跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.102) 您好!臺灣時間:2025/12/04 10:00
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:張潤杰
研究生(外文):Jun-Chieh Chang
論文名稱:應用影像顯著特徵於強韌型浮水印技術之研究
論文名稱(外文):A Study of Applying Image Significant Features to Robust Watermarking Techniques
指導教授:吳憲珠陳牧言陳牧言引用關係
學位類別:碩士
校院名稱:臺中技術學院
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:56
中文關鍵詞:強韌型浮水印幾何攻擊角偵測奇異值分解粒子群演算法
外文關鍵詞:Robust watermarkingGeometric attackCorner detectorSingular value decompositionParticle swarm optimization
相關次數:
  • 被引用被引用:0
  • 點閱點閱:346
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在現今的數位生活中,數位浮水印技術已經廣泛被人們使用於版權保護上。數位浮水印技術的做法,是將一些特定的數位訊號嵌入在受保護的媒體中,受保護的媒體可以是影片、聲音、圖片等。在取出時,使用者利用相同的演算法,將浮水印資訊取出,如此一來就可以證明受保護媒體的合法擁有者。而為了達到有效的版權保護,在嵌入演算法上面必須達到強韌性,即是保護影像受到各種攻擊的狀況下,仍然能從攻擊過後的保護圖片,取出嵌入的浮水印,進一步證明版權的擁有者。
本論文針對影像中顯著的特徵在空間域和轉換域裡提出兩種強韌性浮水印技術。在第三章提出一個在空間域裡可抵抗幾何攻擊的強韌型浮水印技術。主要使用角偵測方法尋找出來被保護影像中重要的邊緣特徵。這些邊緣特徵,通常在圖像中都是強韌度較高,不容易遭受到破壞。因此即使再經過旋轉、放大、幾何攻擊,邊緣特徵位置還是可藉由角偵測方式順利取出。由於這些邊緣特徵都是藉由角偵測方式選取,即使經過幾何攻擊後,依然可以順利的取出嵌入資訊。
在第四章提出一個植基於奇異值分解(Singular Value Decomposition , SVD)及粒子群演算法(Particle Swarm Optimization, PSO)之有效強韌型浮水印方法。主要是透過轉換域下的奇異值分解來擷取保護影像中重要的特徵,再利用粒子群演算法去修改這些重要特徵係數,來達到嵌入浮水印的目地。由於SVD的特徵值矩陣,在經過遞移、轉置、旋轉攻擊等,都可以維持不變,因此藉由SVD的特性,所提出的浮水印技術是具備有強韌性。最後從實驗結果可以清楚了解本論文提出嵌入浮水印技術,對於抵抗攻擊是有效的。


Nowadays, our life is full of the digital technologies, and the digital watermarking has been used for copyright protection widely. The methods of digital watermarking technique are to embed the specific signal in the host media that we want to protect. The media could be video, voice or image…etc. In extraction procedure, users use the algorithm which same as what provider embedded in to extract the watermark information. Therefore, users can prove the legal ownership by utilizing the watermark information. To achieve workable copyright protection, have to keep the embedded algorithm robust enough. That is, users can still extract the watermark information to provide the legal ownership even the media had been attacked or affected under any circumstance.
This thesis presents two robust watermarking schemes in the spatial domain and transform domain according to the image signification features. In Chapter 3, a robust watermarking scheme that resisting geometric attack is proposed. The major method uses the corner detection to find the important edge features from the host protected image. These edge features usually are more robust and not being damaged easily. Therefore, the location information of edge features still can be recovered even the image has been rotated, scaled, and geometric attacked. Since these edge features are selected by corner detection, the embedded information can still be extracted under the geometric attack. Since these edge features are selected by corner detection, the embedded information can still be extracted under the geometric attack.
In Chapter 4, an effective robust watermarking scheme which based on singular value decomposition (SVD) and particle swarm optimization (PSO) is proposed. The core idea aims at the transform domain method which is the singular value decomposition. The SVD can extract important feature of protected image and then we use PSO algorithm to modify the singular values for embedding. Because the singular value matrix of SVD remains unchanged via translation attack, transpose attack, rotation attack, and the proposed watermarking technique is robust based on the properties of SVD. Finally, we clearly demonstrate that the watermarking technique to against attacks is workable. Besides, does not need to record the extra information because of the quantization method.


Contents
Abstract in Chinese I
Abstract in English III
Contents VII
List of Tables X
List of Figures XI
Chapter 1 Introduction 1
1.1 Background 1
1.2 Image Watermarking 2
1.3 Research Motivation 5
1.4 Thesis Organization 7
Chapter 2 Preliminaries 8
2.1 Harris Corner Detector 8
2.2 Sobel Edge Detection 10
2.3 Singular Value Decomposition (SVD) 11
2.4 Particle Swarm Optimization (PSO) 12
2.5 Robust Watermarking Schemes 14
2.5.1 A Feature-Based Robust Digital Image Watermarking Against Geometric Attacks 14
2.5.1.1 Watermarking Embedding Algorithm 15
2.5.1.2 Watermarking detection Algorithm 15
2.5.2 A New Robust Reference Watermarking Scheme Based on DWT-SVD 16
2.5.2.1 Watermarking Embedding Process 16
2.5.2.2 Watermarking Extraction Process 17
Chapter 3 A Robust Watermarking Using Harris Corner Detector and Quantization Technique 19
3.1 The Proposed Scheme 19
3.2 Preprocessing 20
3.3 Watermarking Embedding Algorithm 21
3.4 Watermarking Extraction Algorithm 25
3.5 Experimental Results and Discussions 26
3.5.1 Performance Analysis 27
Chapter 4 A Robust Watermarking Scheme based on Singular Value Decomposition and Particle Swarm Optimization Algorithm 32
4.1 The Proposed Scheme 32
4.2 Watermarking Embedding Algorithm 33
4.3 Modification Optimized Range of Embedding 37
4.4 Watermarking Extraction Algorithm 39
4.5 Experimental Results and Discussions 40
4.5.1 Performance Analysis 41
4.5.2 Comparisons with Existing Techniques 49
Chapter 5 Conclusions and Future Works 51
5.1 Conclusions 51
5.2 Future Works 52
Reference 53



[1] M. Alghoniemy and A. H. Tewfik, “Geometric invariance in image watermarking,” IEEE Transactions on Image Processing, Vol. 13, No. 2, 2004, pp. 145-153.
[2] M. Barni, F. Bartolinni and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, Vol. 10, No. 5, 2001, pp. 783-791.
[3] P. Bas, J. M. Chassery and B. Macq, “ Geometrically invariant watermarking using feature points,” IEEE Transactions on Image Processing, Vol. 11, No. 9, 2002, pp. 1014-1028.
[4] G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD,” Computer Standards and Interfaces, Vol. 31, No. 5, 2009, pp. 1002-1013.
[5] C. C. Chang, P. Y. Tsai and M. H. Lin, “SVD-based digital image watermarking scheme,” Pattern Recognition Letters, Vol. 26, No. 10, 2005, pp. 1577-1586.
[6] W. C. Chu, “DCT-based image watermarking using subsampling,” IEEE Transactions on Multimedia, Vol. 5, No. 1, 2003, pp. 34-38.
[7] D. Delannay and B. Macq, “Generalized 2-D cyclic patterns for secret watermark generation,’’ IEEE International Conference on Image Processing, Vol. 2, 2000, pp. 77-79.
[8] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, Vol. 8, No. 1, 1999, pp. 58-68.
[9] J. Kenndy and R. C. Eberhart, “Particle swarm optimization ,” IEEE Internation Conference on Neural Networks, Vol. 4, 1995, pp.1942-1948.
[10] H. S. Kim, and H. K. Lee, “Invariant image watermark using Zernike moment ,” IEEE Transaction Circuits and System for Video Technology, Vol. 13, No. 8, 2003, pp. 766-775.
[11] G. C. Langelaar and R. L. Lagendijk, “Optimal differential energy watermarking of DCT encoded images and video,” IEEE Transactions on Image Processing, Vol. 10, No. 1, 2001, pp. 148-158.
[12] H. Y. Lee, H.S. Kim and H.K. Lee “Robust image watermarking using local invariant feature,” Optical Engineering, Vol. 45, No. 3, 2006, pp. 0370021-0370031.
[13] L. D. Li and B. L. Guo, “Localized image watermarking in spatial domain resistant to geometric attacks,” International Journal of Electronics and Communications, Vol. 63, No. 2, 2009, pp. 123-131.
[14] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller and Y. M. Lui, “Rotation, scale and translation resilient watermarking for images,” IEEE Transactions on Image Processing, Vol. 10, No. 5, 2001, pp. 767-782.
[15] R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, Vol. 4, No. 1, 2002, pp. 121-128.
[16] A. A. Mohammad, A. Alhaj and S. Shaltaf, “An improved SVD-based watermarking scheme for protecting rightful ownership,” Signal Processing, Vol. 88, No. 9, 2008, pp. 2158-2180.
[17] B. C. Mohan and S. S. Kumar, “A robust image watermarking scheme using singular value decomposition,” Journal of Multimedia, Vol. 3, No. 1, 2008, pp.7-15.
[18] J. O''Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, Vol. 66, No. 3, 1998, pp. 303-317.
[19] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information hiding – a survey,” Proceedings of the IEEE, Vol. 87, No. 7,1999, pp. 1062-1078.
[20] A. A. Reddy and B. N. Chatterji, “Hidden digital watermarks in images,” Pattern Recognition Letters, Vol. 26, No. 7, 2005, pp. 1019-1027.
[21] Shi. Y. and R. C. Eberhart, “A modified particle swarm optimizer,” IEEE International Conference on Evolutionary Programming, 1998, pp. 69-73.
[22] C.W. Tang and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Transactions Signal Processing, Vol. 11, No. 9, 2003, pp. 950-959.
[23] S. H. Wang and Y. P. Lin, “Wavelet tree quantization for copy protection watermarking,” IEEE Transactions on Image Processing, Vol. 13, No. 2, 2004, pp. 154-165.
[24] X. Y. Wang, L. M. Hou and Y. P. Lin, “A feature-based robust digital image watermarking against geometric attacks,” Image and Vision Computing, Vol. 26, No. 7, 2008, pp. 980-989.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 陳愛娥,行政院版行政罰法草案關於處罰對象之規定方式的檢討,月旦法學雜誌,第111期,2004年8月,頁41。
2. 簡祥紋,法人格否定論之初探-兼論揭開公司面紗原則,法令月刊,第57卷,第3期,頁25-29。
3. 簡祥紋,法人格否定論之初探-兼論揭開公司面紗原則,法令月刊,第57卷,第3期,頁25-29。
4. 陳愛娥,行政院版行政罰法草案關於處罰對象之規定方式的檢討,月旦法學雜誌,第111期,2004年8月,頁41。
5. 陳愛娥,行政院版行政罰法草案關於處罰對象之規定方式的檢討,月旦法學雜誌,第111期,2004年8月,頁41。
6. 陳愛娥,行政院版行政罰法草案關於處罰對象之規定方式的檢討,月旦法學雜誌,第111期,2004年8月,頁41。
7. 陳清秀,行政罰實務問題之研討(上)-以行政罰為中心,月旦法學雜誌,157期,2008年6月,頁147-152。
8. 簡祥紋,法人格否定論之初探-兼論揭開公司面紗原則,法令月刊,第57卷,第3期,頁25-29。
9. 陳清秀,行政罰實務問題之研討(上)-以行政罰為中心,月旦法學雜誌,157期,2008年6月,頁147-152。
10. 陳清秀,行政罰實務問題之研討(上)-以行政罰為中心,月旦法學雜誌,157期,2008年6月,頁147-152。
11. 陳清秀,行政罰實務問題之研討(上)-以行政罰為中心,月旦法學雜誌,157期,2008年6月,頁147-152。
12. 陳文貴,從行政罰法看行政不法與刑事不法之交錯,法令月刊,第五十八卷第11期,頁44。
13. 陳文貴,從行政罰法看行政不法與刑事不法之交錯,法令月刊,第五十八卷第11期,頁44。
14. 陳文貴,從行政罰法看行政不法與刑事不法之交錯,法令月刊,第五十八卷第11期,頁44。
15. 陳文貴,從行政罰法看行政不法與刑事不法之交錯,法令月刊,第五十八卷第11期,頁44。