(3.239.56.184) 您好!臺灣時間:2021/05/13 12:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:葉志強
研究生(外文):Jyh-Chiang Yeh
論文名稱:數位影像智慧財產權保護技術之研究
論文名稱(外文):The Study of Copyright Protection Schemes for Digital Images
指導教授:張真誠張真誠引用關係
指導教授(外文):Chin-Chen Chang
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2001
畢業學年度:89
語文別:英文
論文頁數:37
中文關鍵詞:數位浮水印數位餘弦轉換視覺密碼學智慧財產權
外文關鍵詞:Digital WatermarkingDiscrete Cosine TransformVisual CryptographyIntellectual Property Right
相關次數:
  • 被引用被引用:0
  • 點閱點閱:116
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
近年來由於網路上數位多媒體資訊傳輸的蓬勃發展,攸關影像、音樂以及視訊等傳輸媒介的智慧財產權保護問題於是越來越受到重視。在此篇論文中,我們提出兩個適用於數位影像智慧財產權保護的新方法。在第一個方法中,我們以數位餘弦轉換為基礎透過從灰階影像中萃取出來的重要特性以及一個用來識別此灰階影像所有權的浮水印之結合來達到影像智慧財產權保護的目的,而不是真的把浮水印藏入灰階影像中。除此之外,我們也提出另一個植基於視覺密碼學和數位餘弦轉換適用在彩色影像著作權保護的方法。在第二個方法中,我們首先利用數位餘弦轉換。從彩色影像上取得影像特徵。並且利用一個用來當作著作權識別的彩色浮水印,來產生一著作權秘密金鑰。將來透過利用視覺密碼學的疊和技術,可以從彩色影像上取得的影像特徵以及著作權之秘密金鑰,重現用來識別著作權的彩色浮水印。根據我們的實驗結果,證明了這兩個方法的強韌性是經得起一般影像處理方法的攻擊。

Due to the recent growth of digital multimedia transmissions on the network, the need for the intellectual property right protection of information processed via multimedia, like images, music, and videos, has become more and more important than before. In this thesis, we propose two novel schemes for intellectual property right protection of digital images. In the first scheme, a DCT-based method for casting a binary watermark into a gray-scale image to identify the ownership of the image is described. Instead of actually hiding a watermark in a gray-scale image, we merely combine the vital features extracted from the gray-scale image with the binary watermark to be cast for achieving the purpose of copyright protection. In the second scheme, another copyright protection scheme based on visual cryptography and discrete cosine transform for color images is discussed. In this method, all we need to do is construct an ownership share according to a master share created from the color image by applying discrete cosine transform plus a color watermark used for copyright certification. By stacking the master share and the ownership share together, the watermark for ownership identification can be revealed through the utilization of visual cryptography. With substantial experimental results, the robustness of our schemes can be demonstrated upon various image processing.

Contents
Abstract (in Chinese)…………………………………………………………………i
Abstract (in English)…………………………………………………………………ii
Acknowledgment……………………………………………………………iv
List of Figures………………………………………………………………………v
List of Tables………………………………………………………………………vii
Contents……………………………………………………………………………viii
Chapter 1 Introduction…………………………………………………1
1.1 Motivation……………………………………………………………………1
1.2 A Survey of Related Research…………………………………………………2
1.3 Thesis Organization……………………………………………………………3
Chapter 2 A Method for Protecting Digital Images from Being Copied Illegally…………………………………………4
2.1 Discrete Cosine Transform……………………………………………………5
2.2 The Proposed Scheme…………………………………………………………6
2.2.1 Secret Key Generation…………………………………………………7
2.2.2 Watermark Revelation…………………………………………………8
2.3 Experimental Results…………………………………………………………12
Chapter 3 A Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform…………20
3.1 Visual Cryptography…………………………………………………………21
3.2 The Proposed Scheme………………………………………………………21
3.2.1 Ownership Share Construction…………………………………………22
3.2.2 Watermark Revelation…………………………………………………27
3.3 Experimental Results………………………………………………………….28
Chapter 4 Conclusions…………………………………………………34
References………………………………………………………………36

[1]W. Bender, D. Gruhl, N. Morimoto and A. Liu, "Techniques for Data Hiding," IBM System Journal, vol. 35, 1996, pp. 313-336.
[2]A. G. Bors and I. Pitas, "Image Watermarking Using DCT Domain Constraints," Proceedings of 1996 IEEE International Conference on Image Processing (ICIP'96), vol. 3, September 1996, pp. 231-234.
[3]C. Blundo, A. De Santis and M. Naor, "Visual Cryptography for Grey Level Images," Information Processing Letters, vol. 75, no. 6, May 2000, pp. 255-259.
[4]C. C. Chang, K. F. Hwang and M. S. Hwang, "A Watermarking Technique Based on One-way Hash Functions," IEEE Transactions on Consumer Electronics, vol. 45, no. 2, May 1999, pp. 286-294.
[5]C. C. Chang, K. F. Hwang and M. S. Hwang, "A Block Based Digital Watermarks for Copy Protection of Images," Proceedings of APCC/OECC'99, Beijing, vol. 2, October 1999, pp. 977-980.
[6]C. C. Chang and H. C. Wu, "Computing Watermarks from Images Using Quadtrees," Proceedings of The Second International Workshop on Multimedia Network Systems, Japan, July 2000, pp. 123-128.
[7]C. C. Chang, C. S. Tsai and T. C. Chen, "A Technique for Computing Watermarks from Digital Images," to appear in Journal of Informatica, 2000.
[8]S. Craver, N. Memon, B. L. Yeo and M. M. Yeung, "Resolving Ownerships with Invisible Watermarking Technique: Limitations, Attacks, and Implication," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998, pp. 573-586.
[9]C. T. Hsu and J. L. Wu, "Hidden Digital Watermarks in Images," IEEE Transactions on Image Processing, vol. 8, no. 1, January 1999, pp. 58-68.
[10]M. Kutter, F. Jordan and F. Bossen, "Digital Watermarking of Color Images Using Amplitude Modulation," Journal of Electronic Imaging, vol. 7, no. 2, April 1998, pp. 326-332.
[11]N. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptography: Eurocryp'94, Springer-Verlag, Berlin, 1995, pp. 1-12.
[12]X. M. Niu, Z. M. Lu and S. H. Sun, "Digital Watermarking of Still Images with Gray-level Digital Watermarks," IEEE Transactions on Consumer Electronics, vol. 461, February 2000, pp. 137 -145.
[13]M. O. Rabin, "Digitalized Signatures and Public-key Functions as Intractable as Factorization," Technical Report MIT/LCS/TR212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass., January 1979.
[14]K. R. Rao and P. Yip, Discrete Cosine Transform - Algorithms, Advantages, Applications, Academic Press, 1990.
[15]G. Voyatzis and I. Pitas, "Protection Digital Image Copyrights: A Framework," IEEE Computer Graphics and Applications, vol. 1, 1999, pp. 18-24.
[16]K. K. Wong, C. H. Tse, K. S. Ng, T. H. Lee and L. M. Cheng, "Adaptive Watermarking," IEEE Transactions on Consumer Electronics, vol. 43, no. 4, November 1997, pp. 1003-1009.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔