跳到主要內容

臺灣博碩士論文加值系統

(2600:1f28:365:80b0:2119:b261:d24c:ce10) 您好!臺灣時間:2025/01/21 07:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:蔡中瑋
研究生(外文):Chung-Wei Tsai
論文名稱:數位影像驗證法
論文名稱(外文):A Technique for Image Authentication
指導教授:唐元亮
指導教授(外文):Yuan-Liang Tang
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:49
中文關鍵詞:影像驗證影像安全數位浮水印資料隱藏
外文關鍵詞:Image AuthenticationImage SecurityDigital WatermarkData Hiding
相關次數:
  • 被引用被引用:5
  • 點閱點閱:1061
  • 評分評分:
  • 下載下載:46
  • 收藏至我的研究室書目清單書目收藏:1
隨著數位技術的進步,越來越多的出版品以數位的方式製作並且透過網路流通,如數位照片、MP3音樂等。而數位技術的進步也使得非法盜取與複製的問題日益嚴重,因此如何保障合法使用者與原作者的權利近來成為網路世界一項重要的課題。
在各類數位產品的保護技術中,影像驗證技術已廣泛地受到重視。針對影像是否遭到非法修改的數位影像驗證法可概分為影像內容特徵比對方法、數位簽章驗證法與錯誤編碼控制方法。大部分的方法或考量簡單與效率,或考量應用層面,都僅能以小分割區域為偵測範圍,而能夠偵測至單一篡改點的驗證法顯然是比較少的。
本研究將進行數位影像驗證法的探討,並進一步發展出能夠偵測出單一篡改點的驗證法。這樣的技術在不允許影像遭受任何篡改的應用中是非常重要的,尤其當影像具有法律效力時,本技術更有應用價值。
As digital technologies advance, more and more publications such as digital images and the MP3 music products are produced in the digital format and transmitted through the Internet. Accompanying the advent of such digital world, however, illegal use and copying of digital products become a serious problem. How to protect the right of legal users and the copyright of original producers thus becomes an active research area.
Among various technologies for digital product protection, image authentication has received extensive attentions. Researchers have developed a number of methods to identify if an image has experienced illegal modifications. For examples, images can be authenticated by image feature comparison, by digital signatures, and by error control coding. Most of them, however, can only detect if a "portion" of an image is modified, as a tradeoff of simplicity, efficiency, or specific requirements for certain applications. There are very few techniques that can identify image tampering up to one-pixel level. In this research, we will first review current important techniques for digital product protection in general, and then propose a method that is able to locate image tampering up to one-pixel level. This technique is very important if the image content is not allowed for modification, especially when the image is used for legal purposes.
目錄
摘要 IV
ABSTRACT V
誌謝 VI
目錄 VII
圖目錄 VIII
第一章 簡 介 1
第一節 研究動機 1
第二節 研究範圍 4
第三節 論文架構 5
第二章 文獻探討 6
第一節 資料隱藏簡介 6
第二節 數位浮水印嵌入技術 9
第三節 影像驗證的設計與需求考量 15
第四節 影像驗證的相關研究 16
第三章 改良式數位影像驗證法 26
第一節 YANG-HWANG-TANG的影像驗證方法 26
第二節 YANG-HWANG-TANG的影像驗證方法分析 30
第三節 以RSA加密的數位影像驗證方法 32
第四節 以DES加密的數位影像驗證方法 36
第五節 實驗結果 38
第四章 方法分析與討論 40
第一節 效果分析 40
第二節 三種方法的分析與比較 43
第五章 結論 45
第一節 具體貢獻 45
第二節 未來研究方向 45
第六章 參考文獻 46
1. Feng Bao, "Multimedia content protection by cryptography and watermarking in tamper-resistant hardware," Proceedings on ACM multimedia 2000 workshops, Los Angeles, CA U.S.A.(2000)
2. F. L. Bauer, "Decrypted Secrets─Methods and Maxims of Cryptology," Berlin, Heidelberg, Germany:Springer-Verlag (1997)
3. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for Data Hiding," IBM Systems Journal, Vol. 35 (1996)
4. Sushil Bhattacharjee and Martin Kutter, "Compression Tolerant Image Authentication," International Conference on Image Processing,pp. 435—439. (1998)
5. T.S. Chen, C.C. Chang and M.S. Hwang, "A Virtual Image Cryptosystem Based upon Vector Quantization," IEEE Transactions on Image Processing, Vol. 7, No. 10, pp.1485-1488 (1998)
6. N. Chotikakamthorn and W. Sangiamkun, " Digital Watermarking Technique for Image Authentication by Neighbouring Block Similarity Measure, " Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology, Vol .2, pp.743-747 (2001)
7. I. J. Cox and J.-P. Linnartz, "Some general methods for tampering with watermarks", IEEE Journal on Selected Areas in Communications, pp.587—593.(1998)
8. Jiri Fridrich, "A Hybrid Watermaerk for Tamper Detection in Digital Images," ISSPA 99’, Brisbane, Australia(1999)
9. Jiri Fridrich, Miroslav Goljan, "Images with Self-Correcting Capabilities," International Conference on Image Processing, Vol. 3, pp. 792—796.(1999)
10. Chiou-Ting Hsu, Ja-Ling Wu, "Hidden Digital Watermarks in Images," IEEE Transactions on Image Processing, Vol. 8, No. 1(1999)
11. A. B. Kahng, J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang and G. Wolfe, "Watermarking techniques for intellectual property protection," Proceedings of the 35th annual conference on Design automation conference, San Francisco, CA U.S.A.(1998)
12. Mohan S. Kankanhalli, K. R. Ramakrishnan and Rajmohan, "Content based watermarking of images," Proceedings of the sixth ACM international conference on Multimedia , Bristol United Kingdom.(1998)
13. Deepa Kundur and Dimitrios Hatzinakos, "Digital Watermarking for Telltale Tamper Proofing and Authentication," PROCEEDINGS OF THE IEEE, Vol.87, No.7 (1999)
14. Tse-Hua Lan and Ahmed H. Tewfik, "Fraud detection and self embedding," Proceedings of the seventh ACM international conference (part 2) on Multimedia , Orlando, FL U.S.A.(1999)
15. Jaejin Lee and Chee Sun Won, "A Watermarking Sequence Using Parties of Error Control Coding for Image Authentication and Correction," IEEE Transactions on Consumer Electronics,Vol. 46, No. 2, pp. 313—317 ( 2000)
16. Chang-Tsun Li, Der-Chyuan Lou and Tsung-Hsu Chen, " Image Authentication and Integrity Verification VIA Content-Based Watermarks and a Public Key Cryptosystem, " IEEE International Conference on Image Processing,Vol. 1, No. 3, pp.694-697 (2000)
17. D.C. Lou and J.L. Liu, "Fault Resilient and Compression Tolerant Digital Signature for Image Authentication," IEEE Transactions on Consumer Electronics, Vol. 46, pp. 31 —39 (2000)
18. Chun Shien Lu and Hong Yuan Mark Liao, "Multipurpose Watermarking for Image authentication and Protection," IEEE Transactions on Image Processing, Vol.10, No.10, pp.1579-1585 (2000)
19. Lisa M. Marvel and Charles T. Retter, "A Methodology for Data Hiding Using Images," Military Communications Conference, MILCOM 98, Proceedings, IEEE, Vol.3, pp.1044—1047 ( 1998)
20. Lisa M. Marvel, Charles G. Boncelet and Charles T. Retter, "Spread Spectrum Image Steganography," IEEE Transactions on Image Processing, Vol.8, No.8 (1999)
21. Nasir Memon and Ping Wah Wong, "Protecting Digital Media Content," Communication of The ACM, Vol.41, No.7. (1998)
22. Fabien A.P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, "Information Hiding--A Survey," Proceedings of the IEEE, Vol.87, No.7 (1999)
23. Maria Paula Queluz, "Towards Robust, Content Based Techniques for Image Authentication," IEEE Second Workshop on Multimedia Signal Processing, pp. 297—302 (1998)
24. Marc Schneider and Shih-Fu Chang, "A Robust Content Based Digital Signature for Image Authentication," International Conference on Image Processing,Vol.3, pp.227—230 (1996)
25. C.E. Shannon, "Communication in the presence of noise", Procedings of Institute of Radio Engineers, pp.10—21 ( 1949)
26. Mitchell D. Swanson, Mei Kobayashi, and Ahmed H. Tewfik, "Multimedia Data-embedding and Watermarking Technologies," Proceedings of the IEEE, Vol.86, No.6, pp. 1064—1087 (1998)
27. Anastasios Tefas and Ioannis Pitas, "Image Authentication Using Chaotic Mixing System," IEEE International Symposium on Circuits and Systems, Geneva, Switzerland.(2000)
28. Min-Jen Tsai, Kuang-Yao Yu and Yi-Zhang Chen, " Wavelet packet and adaptive spatial transformation of watermark for digital image authentication," IEEE International Conference on Image Processing, Vol. 1, pp.450-453 (2000)
29. Steve Walton, "Image authentication for a slippery new age," Dr. Dobb’s Journal (1995)
30. Ping Wah Wong, "A Public key watermark for Image Verification and Authentication," International Conference on Image Processing,pp. 455—459 (1998)
31. Ping Wah Wong and Nasir Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, " IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1593 —1601 (2001)
32. Min Wu, Bede Liu, "Watermarking for Image Authentication," IEEE International Conference on Image Processing,Vol.2, pp.437— 441 ( 1998)
33. Liehua Xie and Gonzalo R. Arce, "Joint Wavelet Compression and Authentication Watermarking," International Conference on Image Processing, Vol.2, pp.427—431 (1998)
34. C. R. Yang, M. S. Hwang, Y. L. Tang, “偵測影像的被破壞點之研究--縱橫偵測法", Eighth National Conference on Science and Technology of National Defense, Tao-Yuan, Nov. 1999.
35. M. Yeung, and F. Mintzer, "An Invisible Watermarking Technique for Image Verification," Proc. ICIP''97, Santa Barbara, California( 1997)
36. 李遠坤,陳玲慧,「數位影像之資訊隱藏技術探討」,資訊安全通訊,第五卷第四期(1999)。
37. 莊潤洲,「影像被竄改之偵測技術研究」,碩士論文,中正大學資訊工程研究所,嘉義(2000)。
38. 楊清榮,「影像完整性之研究」,碩士論文,朝陽科技大學資訊管理研究所,台中(2000)。
39. 蔡昌隆, 陳建儒, 江惠芬, 范國清, 「內嵌式資料隱藏之探討」,電腦學刊,第三卷第一期(2001)。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top