(3.236.175.108) 您好!臺灣時間:2021/02/28 02:51
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:吳皇欣
研究生(外文):Huang-Hsin Wu
論文名稱:利用離散餘弦轉換與錯誤控制方法作數位浮水印
論文名稱(外文):Digital Watermarking using DCT and Error Control Scheme
指導教授:范國清范國清引用關係
指導教授(外文):Kuo-Chin Fan
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:74
中文關鍵詞:數位浮水印資料隱藏離散餘弦轉換錯誤控制理德-索羅門碼
外文關鍵詞:Digital WatermarkData HidingDiscrete Cosine TransformError ControlReed-Solomon Code
相關次數:
  • 被引用被引用:0
  • 點閱點閱:65
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1

隨著通訊網路的快速發展,多媒體的檔案能夠輕鬆地被大眾廣為流傳、散播。由於數位產品相當容易遭到複製,所以未被授權的複製品和電子文件將會是真正的挑戰。為了防止非法剽竊的行為且保障合法認證不被侵犯,數位浮水印技術是相當迫切需要的。
我們提出了一個結合兩個方法的系統,一方面是將二值化後的浮水印影像,利用修改經過量化後的中頻係數來作隱藏,另一方面是使用錯誤更正方法,也就是Reed-Solomon codes,來增加對於非法的攻擊之強韌性。前者的方法具有能夠在經過破壞性的壓縮後仍能倖存的能力,其中的破壞性壓縮如:JPEG或JPEG2000;而後者則能夠抵抗突發性或連續性的雜訊,像是影像處理中的裁切,且還可能對於前面提到的對破壞性壓縮的抵抗力有所助益。實驗的結果證實了我們提出數位浮水印方法的可行性與可靠性。


The rapid growth of communication networks allows the widespread distribution of multimedia data in various ways. Since the digital productions are easy to be duplicated, the discouraging unauthorized clone and the illegal distributing of electronic documents are the issues that have to be resolved. For the purpose of protection against the pirate, digital watermarking techniques are emerged to defend the authentication to be infringed.
In this thesis, we present a combined approach that embeds a binary watermark by selectively modifying the quantized middle-frequency coefficients and use an error control scheme, namely Reed-Solomon codes, to increase the robustness of prevention of illegal attacks. The former is capable of surviving in the lossy compression, such as JPEG or JPEG2000, and the latter owns the ability of resisting burst noise, such as image cropping while increasing the affection of the former.
Experimental results demonstrate that our proposed digital watermarking approach is feasible and effectiveness.



Chapter 1 Introduction4
1.1Motivation4
1.2 Basic watermarking principles5
1.3 System overview7
1.4 Organization of thesis10
Chapter 2 Related Works12
2.1 Related survey of watermark12
2.2 Related survey of error control schemes14
Chapter 3 Proposed Watermarking Algorithm17
3.1 Embedding Method17
3.1.1 Discrete Cosine Transform17
3.1.2 Quantization19
3.1.3 Reed-Solomon Codes21
3.1.4 Shuffling31
3.1.5 Embedding Process31
3.1.6 Inverse DCT34
3.2 Extracting Method35
Chapter 4 Experimental Results36
4.1 Experimental environment40
4.2 Experimental result 142
4.2.1 Image cropping operation42
4.2.2 Image blurring operation44
4.2.3 JPEG47
4.2.4 JPEG 200049
4.3 Experimental result 252
4.3.1 Image cropping operation53
4.3.2 Image blurring operation54
4.3.3 JPEG55
4.3.4 JPEG200057
4.4 Experimental result 359
4.4.1 Image cropping operation60
4.4.2 Image blurring operation61
4.4.3 JPEG62
4.4.4 JPEG200064
Chapter 5 Conclusions and Future works66
5.1 Conclusions66
5.2 Future works67
References68


[1]Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. “Information Hiding─A survey”, Proceedings of the IEEE , Volume: 87 Issue: 7 , July 1999 Page(s): 1062 -1078[2]Decker, S. “Engineering Considerations in Commercial Watermarking”, IEEE Communications Magazine , Volume: 39 Issue: 8 , Aug. 2001 Page(s): 128 -133[3]Van Schyndel, R.G.; Tirkel, A.Z.; Osborne, C.F. “A digital watermark”, Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference, Volume:2 , 1994 Page(s): 86 -90 vol.2[4]Cox, I.J.; Kilian, J.; Leighton, T.; Shamoon, T. “Secure spread spectrum watermarking for images, audio and video”, Image Processing, 1996. Proceedings., International Conference on , Volume: 3 , 1996 Page(s): 243 -246 vol.3[5]Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. “Secure spread spectrum watermarking for multimedia”, Image Processing, IEEE Transactions on , Volume: 6 Issue: 12 , Dec. 1997 Page(s): 1673 -1687[6]De Vleeschouwer, C.; Delaigle, J.-F.; Macq, B. “Invisibility and Application Functionalities in Perceptual Watermarking─An Overview”, Proceedings of the IEEE , Volume: 90 Issue: 1 , Jan. 2002 Page(s): 64 -77[7]Hernandez, J.R.; Amado, M.; Perez-Gonzalez, F. “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure”, Image Processing, IEEE Transactions on , Volume: 9 Issue: 1 , Jan. 2000 Page(s): 55 -68[8]Langelaar, G.C.; Lagendijk, R.L. “Optimal differential energy watermarking of DCT encoded images and video”, Image Processing, IEEE Transactions on , Volume: 10 Issue: 1 , Jan. 2001 Page(s): 148 -158[9]Shapiro, J.M. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients”, Signal Processing, IEEE Transactions on , Volume: 41 Issue: 12 , Dec. 1993 Page(s): 3445 -3462[10]Alturki, F.; Mersereau, R. “Secure blind image steganographic technique using discrete Fourier transformation”, Image Processing, 2001. Proceedings. 2001 International Conference on , Volume: 2 , 2001 Page(s): 542 -545 vol.2[11]H. Liu, H. Ma, M. El Zarki, and S. Gupta, “Error control schemes for networks: An overview,” ACM Mobile Networking and applications (MONET), vol. 2, no. 2, pp. 167-182, 1997.[12]Andrew S. Tanenbaum, “Computer Networks”, Prentice Hall 1996.[13]Sklar, B., “Digital Communications: Fundamentals and Applications” Second Edition (Upper Saddle River, NJ: Prentice-Hall, 2001).[14]Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L. “Watermarking digital image and video data. A state-of-the-art overview” IEEE Signal Processing Magazine , Volume: 17 Issue: 5 , Sept. 2000 Page(s): 20 -46

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔