跳到主要內容

臺灣博碩士論文加值系統

(54.161.24.9) 您好!臺灣時間:2022/01/17 11:16
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃亮綜
研究生(外文):Larry Huang
論文名稱:雙域操作的浮水印技術
論文名稱(外文):A Hybrid Domain Watermarking Scheme
指導教授:詹進科詹進科引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:應用數學系
學門:數學及統計學門
學類:數學學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:66
中文關鍵詞:浮水印切割空間域離散小波域
外文關鍵詞:watermarkcropspatial domainwavelet domain
相關次數:
  • 被引用被引用:1
  • 點閱點閱:383
  • 評分評分:
  • 下載下載:71
  • 收藏至我的研究室書目清單書目收藏:0
近年來,數位影像的電子浮水印技術仍然缺乏對於幾何扭曲的抵抗性,例如旋轉、縮放以及切割。
在本論文中,我們針對切割的攻擊,提出可行的技術,並如實驗結果顯示,具有相當的成效。首先,我們在空間域中,利用標記區塊來定位,其中以邊緣為主要依據,可以區別出人類視覺中較重要與不重要的部分。其次,在取出驗證區塊之後,我們使用離散小波轉換的技術,建立了不需原圖的浮水印驗證架構。最後,我們提供相關的測試結果,包括同時施以切割及其它各種影像處理的攻擊,以及針對不同影像之重要性的分析狀況。
我們所提出的方法,能依據原圖的重要性來定義標記區塊,使得可以抵抗大規模以及不規則形狀的切割攻擊,包括長寬比例不等的切割攻擊。並且,在受到切割攻擊的情況下,可同時抵抗多種其它的攻擊。此外,我們結合離散小波轉換的優點,可以在不改變原圖且不需原圖之下,驗證浮水印,並且具有相當的強韌度。

Nowadays, the digital watermarking techniques are still weak for handling geometric distortions such as rotation, scaling and cropping.
In this thesis, watermark robustness against cropping is achieved by the proposed two concepts. Firstly, in spatial domain, the position block is decided by edges which could differentiate the importance on the human visual system. Secondly, the verified block is used to construct the oblivious watermarking system by taking advantage of Wavelet Transform properties. Meanwhile, some experimental results, including the analysis of the resistance against attacks and of important areas in different digital images, are presented as well.
The proposed method could decide position block by the importance of the original digital image. Thus, it could resist attacks like large scale cropping and irregular cropping. Besides, it could resist both the cropping attack and other image operations simultaneously. Moreover, since it takes advantage of Wavelet Transform properties, it could verify watermark not to change the original digital image and not to require the original digital image. Our experimental results show that the proposed method is quite robust against these attacks.

中文摘要 i
英文摘要 ii
謝誌 iii
目錄 iv
圖目錄 vi
表目錄 ix
第一章 緒論 1
1.1 研究動機 1
1.2 文獻回顧 5
1.2.1 數位浮水印簡介 5
1.2.2 併湊法及離散餘弦轉換的浮水印技術 9
1.3 論文架構 9
第二章 提出的浮水印技術 11
2.1 相關工作 11
2.1.1 區塊比對 11
2.1.2 離散小波轉換 13
2.1.3 最有意義位元 16
2.2 浮水印結合及驗證程序 18
2.2.1 浮水印與驗證區塊結合程序 18
2.2.2 標記區塊重要性分析程序 23
2.2.3 浮水印驗證程序 27
第三章 實驗結果與討論 29
3.1 評估標準 29
3.2 浮水印標記的分析性能 30
3.3 浮水印本身抵抗攻擊的性能 39
3.3.1 低通濾波 42
3.3.2 不規則切割 44
3.3.3 高通濾波 46
3.3.4 失真性壓縮 48
3.3.5 加入雜訊 50
3.3.6 縮小及放大尺寸 52
3.3.7 向右及向左旋轉 55
3.3.8 提高亮度 58
3.3.9 降低亮度 60
第四章 結論 62
參考文獻 63

[1] J. Dittmann, P. Wohlmacher and K. Nahrstedt, “Using Cryptographic And Watermarking Algorithms”, IEEE Multimedia, Vol. 8, No. 4, pp 54-65, 2001.
[2] N. Nikolaidis and I. Pitas, “Digital image watermarking: an overview”, IEEE International Conference on Multimedia Computing and Systems, Vol. 1, pp 1-6, 1999.
[3] I. J. Cox and M. L. Miller, “Electronic watermarking: the first 50 years”, IEEE Fourth Workshop on Multimedia Signal Processing, pp 225-230, 2001.
[4] S. P. Mohanty, K. R. Ramakrishnan and M. S. Kankanhalli, “A DCT Domain Visible Watermarking Technique for Images”, IEEE International Conference on Multimedia and Expo, Vol. 2, pp 1029-1032, 2000.
[5] M. Wu and B. Liu, “Watermarking for image authentication”, International Conference on Image Processing(ICIP), Vol. 2, pp 437-441, 1998.
[6] M. Wu, E. Tang and B. Liu, “Data Hiding in Digital Binary Image”, IEEE International Conference on Multimedia and Expo, Vol. 1, pp 393-396, 2000.
[7] S. Suthaharan and S. Sathananthan, “Transform domain technique: robust watermarking for digital images”, IEEE SoutheastCon, pp 407-412, 2000.
[8] W. Zeng and B. Liu, “On Resolving Rightful Ownerships of Digital Images by Invisible”, International Conference on Image Processing, Vol. 1, pp 552-555, 1997.
[9] I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, Vol. 6, No. 12, pp 1673-1687, 1997.
[10] J. J. K. O'Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking”, International Conference on Image Processing, Vol. 1, pp 536-539, 1997.
[11] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller and Y. M. Lui, “Rotation, scale, and translation resilient watermarking for images”, IEEE Transactions on Image Processing, Vol. 10, No. 5, pp 767-782, 2001
[12] H. Kii, J. Onishi, S. Ozawa, “The digital watermarking method by using both patchwork and DCT”, IEEE International Conference on Multimedia Computing and Systems, Vol. 1, pp 895-899, 1999.
[13] C. C. Chang, K. F. Hwang and M. S. Hwang, “A block based digital watermarks for copy protection of images”, Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference, Vol. 2, pp 977-980, 1999.
[14] I. J. Cox, M. L. Miller and J. A. Bloom, “Watermarking applications and their properties”, International Conference on Information Technology: Coding and Computing, pp 6-10, 2000.
[15] X. Ran, and N. Farvardin, “A perceptually motivated three-component image model-Part I: description of the model”, IEEE Transactions on Image Processing, Vol. 4, No. 4, pp 401-415, 1995.
[16] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images”, IEEE Transactions on Image Processing, Vol. 8, No. 1, pp 58-68, 1999.
[17] C. T. Hsu and J. L. Wu, “Multiresolution Watermarking for Digital Images”, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp 1097-1101, 1998.
[18] K. R. Castleman, Digital Image Processing, New Jersey: Prentice-Hall, 1996.
[19] W. Bender, D. Gruhl and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal, Vol. 35, No. 3 and 4, pp 313-316, 1996.
[20] W. B. Lee and T. H. Chen, "A Robust Copyright Protection Scheme for Still Images", Proceedings of 2000 International Computer Symposium Workshop, 2000,
[21] M. Wu and B. Liu, “Digital Watermarking using shuffling”, International Conference on Image Processing, Vol. 1, pp 291-295, 1999.
[22] M. S. Hwang, C. C. Chang and K. F. Hwang, “A Watermarking Technique Based on One-way Hash Functions”, IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, pp. 286-294, 1999.
[23] C. Y. Lin and S. F. Chang, “Distortion modeling and invariant extraction for digital image print-and-scan process”, International Symposium. on Multimedia Information Processing (ISMIP 99), Taipei, Taiwan, 1999.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 張蓓莉(民78):聽覺障礙學生語文能力之研究。特殊教育研究學刊,5,165-204。
2. 張蓓莉(民76):回歸主流聽覺障礙學生語文能力之研究。特殊教育研究學刊,3,119-134。
3. 高令秋(民85):聽覺障礙學生閱讀能力之探討。研習資訊,13(1),52-57。
4. 邱上真(民80):學習策略教學的理論與實際。特殊教育與復健學報,1,1-49。
5. 林寶貴、李真賢(民76):聽覺障礙學生國語文能力之研究。國立台灣教育學院學報,12,1-29。
6. 林惠芬(民86):自我教導問-答閱讀策略對國中輕度智能不足學生閱讀理解效果之研究。特殊教育學報,12,103-123。
7. 李芃娟(民84):聽覺障礙兒童教學方法探討。特殊教育與復健學報,4,237-247。
8. 張蓓莉(民80):國小聽覺障礙學生句型理解能力研究。特殊教育研究學刊,7,87-108。
9. 陳李綢(民84):「學習策略訓練方案」對國中生閱讀理解學習之影響。教育心理學報,28,77-98。
10. 曾世杰(民85):聽障者閱讀困難的可能原因之一。特殊教育季刊,60,17-20。
11. 曾世杰(民87):聾人閱讀中文詞時「詞彙觸接」與「短期記憶」歷程之轉錄現象研究。特殊教育與復健學報,6,65-101。
12. 鄭春蕓、邱美虹(民83):閱讀理解的推論型式與研究方法。嘉義師院學報,8,287-312。
13. 賴育民(民84):如何精進閱讀理解能力-後設認知的取向。研習資訊,12(3),29-31。
14. 錡寶香(民89):聽覺障礙學生閱讀理解能力之分析。特殊教育學報,14,155-187。