跳到主要內容

臺灣博碩士論文加值系統

(54.224.117.125) 您好!臺灣時間:2022/01/28 19:13
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王上豪
研究生(外文):Shang Hao Wang
論文名稱:一個結合離散小波轉換與人類視覺特性之數位浮水印技術
指導教授:洪國寶洪國寶引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
中文關鍵詞:數位浮水印離散小波轉換HVS
外文關鍵詞:Digital watermarkingDWTHVS model
相關次數:
  • 被引用被引用:5
  • 點閱點閱:2945
  • 評分評分:
  • 下載下載:583
  • 收藏至我的研究室書目清單書目收藏:0
近年來,由於網際網路與電腦產業的快速發展,使用電腦處理文件已經變得十分普遍,所以電子文件的傳播、修改和買賣變的十分方便。但是,有價的數位媒體卻因此面臨了智慧財產保護的嚴重問題,所以在此篇論文中我們提出了一個以離散小波轉換為基礎的浮水印技術來保護數位影像。為了讓我們的技術更加具有強韌性與透明性,在這裡我們運用了兩個方法去解決。第一,將浮水印嵌入在數位影像的最低頻區:因為低頻區是一張影像中最重要的地方,所以可以在一般影像攻擊後保存下來,如此一來便可提高浮水印的強韌度。第二,利用HVS Model去分析最低頻區:依據HVS Model分析後的結果在不同的位置去嵌入不同強度的浮水印,藉此來降低嵌入最低頻區後的失真程度。如此一來,我們便可達到強韌度與透明性的平衡。最後,我們設計了一些實驗去證明我們浮水印技術的可行性。
In this paper, a new robust blind watermarking scheme based on Discrete Wavelet Transform (DWT) is proposed. In order to develop a more robust and transparent watermarking scheme, we use two techniques to enhance strength and transparency. First, the watermark is embedded into the lowest frequency components, such that the maximum robustness is possible. Unfortunately, the quality of the watermarked image is low, that is, the distortion is serious. Second, however, the human visual system (HVS) model is adopted to improve the transparency of the watermarked image while the lowest frequency components can always survive under considerable distortions. Experimental results of different JPEG compression ratio are conducted to prove the robustness property of this watermarking scheme.
第1章、簡介
1.1 前言
1.2 數位浮水印技術的文獻
1.2.1 I. J. Cox, J. Kilian, F. T. Leighton scheme
1.2.2 Podilchuk, C.I. and Wenjun Zeng scheme
1.2.3 Chiou-Ting Hsu and Ja-Ling Wu scheme
1.2.4 Tsai, M.J., Yu, K.Y. and Chen, Y.Z scheme
1.2.5 Hong,I.,Kim,I. and Han, S.S scheme
1.2.6 Barni, M., Bartolini, F. and Piva, A scheme
1.3 研究動機
1.4 研究貢獻
1.5 論文大綱
第2章 、背景知識
2.1 空間域
2.2 頻率域
2.3 離散小波轉換
2.4 二維影像的隨機打散方法
2.5 影像品質的定義
2.6 浮水印取出後的認證方法
第3章、我們的方法
3.1 HVS Model
3.2 相關研究
3.3 我們的方法(嵌入演算法)
3.4 我們的方法(萃取演算法)
第4章、實驗與討
4.1 實驗
4.2 JPEG壓縮實驗結果
4.3 影像模糊化實驗結果
4.4 影像銳化實驗結果
4.5 影像加入雜訊實驗結果
4.6 影像縮小實驗結果
4.7 影像剪裁實驗結果
4.8 討論
第5章、結論與未來展望
[1]I.J. Cox,; J. Kilian,; F.T. Leighton,; T. Shamoon, “Secure spread spectrum watermarking for multimedia” Image Processing, IEEE Transactions on , Volume: 6 Issue: 12 , Dec. 1997. Page(s): 1673 -1687
[2]C.I. Podilchuk, and Zeng Wenjun, “Image-Adaptive Watermarking Using Visual Models” IEEE Journal on Selected Areas in Communications, Volume: 16 Issue: 4 , May 1998. Page(s): 525 -539
[3]R.B. Wolfgang, C.I. Podilchuk, and E.J. Delp, “Perceptual Watermarks for Digital Images and Video” Proceedings of the IEEE, Volume: 87 Issue: 7, July 1999. Page(s): 1108 -1126
[4]C.T. Hsu; J.L. Wu, “Multiresolution watermarking for digital images” Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on , Volume: 45 Issue: 8 , Aug. 1998. Page(s): 1097 -1101
[5]M.J. Tsai, K.Y. Yu, and Y.Z. Chen, “Joint Wavelet and Spatial Transformation for Digital Watermarking” IEEE Transactions on Consumer Electronics, Volume: 46 Issue: 1, Feb. 2000. Page(s): 237
[6]M.J. Tsai, K.Y. Yu, and Y.Z. Chen, “Wavelet packet and adaptive spatial transformation of watermark for digital image authentication” Image Processing, 2000. Proceedings. 2000 International Conference on , Volume: 1 , 2000. Page(s): 450 -453
[7]I. Hong, I. Kim and S.S Han., “A blind watermarking technique using wavelet transform”, Proceedings on IEEE International Symposium of Industrial Electronics, Volume: 3 , 2001. Page(s): 1946 -1950
[8]M. Barni, F. Bartolini, and A. Piva, “Improved Wavelet-based Watermarking Through Pixel-Wise Masking” IEEE Transactions on Image Processing, Volume: 10 Issue: 5, May 2001. Page(s): 783 -791
[9]J. Dittmann, “Combining digital watermarks and collusion secure fingerprints for customer copy monitoring” Secure Images and Image Authentication (Ref. No. 2000/039), IEE Seminar on , 2000. Page(s): 6/1 -6/6
[10]C.C. Chang; K.F. Hwang; M.S. Hwang, “A block based digital watermarks for copy protection of images” Communications, 1999. APCC/OECC ''99. Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference , Volume: 2 , 1999. Page(s): 977 -980
[11]Wu, M. and Liu, B., “Watermarking for image authentication,” 1998 International Conference on Image Processing, Volume: 2, 1998. Page(s): 437 -441
[12]H.W. Lee, “Information hiding for EC: public key traitor tracing for digital copyright protection” Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium on , Volume: 2 , 2001. Page(s): 1357 -1362
[13]B. Chor,; A. Fiat,; M. Naor,; B. Pinkas, “Tracing traitors” Information Theory, IEEE Transactions on , Volume: 46 Issue: 3 , May 2000 Page(s): 893 -910
[14]A.S. Lewis, and G. Knowles, “Image Compression Using the 2-D Wavelet Transform” IEEE Transactions on Image Processing, Volume: 1 Issue: 2, April 1992. Page(s): 244 -250
[15]J.M. Shapiro, “Embedded image coding using zerotrees of wavelet coefficients”, IEEE Transactions on Signal Processing Vol. 41, No. 12, 3445 -3462 (1993). Page(s): 3445 -3462
[16]G. Voyatzis and I. Pitas, “Chaotic Mixing of Digital Images and Applications to watermarking” Proceedings of European Conference on Multimedia Applications, Service and Techniques(ECMAST’96), Vol. 2, May 1996.
[17]S. Craver, B.L. Yeo, and MM. Yeug “Resolving rightful ownership with, invisible watermarking techniues: lmitations, attack, and implications” IEEE J. Select. Areas Commun. 1998.
[18]P. L .Lin “Digital watermarking models for resolving rightful ownership and authenticating legitimate customer” Jounal of System and Software 55, 2001. Page(s): 261-271.
[19]C.C. Chang; K.F. Hwang; M.S. Hwang, “Robust authentication scheme for protecting copyrights of images and graphics” Vision, Image and Signal Processing, IEE Proceedings- , Volume: 149 Issue: 1 , Feb. 2002 Page(s): 43 -50
[20]B. Sklar, “Digital Communications” Englewood Cliffs, NJ: Prentice Hall, 1988.
[21]林禎吉、賴溪松,”數位浮水印的技術” 民國87年6月,資訊安全通訊第四卷第三期。
[22]張真誠、黃國峰、陳同孝, “電子影像技術” 松崗電腦圖書資料股份有限公司,初版二刷,2001年2月。
[23]張真誠、黃國峰、陳同孝, “數位影像處理技術” 松崗電腦圖書資料股份有限公司,初版二刷,2001年3月。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top