跳到主要內容

臺灣博碩士論文加值系統

(34.204.181.91) 您好!臺灣時間:2023/09/28 09:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:徐紹文
研究生(外文):S.W. Hsu
論文名稱:條碼化數位浮水印之演算法設計
論文名稱(外文):Adaptive Algorithms for Bar Code-based Watermarking
指導教授:雷欽隆雷欽隆引用關係
指導教授(外文):Lei , Chin-Laung
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:電機工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2001
畢業學年度:89
語文別:中文
論文頁數:66
中文關鍵詞:數位浮水印條碼資訊隱藏著作權保護
外文關鍵詞:Digital WatermarkBar CodeInformation HidingCopyright Protection
相關次數:
  • 被引用被引用:1
  • 點閱點閱:358
  • 評分評分:
  • 下載下載:31
  • 收藏至我的研究室書目清單書目收藏:0
電腦網路的普及化,數位資料的運用及管理益顯重要。其中,著作權的維護與判別,更是課不容緩的議題。浮水印技術對於多媒體的資訊隱藏,一直是個不錯且實用的解決管道。它不僅可適當保有原貌,同時可嵌入版權宣告。對於合法的使用者及資料擁有者來說,都可獲致一定程度的保障。在本篇論文中,我們針對靜態影像,利用圖點間的關聯性與灰階編碼,提出一套結合條碼系統的演算法。除了毋須藉由任何輔助,取出隱藏的條碼資料,作為線上即時的判讀應用外,另提供完全彈性的獨立浮水印切割模式,可同時套用不同函數,以防止各式惡意的攻擊和破壞,作為法律上著作權的鑑定之用。而基於條碼的特色與簡易的開放式演算法設計,若沿用現有的登錄體制,並增設相關的產品類別編碼,對於網路上的影像使用與電子商務應用,將有著很大的幫助及便利。
Base on Internet and computer generalization, it is more important for digital information usage and management, especially for protection of copyright. Watermarking is the one of practical solutions. It not only hides data imperceptibly, but also supports security. Both legal user and owner can acquire well indemnification. In the thesis, we offer bar code-based algorithms and gray-scale coding to approach still-image watermark. It is easy and flexible to embed/extract watermark without any adjuncts, and resists different attack with specific functions. With bar code system and open algorithm, it will be convenient for e-commerce and image application
第1章 概論1
1-1目的與預期成果1
1-2假設與限制2
1-3論文特色2
1-4系統方塊圖3
1-5論文結構3
第2章 相關的基礎理論5
2-1數位浮水印的介紹5
2-2可能的攻擊模式7
2-3常見的數位浮水印技巧10
2-4系統的安全性探討14
2-5評估標準(Benchmark)項目15
第3章 演算法設計17
3-1理論與構想17
3-2符號與標示定義19
3-3內嵌(Embedded)演算法21
3-4取出(Extraction)演算法22
3-5檢測(Detection)演算法23
3-6修補(Recovery)演算法24
3-7調整(Adjustment)演算法25
第4章 實作分析與探討27
4-1測試環境設定27
4-2參數設定28
4-3分析與比較30
第5章 結論與展望46
5-1相關應用46
5-2安全性探討47
5-3理想的條碼浮水印制訂48
5-4延伸的發展49
參考文獻50
重要名詞 中英對照53
1.Cox, I., Kilian, J., Leighton, T., and Shamoon, T., ”Secure spread spectrum watermarking for multimedia”, IEEE Transactions On Image Processing, Vol. 6, No. 12, pp. 1673- 1687, December 1997
2.Craver, S., Memon N., Yeo B.L., and Yeung M., "Can invisible watermarks resolve rightful ownership?" in Proc. SPIE Stroage and Retrieval for Still Image and Video Databases V, Vol. SPIE 3022, pp. 310-321, 1997.
3.Craver, S. et al. "Technical Trials and Legal Tribulations." Communications of the ACM, Vol. 41, No. 7. p. 45-54, July 1998.
4.Hsu, Chiou-Ting and Wu ,Ja-Ling, "Hidden Signatures in Images," in Proc. of ICIP'96, Vol. III, pp. 743-746, September 1996.
5.Hwang, M.S., Chang, C.C., and Hwang, K.F., “A watermarking technique based on one-way hash functions”, IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, pp. 286-294, 1999.
6.Kundur, D., "Energy Allocation for High-Capacity Watermarking In the Presence of Compression ", Proc. IEEE Int. Conf. on Image Processing , Vancouver, Canada, Vol. I, pp. 423-426, 2000.
7.Kutter, M. and Petiticolas F.A.P., ”A fair benchmark for image watermarking systems.”Technical report, University of Cambridge, 1999.
8.Kwon O. H., Kim Y. S. Kim, and Park R. H. Park, ”A DCT-domain watermarking method using the human visual system”, in Proc. Int. Workshop HDTV, pp. 252-260, Seoul, Korea, Oct. 1998.
9.Laangelaar, G. C., J. C. A. van der Lubbe and Biemond, J., “Copy Protection for Multimedia Data Based on Labeling Techniques,” 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996.
10.Lee, Y. K. and Chen, L. H., “An adaptive image steganographic model based on minimum-error LSB replacement,” in Proceedings of the Ninth National Conference on Information Security, pp. 8-15, Taiwan, 1999.
11.Lie, Wen-Nung, Chang, Li-Chun, ”Data Hiding In Images With Adaptive Numbers Of Least Significant Bits Based on the Human Visual System”, Proc. ICIP’99, 1999.
12.Lu, Chun-Shien, Huang, Shih-Kun, Sze, Chwen-Jye, and Liao, Hong-Yuan Mark “Cocktail Watermarking for Digital Image Protection”, IEEE Trans. on Multimedia, Vol. 2, No. 4, pp. 209-224, 2000.
13.Matsui, K. and Tanaka, K., “Video-Steganography: How to Embed a Signature in a Picture”, in Proceedings of IMA Intellectual Property, Vol. 1, No. 1, pp. 187-206, January 1994.
14.Mitchell D. Swanson, Mei Kobayashi, Ahmed H. Tewfik, ”Multimedia Data-Embedding and Watermarking Technologies”, Proceedings of the IEEE, Vol. 86, No. 6, June 1998.
15.Patis, I., “A Method for Signature Casting on Digital Image”, Proc.1996 IEEE Int. Conf. on Image processing, Vol. III, pp.215-218, 1996.
16.Petitcolas, F.A.P., Anderson, R.J., and Kuhn, M.G., "Information hiding - a survey", Proceedings of The IEEE, Vol. 87, pp. 1062-1078, July 1999.
17.Robert Kempf, “Deadlock Attacks on Digital Watermarks”, Telecommunications Seminar, February 3, 1999.
18.Swanson, M., Kobayashi, M., and Tewfik, A., “Multimedia data embedding and watermarking technologies”, Proceedings of the IEEE, Vol. 86, No. 6, pp. 1064-1087, June 1998
19.Tsai, M.J., Yu, K.Y. and Chen, Y.Z., “Joint Wavelet and Spatial Transformation for Digital Watermarking”, IEEE Trans. on Consumer Electronics, Vol. 46, pp. 241-245, Feb. 2000.
20.Voyatzis, G. and Pitas, I., "Embedding robust watermarks by chaotic mixing", in Proceedings of 13th International Conference on Digital Signal Processing (DSP'97), Vol. 1, pp. 213-216, 1997.
21.Voyatzis, G. and Pitas, I., "Protecting digital-image copyrights: A framework", IEEE Computer Graphics and Applications, Vol.19, No.1, pp.18-24, 1999.
22.Zhao, E. J., “Towards Robust and Hidden Image Copyright Labeling”, Proceedings of 1995 IEEE Workshop on Nolinear Signal and Image Processing.
23.徐紹文,“條碼製作入門與實例應用”, 靖宇出版社, 第五版,1992.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top