跳到主要內容

臺灣博碩士論文加值系統

(3.81.172.77) 您好!臺灣時間:2022/01/21 19:59
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳孟彰
研究生(外文):Meng-Zhang Chen
論文名稱:數位影像版權保護之研究
論文名稱(外文):The Study on Copyright Protection for Digital Image
指導教授:孫宏民
指導教授(外文):Hung-Min Sun
學位類別:碩士
校院名稱:國立成功大學
系所名稱:資訊工程學系碩博士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:96
中文關鍵詞:版權保護智慧財產權數位浮水印時戳簽章
外文關鍵詞:Copyright ProtectionIntellectual Property RightDigital WatermarkingTimestamp
相關次數:
  • 被引用被引用:1
  • 點閱點閱:431
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
由於網際網路的盛行,許多有價媒體(如影像、聲音、影片等)在網路上傳輸,
其有價媒體的安全和智慧財產權(著作權)的保護也將越來越重要。但以目前在有
價媒體的資料設計上不是十分安全,因此造成一些不法人士有機可乘的機會,例
如假冒合法使用者直接使用有價媒體,或是運用合成等仿製方法。這些攻擊的行
為造成有價媒體在智慧財產權(著作權)上嚴重的傷害。為了解決智慧財產權(著作
權)之認證及驗證的問題,數位影像版權保護系統和數位浮水印(digital
watermarking)技術即是解決此一問題的相關技術。
所謂數位浮水印技術是指將代表合法擁有者的圖騰(如註冊商標、營利事業
統一編號、個人肖像等等)加入被保護的有價媒體中,用來表示、證明該媒體的
合法擁有權之歸屬。在嵌入浮水印後的媒體在經過一些常見的數位訊號處理和破
壞之後,其品質在可接受的範圍內時,該浮水印仍然可以被顯示出來,因此能夠
證明該媒體的版權之歸屬,使得非法使用者盜用或仿冒該媒體的行為被發現。
然而現存之各種數位浮水印技術有兩個嚴重的問題:一是若針對數位浮水印
演算法來刻意攻擊,皆能將所藏入之數位浮水印去除;二是在同一份影像被藏入
多個浮水印,如何判別誰才是真正合法的擁有者。有別於數位浮水印技術,Chen
et al.提出一個影像權益保護系統。其觀念為將影像中比較重要的資訊作為特徵
值,然後有一個專門儲存影像特徵值的資料庫,將這些特徵資料與資料庫裡的資
料一一比對、過濾,以檢查該影像是否已經註冊;Chen et al.的方法有一個缺點,
就是在特徵資料庫裡必須保存原始影像的特徵值,也就是說特徵資料與資料庫裡
的資料一一比對、過濾時,只能靠著機器本身辨識特徵資料是否有註冊過,無法
像數位浮水印技術可以用肉眼辨識取出的浮水印,証明誰才是智慧財產權之所有
權人。在另一方面,Chang et al.提出一個新的影像版權保護技術,提出方法主要
的特色就是被保護之媒體並不須要任何修改,也就是說受保護的媒體和原來的媒
體品質完全一樣,且以時戳簽章來輔助辨識浮水印產生之先後關係。
在本篇論文中,我們將以實驗數據證明Chang. et al.的方法有一些安全上的
弱點,為了改良Chang. et al.的方法,我們提出兩個數位影像智慧財產權(著作權)
的保護方法,用來解決上面數位浮水印的兩個問題。一個方法是應用在空間域
上,另一個方法是應用在頻率域上。這兩個保護方法的特點在於被保護的影像和
原始影像的品質相同,也就是說未改變影像中像素值的大小,也未將浮水印藏入
被保護的影像內,因此我們將這類的方法稱為數位影像版權保護技術。這兩種數
位影像版權保護技術的基本概念是,先計算影像的特徵值與數位浮水印(代表合
法擁有的圖騰)相結合,將這結合的產物向公正的第三者註冊(簽署時戳簽章)。若
發生智慧財產權(著作權)爭執時,則根據時戳簽章和秘密金鑰還原出來的數位浮
水印,來證明誰才是智慧財產權(著作權)的合法擁有者。在我們所提出的兩個方
法,即使經過數位訊號處理技術處理後,其品質仍在可接受的範圍內時,仍然可
以顯示出數位浮水印,使合法擁有者之權益得以保護。若攻擊者宣稱自已具有合
法者媒體的版權時,則無法顯示出浮水印之影像,因此可以辨識該影像是屬攻擊
的。影像的智慧財產權因而得到驗証與保護。
The enormous popularity and the explosive growth of the World Wide Web demonstrate the commercial potential of offering multimedia resources (such as image, audio, and video) through digital networks. Therefore, the security and copyright issues have become more and more important. Nowadays, it is not quite secure in the design of valuable media. Therefore, this also increases the possibility of making an unlimited number of unauthorized copies, which can seriously endanger the ownership rights. In order to solve above problem, the technology of cryptography, data hiding, copyright protection system for digital image, or digital watermarking become the focus of research. Although the technology of cryptography can overcome many security problems, it must be conquered in the authentication and verification problems for intellectual property right. In these copyright protection schemes, digital watermarking technology is the most common method recently.
The digital watermarking techniques mean that the legal owner embeds his/her watermark (such as trademark, logo, portrait) in the image, which is used to prove the ownership of this image. The watermark must survive standard image modifications (such as blurring, cropping, scaling, rotating, and sharpening) or lossy data compression (such as JPEG compression). Therefore, it can be proven who the legal owner is. It would be detected that the image was embezzled or forged by the illegal user.
The experimental results are presented in this thesis; they are shown that the Chang-Hwang-Hwang scheme is insecure. In order to improve the Chang-Hwang-Hwang watermarking scheme, we propose two copyright protection schemes for digital images. The property of these two copyright protection schemes is that the watermarked image is the same as the original host image. In other word, two protection schemes that they needn’t change the pixels for embedding the watermarks. Therefore, these two methods we proposed are called copyright protection technology for digital image. The basic concepts of these two copyright protection technology for digital image is to extract the characteristic of the image and combine it with the watermark (the copyright declaration) will be signed by a trusted third party (time-stamp signature). When the ownership of image is in dispute, the legal owner may employ the time-stamp signature and the watermark that is extract by the secret key. It can be proven who the legal owner is. In these two methods we proposed, they can be possible to retrieve the watermark after various image processes. If an attacker claims that he has the copyright for digital image held by legal owner, then he can’t retrieve the image of watermark clearly. Therefore, it can be identified this image is illegal. Further, the ownership of the image will be proven.
圖例目錄.............................................................................................................. VI
表格目錄................................................................................................................X
1. 簡介...........................................................................................................................1
1.1 動機.....................................................................................................................1
1.2 數位浮水印的定義.............................................................................................1
1.3 傳統數位浮水印技術.........................................................................................3
1.4 傳統數位浮水印技術的需求.............................................................................4
1.5 數位影像版權保護技術.....................................................................................6
1.6 數位影像版權保護技術的需求.........................................................................6
1.7 目的.....................................................................................................................8
1.8 論文架構.............................................................................................................9
2. 相關研究................................................................................................................10
2.1 在空間域上的數位影像版權保護技術...........................................................11
2.2 在頻率域上的數位影像版權保護技術...........................................................14
2.3 PSNR (PEAK SIGNAL-TO-NOISE RATIO).............................................................18
2.4 位元正確率(BIT CORRECT RATIO)....................................................................19
3. 空間域之數位影像版權保護技術........................................................................20
3.1 前置工作...........................................................................................................20
3.2 我們所提出的空間域之數位影像版權保護技術...........................................20
3.2.1 產生秘密金鑰............................................................................................20
3.2.2 萃取浮水印................................................................................................22
3.3 實驗結果...........................................................................................................23
3.4 討論...................................................................................................................33
4. 頻率域之數位影像版權保護技術........................................................................54
4.1 前置工作...........................................................................................................54
4.1.1 離散餘弦轉換的概念和方法....................................................................54
4.2 我們所提出的頻率域之數位影像版權保護技術...........................................56
4.2.1 產生秘密金鑰............................................................................................56
4.2.2 萃取浮水印................................................................................................58
4.3 實驗結果...........................................................................................................60
4.4 討論...................................................................................................................69
5. 結論.........................................................................................................................89
6. 未來展望................................................................................................................92
參考文獻: .................................................................................................................93
論文發表狀況: .........................................................................................................96
參考文獻:
[1]A. G. Bors and I. Pitas, “Image watermarking using DCT domain constraints,” Proceedings of 1996 IEEE International Conference on Image Processing (ICIP’96), vol. 3, pp. 231-234, 1996.
[2]I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, 6(12):1673-1687, 1997.
[3] C. C. Chang, K. F. Hwang, and M. S. Hwang. “A block based digital watermarks for copy protection of images,” In Proceedings of APCC/OECC’99, pages 977-980, Beijing, October 1999.
[4]M. Kutter, F. Jordan, and F. Bossen. “Digital watermarking of color images using amplitude modulation. Journal of Electronic Imaging,” 7(2):326-332, 1998.
[5]G. Voyatzis and I. Pitas. “Embedding robust watermarks by chaotic mixing,” Proceedings of 13th International Conference on Digital Signal Processing(DSP’97), 1:213-216, 1997.
[6]G. Voyatzis and I. Pitas. “Chaotic mixing of digital images and applications to watermarking. Proceedings of European Conference on Multimedia Applications,” Services and Techniques (ECMAST ‘96), 2:687-695.
[7]C. H. Lee, and Y. K. Lee. “An Adaptive Digital Image Watermarking Technique for Copyright Protection,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 4, Nov 1999, pp. 1005-1015.
[8]S. Craver, N. Memon, B. L. Yeo, and M. Yeung, “Can Invisible Watermarks Resolve Rightful Ownership?” Proc. SPIE Storage and Retrieval for Still Image and Video Databases V, Vol. 3022, 1997, pp. 310-321.
[9]N. Nikolaidis and I. Pitas, “Digital Image Watermarking: an Overview”, ICMCS 99, Volume 1, Florence, Italy, pp 1 -- 6.
[10]C. C. Chang, K. F. Hwang, and Y. Lin. “A Proof of Copyright Ownership Using Moment-preserving,” Proceedings of the 24th International Computer Software and Applications Conference, Taipei, Taiwan, Oct. 2000, pp. 198-203.
[11] W. B. Lee, and T. H. Chen, "A Robust Copyright Protection Scheme for Still Images," Proceedings of 2000 International Computer Symposium Workshop, Dec. 2000, .
[12] B. Schneier, Applied Cryptography. WILEY, 2nd edition, 1996.
[13]H. C. Huang, F. H. Wang, and J. S. Pan, “Efficient and robust watermarking algorithm with vector quantisation,” IEEE Electronics Letters, 21st June 2001 Vol. 37, No. 13, pp. 826-828.
[14]R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A Digital watermark,” Proceedings of IEEE International Conference on Image Processing, Vol. 1, 1994, pp. 86-90.
[15]K. Matsui and K. Tanaka, “Video-Steganography: How to Embed a Signature in a Picture,” Proceedings of IMA Intellectual Property, Jan. 1994, Vol. 1, No. 1, pp. 187-206.
[16]G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image watermarking,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, 1996, pp. 237-240.
[17]C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, Vol. 8, Jan. 1999, pp. 58-68.
[18]I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. “Secure spread spectrum watermarking for Images, Audio, and Video,” NEC Res. Inst., Princeton, NJ, Tech. Rep. 95-10, 1995.
[19]Ping Wah Wong, and Nasir Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE Transactions on Image Processing, Vol 10, No. 10, Oct 2001, pp. 1593-1601.
[20]C. C. Chang, K. F. Hwang, and M. S. Hwang, “A Digital Watermarking Scheme Using Human Visual Effects,” to appear in Informatica.
[21] M. S. Hwang, C. C. Chang, and K. F. Hwang, “A watermarking Technique Based on One-Way Hash Functions,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, 1999, pp. 286~294.
[22]W. Zeng and B. Liu, “On resolving rightful ownerships of digital images by invisible watermarks,” Proceedings of International Conference on Image Processing, 1997, pp. 552-555.
[23]孫宏民,陳孟彰,“無失真數位浮水印技術“,In Proceedings of the Twelfth National Conference on Information Security, page 25-32, 2002.
[24]陳同孝,董俊良,白明弘,“植基於離散餘弦轉換之影像權益保障系統“,In Proceedings of the Ninth National Conference on Information Security, page 1-7, 2001.
[25]陳同孝,吳曉蓉,“植基於向量量化編號法之影像權益保障系統“,In Proceedings of the Ninth National Conference on Information Security, page 75-81, 2001.
[26]張真誠,黃國峰,陳同孝,“電子影像技術“,松崗電腦圖書資料股份有限公司,2000.
[27]陳同孝,張真誠,黃國峰,“數位影像處理技術“,松崗電腦圖書資料股份有限公司,2001.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊