比一般二值化方法更接近原始影像。
With the progress and development of the Internet, many people share their own pictures or daily life photos on the Internet. It is not only easy to download with the browser, but also easy to modify or edit through the variety of software, and then re-share to the Internet. In order to detect the truthfulness of the image and to avoid the image being tampered, we propose a novel method to embed the recovery message and authentication data in color images. When an image is tampered with or destroyed, this method can extract the authentication data for tamper detection and then recover the image by using the recovery message. First, a color image is partitioned into non-overlapping blocks. A block mapping method is employed to make each block in an image, in order to find a target block for embedding the recovery message and authentication data with far distance by using Arnold's cat map. It can avoid two blocks being too close, preventing the ability to recover the tempered block. We also propose a method to achieve quarter-level thresholding by using bi-level moment-preserving technology, and use them to generate the recovery message. When a block of image is attacked or destroyed, we can recover the block with outward appearance close to that of the original image by the recovery message. The experimental results show that color images can maintain good quality after embedding the recovery message and authentication data. The visual quality of the recovery image is closer to the original image than that of using traditional image binarization.
中文摘要 I
ABSTRACT II
誌謝 IV
目錄 V
圖目錄 VII
表目錄 IX
第壹章 緒論 1
第一節 研究背景 1
第二節 研究動機 2
第三節 研究目的 3
第四節 論文貢獻 4
第五節 論文架構 4
第貳章 相關技術之探討 6
第一節 資訊隱藏 6
第二節 相關文獻討論 7
第三節 相關技術探討 8
3-1 矩量保持多門檻值分割法(Multilevel moment-preserving thresholding) 8
3-2 RGB色彩空間與YUV色彩空間 11
3-3 最佳像素調整處理方法 12
3-4 曼哈頓距離(Manhattan distance) 13
3-5 阿諾德貓圖(Arnold's cat map) 14
3-6 膨脹與侵蝕運算 17
第四節 結論 19
第參章 利用阿諾德貓圖與多門檻值分割技術對彩色影像作竄改偵測與還原之浮水印方法 20
第一節 簡介 20
第二節 影像竄改偵測與還原 20
2-1 影像前處理 21
2-2 區塊對應 22
2-3 產生還原資訊及驗證訊號 24
2-4 嵌入位置 27
第三節 嵌入流程 31
第四節 竄改偵測與影像還原 34
第五節 實驗分析 39
第六節 結論與討論 56
第肆章 結論及未來研究 57
第一節 結論 57
第二節 未來研究建議 57
參考文獻 59

[1]A. Z. Tirkel, G. Rankin, R. Van Schyndel, W. Ho, N. Mee, and C. F. Osborne, "Electronic watermark," Digital Image Computing, Technology and Applications (DICTA’93), pp. 666-673, 1993.
[2]S. P. Mohanty, "Digital watermarking: A tutorial review," http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf, 1999.
[3]S.P.Mohanty, et al., ”A Dual Watermarking Technique for Images”, Proc. 7th ACM International Multimedia Conference, ACM-MM’99, Part 2, pp. 49-51, Orlando, USA, Oct. 1999.
[4]Kundur, D., Hatzinakos, D.: ‘Digital watermarking for telltale tamperproofing and authentication’, Proc. IEEE, 1999, 87, (7), pp. 1167–1180
[5]Lu, H.-T., Shen, R.-M., Chung, F.-L.: ‘Fragile watermarking scheme forimage authentication’, Electron. Lett., 2003, 39, (12), pp. 898–900
[6]He, H.-J., Zhang, J.-S., Chen, F.: ‘Adjacent-block based statisticaldetection method for self-embedding watermarking techniques’, Signal Process., 2009, 89, (8), pp. 1557–1566
[7]I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, 1997.
[8]V. Guzman, M. N. Miyatake, and H. M. P. Meana, "Analysis of a wavelet-based watermarking algorithm," in Electronics, Communications and Computers, 2004. CONIELECOMP 2004. 14th International Conference on, 2004, pp. 283-287.
[9]A. Pomerleau, "A real-data FFT algorithm for image processing applications," Canadian Electrical Engineering Journal, vol. 8, pp. 65-72, 1983.
[10]M. C. Hernández, M. N. Miyatake, and H. P. Meana, "Analysis of a DFT-based watermarking algorithm," in Electrical and Electronics Engineering, 2005 2nd International Conference on, 2005, pp. 44-47.
[11]S. Katzenbeisser and F. Petitolas, "Information hiding techniques for steganography and digital watermaking," DNA, vol. 28, 2004.
[12]呂慈純, "The Study of Information Hiding Mechanisms",朝陽科技大學,2007,pp. 2.
[13]N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE computer, vol. 31, pp. 26-34, 1998.
[14]王韻慈,"淺談近代造紙工藝變革對鈔券印刷之影響"。Available: http://www.cepp.gov.tw/TheFiles/publication/d3ae435a-9a12-42bc-8d92-92898b1e7caf.pdf
[15]鈔票浮水印, Available: http://mypaper.pchome.com.tw/ycamptw/post/1320218922
[16]Lin, P.-L., Hsieh, C.-K., Huang, P.-W.: ‘A hierarchical digital watermarking method for image tamper detection and recovery’, Pattern Recognit., 2005, 38, pp. 2519–2529
[17]N. Lazarov and Z. Ilcheva, "A fragile watermarking algorithm for image tamper detection based on chaotic maps," in 2016 IEEE 8th International Conference on Intelligent Systems (IS), 2016, pp. 723-728.
[18]K. C. Liu, "Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique," IET Image Processing, vol. 8, pp. 363-372, 2014.
[19]Tsai, W.-H.: ‘Moment-preserving thresholding: a new approach’, Comput. Vis. Graph. Image Process., 1985, 29, pp. 377–393
[20]N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE computer, vol. 31, pp. 26-34, 1998.
[21]詹永寬,"光與色彩"。Available: web.nchu.edu.tw/pweb/users/ykchan/lesson/9079.ppt
[22]張家寧與蔡文祥, "普遍化「富含信號藝術」編碼影像 ─ 一種可做有效率低扭曲資料傳輸的新媒體型態",國立交通大學機構典藏,2015,pp. 35-36.
[23]國立中央大學,"人類知覺系統"。Available: http://ip.csie.ncu.edu.tw/course/VR/VR1102p.pdf
[24]YUV , Available: https://en.wikipedia.org/wiki/YUV
[25]24 , Available: https://en.wikipedia.org/wiki/Taxicab_geometry
[26]N. Lazarov and Z. Ilcheva, "A fragile watermarking algorithm for image tamper detection based on chaotic maps," in 2016 IEEE 8th International Conference on Intelligent Systems (IS), 2016, pp. 723-728.
[27]Chaotic maps , Available: https://en.wikipedia.org/wiki/List_of_chaotic_maps
[28]Arnold's cat map - Wikipedia, Available: https://en.wikipedia.org/wiki/Arnold%27s_cat_map
[29]Arnold's cat map – Jason Davies , Available: https://www.jasondavies.com/catmap/
[30]Cat map , Available: http://www.chaos.umd.edu/misc/catmap.html
[31]C.-K. Chan and L.-M. Cheng, "Hiding data in images by simple LSB substitution," Pattern recognition, vol. 37, pp. 469-474, 2004.
[32]Digital Image Processing, 3rd Edition, Gonzalez and Woods, Prentice Hall, 2008. [2nd Edition , 2002] 【中譯本:[2051A3] 數位影像處理,繆紹綱 譯,高立圖書,2009 】

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top