跳到主要內容

臺灣博碩士論文加值系統

(2600:1f28:365:80b0:f3de:de2a:940c:ec8b) 您好!臺灣時間:2024/12/04 08:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:昌逸嵐
研究生(外文):Yi-Lan Chang
論文名稱:植基於架構樹集合分割影像編碼器的影像數位浮水印設計
論文名稱(外文):A New Image Watermarking Technique Based on Set Partitioning in Hierarchical Trees
指導教授:楊士萱楊士萱引用關係
指導教授(外文):Shih-Hsuan Yang
學位類別:碩士
校院名稱:國立臺北科技大學
系所名稱:電腦通訊與控制研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2001
畢業學年度:89
語文別:中文
論文頁數:80
中文關鍵詞:架構樹集合分割數位浮水印版權保護資訊安全JPEG
外文關鍵詞:SPIHTdigital watermarkingopyright protectioninformation securityJPEG
相關次數:
  • 被引用被引用:1
  • 點閱點閱:185
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在本論文中,我們研究並開發架構樹集合分割編碼影像的數位浮水印嵌入技術,使其能抵抗JPEG壓縮攻擊。電腦與通訊網路的進步,使得電子文件交換、電子商務、隨選視訊、數位圖書館等數位服務蔚為風尚。但是,由於數位化資料具有容易且精確地被複製的特性,所以需要有效的保護機制來防止竊取或篡改,數位浮水印(digital watermarking)就是產學界高度重視的技術之一。數位浮水印將不容易被移除或破解的數碼隱密地嵌入原始影像中,以做為確認版權歸屬的依據。由Said與Pearlman所提出的架構樹集合分割(Set Partitioning in Hierarchical Trees, SPIHT)技術,由於具備優良影像編解碼器所需的多數條件,所以成為新一代影像壓縮標準MPEG-4與 JPEG-2000的核心技術。在本論文中,我們針對SPIHT編碼方式提出其數位浮水印的嵌入構想。不同於過去多數研究改變轉換係數的方法,我們將數位浮水印有效嵌入於SPIHT的量化結果中,在不影響原來SPIHT的壓縮及解碼程序的情形下,可以提高浮水印的強韌性並降低系統的複雜度。實驗結果顯示,我們所提出的方法在維持影像品質的情形下,對於JPEG壓縮具有高度的強韌性,此外,我們亦採用錯誤更正碼保護數位浮水印數碼以更進一步地增進系統的強健性。

In this paper, we develop a watermarking technique for SPIHT-coded images. The advances of computer and communication networks make possible digital economics such as E-commerce, video on demand, and digital library. Since digital data can be easily replicated without any loss, security becomes an imperative requirement for digital services. Digital watermarking has been proposed as one of the most important resolving skills to prevent data piracy and plagiarism. A digitally watermarked image contains invisible code that is difficult to remove by offenders and therefore copyright can be confirmed by extracting and verifying the embedded watermark. The SPIHT (set partitioning in hierarchical trees) method proposed by Said and Pearlman is a very successful image compression algorithm, and has become the core technology of MPEG-4 and JPEG-2000. In this paper, we develop a new watermarking technique for the SPIHT-coded images. In contrast of the conventional approaches that incorporate watermarks into the transformed coefficients, the proposed method embeds the watermarking signal directly on the bitstream generated in the quantization process. By a joint optimization of quantization and watermarking, the robustness of the system can be enhanced with minimal complexity. Experiments show that our method can survive the attack of the JPEG compression. We also apply error-correcting codes to further improve the robustness of the system.

目次
中文摘要iii
英文摘要iv
誌謝v
表目錄ix
圖目錄x
第一章 緒論1
1.1 數位浮水印1
1.2 影像壓縮簡介2
1.3 研究動機和目的4
1.4 論文組織架構4
第二章 數位浮水印的基礎6
2.1 資訊安全6
2.1.1 傳統加密技術6
2.1.2 數位浮水印與加密技術8
2.1.3 數位浮水印與數位簽章8
2.2 高效能數位浮水印機制必須具備的條件10
2.3 常見的數位浮水印技術12
2.3.1 空間域數位浮水印技術12
2.3.2 轉換域數位浮水印技術14
2.3.2.1 以轉換域為基礎的數位浮水印系統之一般化架構14
2.3.3 壓縮資訊流數位浮水印技術16
2.4 數位浮水印所受到的挑戰與攻擊17
2.5 結論18
第三章 植基於架構樹集合分割影像編碼器之浮水印基礎19
3.1 小波相關知識19
3.1.1 小波轉換19
3.1.2 多層解析度分析20
3.1.3 小波分析的離散信號的分解與重建21
3.1.4 二維影像的小波分析23
3.2 零樹嵌入編碼法28
3.3 架構樹集合分割影像編碼法介紹36
3.4 靜態影像壓縮45
第四章 架構樹集合分割影像的數位浮水印系統48
4.1 數位浮水印嵌入機制48
4.1.1 數位浮水印的結構48
4.1.2 浮水印嵌入演算法49
4.1.3 嵌入演算法之選擇性參數52
4.2 浮水印偵測演算法57
第五章 實驗結果60
5.1 通透性與強健性的估測60
5.2 變動參數的數位浮水印機制模擬測試60
5.2.1 原始影像嵌入浮水印後且未受到攻擊的模擬測試66
5.2.2 以門檻值參數調整的數位浮水印系統測試61
5.2.3 以截頭去尾參數調整的數位浮水印系統測試69
5.2.4 以錯誤更正碼保護浮水印數碼的數位浮水印系統測試72
5.3 架構樹集合分割數位浮水印系統的推廣測試75
5.4 系統參數的探討及與參考文獻[26]之比較78
第六章 結論82
參考文獻83

[1] G. K. Wallace, “ The JPEG still picture compression standard,” IEEE Trans. Consumer Electronics, vol. 38, pp xviii- xxxiv, Feb 1992.
[2] J. M. Shapiro, “Embedded image coding using zerotrees of wavelet coefficients,” IEEE Trans. Signal Processing, vol. 41, pp. 3445-3462, Dec. 1993.
[3] A. Said and W. A. Pearlman, “A new, fast, and efficient image codec based on set partitioning in Hierarchical trees,” IEEE Trans. Circuits Syst. Video Technol., vol. 6, pp. 243-250, June 1996.
[4] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
[5] M. D. Swanson, M. Kobayashi and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proc. IEEE, vol. 87, no. 6, pp. 1064-1087, June 1999.
[6] G.. Voyatzis and I. Pitzs, “Protecting digital image copy rights: a framework,” IEEE Computer Graphics and Applications, vol. 19, pp. 18-24, Jan.-Feb. 1999.
[7] M. Kutter and F. Petitcolas, “A fair benchmark for image watermarking systems,” in Proc. SPIE IS &T/SPIE’s 11th Annu. Symp., Electronic Imageing ’99: Security and Watermarking of Multimedia Contents, vol. 3658, Jan. 1999.
[8] I. Paitas, “A method for wtermark casting on digital images,” IEEE Trans. Circuits Syst. Video Technol., vol. 8, no. 6, pp. 775-780, Oct. 1998.
[9] G. Voyatzis and I. Pitas, “Chaotic watermarks for embedding in the spatial digital image domain,” Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conf. , vol. 2 , 1998
[10] C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 525-539, May 1998.
[11] C.-T. Hsu and J.-L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. Circuits Syst. Ⅱ, vol. 45, no. 8, pp. 1097-1101, Aug. 1998.
[12] D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” IEEE Proc. ICIP, vol. 1, pp. 544-547, 1997.
[13] D. Kundur and D. Hatzinakos, “Digital watermarking using multiresolution wavelet decomposition,” IEEE Int. Conf.\Acoustics, Speech and Signal Processing, vol. 5, pp. 2969-2972, 1998.
[14] W. Zhu, Z. Xiong, and Y.-Q. Zhang, “Multiresolution watermarking for images and video,” IEEE Trans. Circuits and Syst. Video Technol., vol. 9, no. 4, pp. 545-550,June 1999.
[15] X.-G. Xia, C. G. Boncelet, and G. R. Arce, “A multiresolution watermark for digital images,” Proc. ICIP’97, vol. 1, pp. 548-551, 1997.
[16] R. D., K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” Proc. ICIP, vol. 2, pp. 419-423, 1998.
[17] Y.-S. Kim, O-H. Kwon, and R.-H. Park, “Wavelet based watermarking method for digital images using the human visual system,” Electronics Letters, vol. 35, no. 6, pp. 466-468, Mar. 1999.
[18] Z. H. Wei, P. Qin, and Y. Q. Fu, “Perceptual digital watermark of images using wavelet transform,” IEEE Trans. Consumer Electronics, vol. 44, no. 4, Nov 1998.
[19] C.-T. Hsu and J.-L. Wu, “DCT-based watermarking for video,” IEEE Trans. Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998.
[20] C.-T. Hsu and J.-L. Wu, “Hidden digital watermarks in images,” IEEE Trans. Image Processing, vol. 8, no. 1, pp. 58-68, Jan. 1999.
[21] J. Huang and Y. Q. Shi, “A adaptive image watermarking scheme based on visual masking,” Electronics Letters, vol . 34, no. 8, pp. 748-750, Apr. 1998.
[22] J. J, K. O’Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copy right protection,” IEE Proc. Vision Image Signal Process., vol. 143, no. 4, pp. 250-256, Aug. 1996.
[23] L. Qiao and K. Nahrstedt, “Watermarking schemes and protocols for protecting rightful ownership and customer’s right,” Journal of Visual Commun. Image Represent., vol. 9, no. 3, pp. 194-210, Step. 1998.
[24] I. J. Cox, J. Killian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol.6, no. 12, pp.1673-1687, Dec. 1997.
[25] J. J. K. O’ Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Image Processing, 1997. Proceedings., International Conference on , Vol. 1 ,pp. 536 —539, 1997
[26] H. Inoue, A. Miyazaki, A. Yamamoto, and T. Katsura, “A digital watermark based on the wavelet transform and its robustness on image compression,” in Proc. IEEE ICIP 98, vol. 2, pp. 391-395, 1998.
[27] X. Liehua and G. R. Arce, “Joint wavelet compression and authentication watermarking,” in 1998 Int. Conf. Image Processing, vol. 2, pp. 427- 431, 1998.
[28] H.-J. Wang and C. C. J. Kuo, “A integrated progressive image coding and watermark system,” in Proc. IEEE Int. Conf. Acoustic, Speech and Image Processing, vol. 6, pp. 3721-3724, 1998.
[29] F. Mintzer, G. Q. Braudaway, and A. E. Bell, “Opportunities for watermarking standards,” Communications of the ACM, vol. 41, no. 7, pp. 57-64, July 1998.
[30] R. Barnett and D. Pearson, “Attack operators for digitally watermarked images,” IEE Proc.-Vis. Image Signal Process., vol. 145, no. 4, pp. 271-279, Aug. 1998.
[31] R. Barnett, “Digital watermarking: applications, techniques and challenges,” Electronics& Communication Engineering Journal, vol. 11, no. 4, pp. 173-183, Aug. 1999.
[32] S. Craver, B.-L. Yeo, and M. Yeung, “Technical trials and legal tribulations,” Communications of the ACM, vol. 41, no. 7, pp. 45-54, July 1998.
[33] M. Antonini, M. Barlaud, P. Mathieu and I. Daubechies, “Image coding using wavelet transform,”IEEE Trans. On Image Processing, vol. 1, no. 2, pp. 205-220, April 1992

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊