跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.110) 您好!臺灣時間:2026/05/05 22:42
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:邱彥中
研究生(外文):Yen-Chung Chiu
論文名稱:利用數位浮水印與影像驗證作影像版權保護及竄改偵測之研究
論文名稱(外文):A Study on Digital Watermarking and Authentication of Images for Copyright Protection And Tampering Detection
指導教授:蔡文祥蔡文祥引用關係
指導教授(外文):Wen-Hsiang Tsai
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:106
中文關鍵詞:數位浮水印彩色影像版權保護旋轉縮放列印和掃描的操作裁切線移除離散餘弦轉換離散富利葉轉換係數峰值同步峰值離散餘弦係數關係比較檢驗碼竄改偵測影像驗證免影像特徵資料半易碎浮水印
外文關鍵詞:digital watermarkingcolor imagecopyright protectionrotationscalingprint-and-scan operationscroppingline-removaldiscrest cosine transformdiscrete Fourier transformcoefficient-value peakssynchronization peakDCT-coefficient relationship comparisonverification codetampering detectionimage authenticationsignature-freesemi-fragile watermark
相關次數:
  • 被引用被引用:0
  • 點閱點閱:213
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
由於數位科技的進步,數位影像可能會被非法複製,甚至是竄改。因此,發展數位影像版權保護的方法是很重要的課題。在本論文中,針對這個目的,我們提出了數種數位浮水印的技術。數位浮水印必須具有強韌性來抵抗非法使用者對影像的各種操作。針對彩色影像,我們提出了四種方法分別來抵抗不同的攻擊。首先,利用在離散富利葉轉換頻域上產生環狀和對稱的峰值來抵抗旋轉和縮放的攻擊。第二,應用離散富利葉轉換和離散餘弦轉換兩個頻域來抵抗旋轉和裁切的攻擊。第三,我們提出了一種在離散富利葉轉換頻域上,利用一個組合函數來對峰值位置作編碼,此方法可用來抵抗影像列印和再掃描成數位影像的操作。第四,是利用一種重新縮放影像的技術來抵抗縮放和行列移除的攻擊。最後,我們也提出一種彩色影像驗證的方法,來證明影像的真實性和完整性。藉由檢查藏入影像中的驗證信號,我們可以指出影像被竄改之處。利用藏入驗證信號來作影像驗證的方法,可以不用另外存有一個影像特徵資料。相關的實驗結果證明所提方法是可行性的。
Due to the advance of digital techniques, digital images may be copied or tampered with illegally. Therefore, it is important to develop methods to protect the copyright of digital images and verify their integrity. In this study, digital watermarking techniques for such purposes are proposed. In addition, the watermark must have an ability of robustness because users may apply various operations on a watermarked image. For color images, four methods are proposed to handle different attacks. First, a method based on creating peaks circularly and symmetrically in the DFT domain is proposed to resist rotation and scaling attacks. Second, a watermarking method utilizing the DFT and DCT domains is proposed to survive rotation and cropping attacks. Third, a method based on coding peaks by a combinatorial function in the DFT domain is proposed to work against print-and-scan operations. Fourth, a method based on an image rescaling technique is proposed to resist scaling and line-removal attacks. Finally, an authentication method for verifying the fidelity and integrity of color images is also proposed, which uses a key to generate authentication signals randomly. By checking authentication signals in an image, tampered parts can be pointed out. Such authentication signals can be used to conduct the authentication work without using other signature data. Good experimental results prove the feasibility of the proposed methods.
ABSTRACT (in Chinese) i
ABSTRACT (in English) ii
ACKNOWLEDGEMENTS iii
CONTENTS iv
LIST OF FIGURES vii
LIST OF TABLES x

Chapter 1 Introduction 1
1.1 Motivation 1
1.2 Review of Related Works 2
1.2.1 Digital Watermarking against Geometric Attacks 2
1.2.2 Digital Watermarking against Print-And-Scan Attacks 3
1.2.3 Digital Image Authentication 4
1.3 Overview of Proposed Methods 4
1.3.1 Definitions of Terms 4
1.3.2 Brief Descriptions of Proposed Methods 5
1.4 Thesis Organization 11
Chapter 2 Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Peak Detection and Synchronization in DFT Domain 13
2.1 Introduction 13
2.2 Ideas of Proposed Method 14
2.2.1 Properties of Coefficients in the DFT Domain 14
2.2.2 Properties of Color Channels 16
2.2.3 Proposed Technique for Coding Peak Locations for Watermarking 17
2.2.4 Proposed Technique for Synchronizing Peak Locations for Protection against Rotation and Scaling Attacks 19
2.3 Watermark Embedding Process 20
2.3.1 Embedding of Watermarks 20
2.3.2 Detailed Algorithm 21
2.4 Watermark Extraction Process 24
2.4.1 Extraction of Watermarks 24
2.4.2 Detailed Algorithm 25
2.5 Experimental Results 28
2.6 Discussions And Summary 32
Chapter 3 Copyright Protection by Watermarking for Color Images against Rotation And Cropping Attacks Using Synchronization of Peak Locations in DFT Domain And Coefficient Relationship Comparison in DCT Domain 34
3.1 Introduction 35
3.1.1 Problem Definition 35
3.1.2 Review of Employed Techniques 36
3.2 Ideas of Proposed Method 37
3.2.1 Proposed Technique for Multiply Embedding Watermark in DCT domain for Preventing Cropping Attack 38
3.2.2 Proposed Technique for Hiding Verification Code in DCT Domain for Watermark Existence Check 39
3.2.3 Proposed Technique for Hiding Synchronization Peak in DFT Domain to Detect Rotated Angle 40
3.3 Watermark Embedding Process 40
3.3.1 Embedding of Watermarks 41
3.3.2 Detailed Algorithm 42
3.4 Watermark Extraction Process 43
3.4.1 Extraction of Watermarks 43
3.4.2 Detailed Algorithm 45
3.5 Experimental Results 48
3.6 Discussions And Summary 51
Chapter 4 Copyright Protection by Watermarking for Color Images against Print-and-Scan Operations Using Coding and Synchronization of Peak Locations in DFT Domain 53
4.1 Introduction 53
4.1.1 Properties of Images Applied Print-and-Scan Operations 54
4.1.2 Problem Definition 54
4.2 Ideas of Proposed Method 55
4.2.1 Proposed Technique for Coding Peak Locations for Watermarking 55
4.2.2 Proposed Technique for Automatically Adjusting Threshold Value for Extracting Watermark 56
4.3 Watermark Embedding Process 57
4.3.1 Embedding of Watermarks 57
4.3.2 Detailed Algorithm 58
4.4 Watermark Extraction Process 59
4.4.1 Extraction of Watermarks 61
4.4.2 Detailed Algorithm 62
4.5 Experimental Results 63
4.6 Discussions And Summary 67
Chapter 5 Copyright Protection by Watermarking for Color Images against Scaling And Line-Removal Attacks Using An Image Rescaling Technique 69
5.1 Introduction 69
5.1.1 Review of Employed Techniques 70
5.1.2 Problem Definition 70
5.2 Brief Description of Proposed Idea for Rescaling Technique 71
5.3 Watermark Embedding Process 72
5.3.1 Embedding of Watermarks 72
5.3.2 Detailed Algorithm 73
5.4 Watermark Extraction Process 75
5.4.1 Extraction of Watermarks 75
5.4.2 Detailed Algorithm 75
5.5 Experimental Results 79
5.6 Discussions And Summary 84
Chapter 6 Tampering Detection in Color Images by Signature-Free Authentication Using DCT-Coefficient Relationship Comparison 85
6.1 Introduction 85
6.1.1 Motivation 86
6.1.2 Problem Definition 86
6.2 Proposed Authentication Method 86
6.2.1 Semi-Fragile Watermark Embedding Process 87
6.2.2 Image Authentication Process 89
6.3 Experimental Results 92
6.4 Discussions And Summary 97
Chapter 7 Conclusions and Suggestions for Future Works 99
7.1 Conclusions 99
7.2 Suggestions for Future Works 102
References 103
[1] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 86-90, 1994.
[2] G. Voyatzis and I. Pitas, “Applications of total automorphisms in image watermarking,” Proceedings of IEEE International Conference on Image Processing (ICIP’96), Lausanne, Switzerland, Vol. 2, pp. 237-240, September 16-19, 1996.
[3] J. Fridrich, “Robust bit extraction form images,” Proceedings of IEEE ICMCS’99 Conference, Florence, Italy, June 7-11, 1999.
[4] W. Bender, N. Morimoto, and D. Gruhl, “Method and apparatus for data hiding in images,” U. S. Patent, No. 5689587, 1997.
[5] C. Y. Yin and W. H. Tsai, “Copyright and annotation protection in digital museums by using data hiding, watermarking, and image authentication techniques,” M. S. Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, Republic of China, June 2001.
[6] N. Chotikakamthorn and S. Pholsomboon, “Ring-shaped digital watermark for rotated and scaled images using random-phase sinusoidal function,” Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology, Singapore, Vol. 1, pp. 321-325, August 19-22, 2001.
[7] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, Vol. 6, no. 12, pp. 1673-1687, 1997.
[8] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, Vol. 66, pp. 357-372, 1998.
[9] C. T. Hsu and J. L. Wu, "DCT-Based watermarking for video," IEEE Transactions on Image Processing, Vol. 8, pp. 58-68, 1999.
[10] S. D. lin and C. F. Chen, “A Robust DCT-Based Watermarking for copyright Protection,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415-421, August 2000.
[11] J. J. K. O'Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” Proceedings of IEEE International Conference on Image Processing, Santa Barbara, CA USA, Vol. 1, pp. 536-539, Oct. 26-29, 1997.
[12] M. Wu and M. L. Miller, J. A. Bloom, and I. J. Cox, “A rotation, scale and translation resilient public watermark,” Proceedings of 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, Phoenix, AZ USA, Vol. 4, pp. 2065, March 15-19, 1999.
[13] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y.M. Lui, “Rotation, scale, and translation resilient watermarking for images,” IEEE Transactions on Image Processing, Vol. 10, Issue 5, pp. 767-782, May 2001.
[14] D. J. Fleet and D. J. Heeger, “Embedding invisible information in color images,” Proceedings of IEEE International Conference on Image Processing, Santa Barbara, CA USA, Vol. 1, pp. 532-535, Oct. 26-29, 1997.
[15] V. Solachidis and L. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” IEEE Transactions on Image Processing, Vol. 10, Issue 11, pp. 1741-1753, Nov. 2001.
[16] P. C. Su and C. C. Kuo, “An Image Watermarking Scheme to Resist Generalized Geometrical Transformations,” Proceedings of SPIE Conference on Multimedia Systems and Applications III, Boston, Massachusetts, Vol. 4209, pp. 354-365, November 5-8, 2000.
[17] F. Lefebvre, A. Gueluy, D. Delannay, and B. Macq, “A print and scan optimized watermarking scheme,” Proceedings of 2001 IEEE Fourth Workshop on Multimedia Signal Processing, Cannes, France, pp. 511-516, Oct. 3-5, 2001.
[18] M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. IEEE International Conference on Image Processing, Vol. II, 1997, pp. 680-683.
[19] J. Fridrich, “Image watermarking for tamper detection,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 404-408, 1998.
[20] P. W. Wong, “A public key watermark for image verification and authentication,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 455-459, 1998.
[21] D. C. Wu and W. H. Tsai, “Embedding of any type of data in images based on a human visual model and multiple-based number conversion,” Pattern Recognition Letter, Vol. 20, pp. 1511-1517, 1999.
[22] M. Wu and B. Liu, “Watermarking for image authentication,” Proceedings of IEEE International Conference on Image Processing, Chicago, Illinois, Vol. 2, pp. 437-441, October 1998.
[23] Y. J. Cheng and W. H. Tsai, “Copyright and Integrity Protection for Images by Removable Visible Watermarking Techniques,” M. S. Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, Republic of China, June 2002.
[24] http://www.ph.tn.tudelft.nl/Courses/FIP/noframes/fip-Properti-2.html, Properties of Fourier Transforms.
[25] A. Navarro and J. Tavares, “Joint Source-Channel PCM Image Coding for Binary Symmetric Channels”, Proceeding of International Conference on Signal Processing Applications and Technology, Orlando-USA, 1999.
[26] J. O'Ruanaidh, W. J. Dowling, and F. M. Boland, “Phase watermarking of digital images,” Proceeding of ICIP’96, Lausanne, Switzerland, vol. 3, pp. 239–242, Sept. 1996.
[27] R.C. Gonzalez and R. E. Woods, “Digital Image Processing,” second edition, pp. 155, 2002.
[28] C. Y. Lin and S. F. Chang, “Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process,” Proceeding of International Symposium on Multimedia Information Processing (ISMIP), Taipei, Taiwan, Dec. 1999.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top