跳到主要內容

臺灣博碩士論文加值系統

(3.238.204.167) 您好!臺灣時間:2022/08/09 22:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:楊鑫崙
研究生(外文):Xin-Lun Yang
論文名稱:植基於小波技術之多頻帶偵測浮水印方法
論文名稱(外文):A DWT-based Watermarking Scheme with Multi-bands’ Detection
指導教授:林信鋒林信鋒引用關係
指導教授(外文):Shinfeng David Lin
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:118
相關次數:
  • 被引用被引用:0
  • 點閱點閱:100
  • 評分評分:
  • 下載下載:14
  • 收藏至我的研究室書目清單書目收藏:1
摘要
這篇論文提出了一個可行的小波浮水印方法,這個方法的設計理念是希望能從小波次頻帶中較穩定的分佈趨勢來判斷所要擷取的浮水印。浮水印嵌入的方式是根據係數能被修改的能力來修改同一頻帶的所有係數。係數修改方式的設計則是基於數位影像離散小波轉換係數的觀察與實作。
文中並提到各種不同的影像攻擊方式是如何影響影像的離散小波轉換係數及如何從未被破壞的頻帶中擷取出浮水印。另外我們也發現:即使是使用同一種嵌入方式,不同的取出方法會有不同的效果。
實驗結果顯示這個方法的設計理念是正確的,而它的強健性也足以抵抗大部分的影像處理破壞,而我們對小波係數和影像破壞的觀察分析及浮水印的取出策略將可提供未來相關研究的重要參考。
Abstract
A feasible DWT-based watermarking scheme is proposed in this thesis. The scheme is designed based on the idea of extracting watermark from those stable trends of DWT subbands’ distribution. The watermark is embedded by modifying all coeffi-cients of each subband according to their modifiable capacity. The modification of coefficients is based on aspect of implementation and observation on DWT in digital image.
It is also mentioned that how different attacks influence the ability of watermark scheme under similar structure and how the watermark extracted from those undam-aged subbands. In addition, even using the same embedding process, different ex-tracting steps would make different results.
Experimental results demonstrate that the idea is accurate. The proposed method is robust enough to tolerate most of image-processing operations. Besides, the obser-vation and analysis of DWT coefficients and attack behaviors are import reference to relate research work.
Contents
Chapter 1 Introduction………………………………………………1
1.1 Motivation…………………………………………………………1
1.2 Digital Watermarking Classification…………………………2
1.3 Thesis Organization………………………………………………5
Chapter 2 Background…………………………………………………6
2.1 Watermarking Requirements………………………………………6
2.2 Structure of An Invisible Robust Watermarking System…9
2.3 Performance Measurement………………………………………11
Chapter 3 Observation on DWT Coefficients……………………13
3.1 The Range of Haar DWT Coefficients…………………………13
3.2 Base Amount of Modification…………………………………15
3.3 Modifiable Capacity of Coefficients………………………18
Chapter 4 The Proposed Watermarking Scheme……………………23
4.1 Watermark Embedding Algorithm………………………………25
4.2 Watermark Extracting Algorithm………………………………30
Chapter 5 Experiment Analysis……………………………………34
5.1 JPEG Compression…………………………………………………44
5.2 Noise………………………………………………………………45
5.3 Blur and Sharpen…………………………………………………46
5.4 Histogram Distribution…………………………………………47
5.5 Edge Detections and Invert……………………………………49
5.6 Geometry Distortions and Tamper……………………………50
5.7 Summary of Experiment…………………………………………50
Chapter 6 Conclusion and Future Works…………………………52
References………………………………………………………………53
Appendix……………………………………………………………56
References
[1]B. Schneier, Applied Cryptography, 2nd Edition, John Wiley & Sons, 1996.
[2]D. E. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
[3]M. Kutter, "Digital Watermarking: Hiding Information in images", Ph.D. thesis 2045, Swiss Federal institute of Technology, Lausanne, Switzerland, 1999.
[4]H. Berghel and L. O'Gorman, "Protecting Ownership Rights through Digital Watermarking", IEEE Computer Mag., PP.101-103, July 1996.
[5]M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multimedia Data-Embedding and Watermarking Technologies", Proc. IEEE, Vol. 86, PP.1064-1087, June 1998.
[6]S. J. Lee and S. H. Jung, "A Survey of Watermarking Techniques Applied to Multimedia", IEEE International Symposium on Industrial Electronics, Vol. 1, 2001.
[7]F. Mintzer, G. W. Braudaway and M. M. Yeung, "Effective and Ineffective Digital Watermarks", International Conference on Image Processing, Vol. 3, PP. 9-12, 1997.
[8]F. Mintzer, G. W. Braudaway and M. M. Yeung, "Digital Watermarking for High-quality Imaging", IEEE First Workshop on Multimedia Signal Processing, PP. 357-362, 1997.
[9]F. C. Mintzer, L. E. Boyle, A. N. Cazes, B. S. Christian, S. C. Cox, F. P. Giordano, H. M. Gladney, J. C. Lee, M. L. Kelmanson, A. C. Lirani, K. A. Magerlein, A. M. B. Pavani, and F. Schiattarella, "Toward on-line, Worldwide Access to Vatican Library Materials", IBM Journal of Research and Development, Vol. 40, 1996.
[10]G. W. Braudaway, K. A. Magerlein, and F. C. Mintzer, "Protecting Publicly-Available Images with A Visible Image Watermark", SPIE Conference on Optical Security and Counterfeit Deterrence Techniques, Vol. SPIE 2659, PP. 126-132, Feb. 1996.
[11]M. S. Kankanhalli and K. R. Ramakrishnan, "Adaptive Visible Watermarking of Images", IEEE International Conference on Multimedia Computing and Systems, Vol. 1, 1999.
[12]S. P. Mohanty, K. R. Ramakrishnan and M. S. Kankanhalli, "A DCT Domain Visible Watermarking Technique for Images", IEEE International Conference on Multimedia and Expo, Vol. 2, PP. 1029-1032, 2000.
[13]Y. Hu and S. Kwong, "Wavelet Domain Adaptive Visible Watermarking", ELECTRONICS LETTERS, 27th, Vol. 37, No. 20, Sep. 2001.
[14]M. M. Yeung and F. Mintzer, "An Invisible Watermarking Technique for Image Verification", IEEE Conference on Image Processing, Vol. 2, PP. 680-683, 1997.
[15]J. Fridrich, "Methods for Detecting Changes in Digital Images", Proc. IEEE Int. Workshop on Intell. Signal Processing and Communication Systems, 1998.
[16]D. kundur and D. Hatzinakos, "Digital Watermarking for TellTale Tamper Proofing and Authentication", Proceedings of the IEEE, Vol. 87, PP. 1167 -1180, 1999.
[17]C. S. Lu, H. Y. Mark Liao and C. J. Sze, "Combined Watermarking for Image Authentication and Protection", IEEE Int. Conf. on Multimedia and Expo, Vol. 3, PP. 1415 -1418, 2000.
[18]C. S. Lu, H. Y. Mark Liao and L. H. Chen, "Multipurpose Audio Watermarking", Proc. 15th Int. Conf. on Pattern Recognition, Vol. 3, PP. 282 -285, 2000.
[19]C. T. Hsu and J. L. Wu, "Hidden Digital Watermarks in Images", IEEE Trans. Image Processing, Vol. 8, No. 1, PP. 58-68, 1999.
[20]W. N. Lie and L. C. Chang, "Spatial-Domain Image Watermarking By Data Embedding At Adaptive Bit Positions", 12th IPPR Conference on Computer, Vision, Graphics and Image Processing, PP. 16 -21, 1999.
[21]S. C. Pei, Y. H. Chen and R. F. Torng, "Digital Image and Video Watermarking Utilizing Just-Noticeable-Distortion Model", 12th IPPR Conference on Computer Vision, Graphics and Image Processing, PP. 174 -182, 1999.
[22]M. Piva, F. Barni and V. Cappellini, "DCT Based Watermarking Recovering without Resorting t the Uncorrupted Original Image", Proc. of IEEE Inter. Conf. on Image Processing, Vol. 1, PP. 520-523, 1997.
[23]W. C. Cheng, C. W. Chu and J. S. Wang, "A Robust Watermarking Method on Discrete Cosine Transform Domain", 12th IPPR Conference on Computer Vision, Graphics and Image Processing, PP. 191 -198, 1999.
[24]S. D. Lin and C. F. Chen, "A Robust DCT-based Watermarking for Copyright Protection", Consumer Electronics, IEEE Trans. Vol. 46, PP. 415 -421, Aug. 2000.
[25]J. Onishi and K. Matsui, "A Method of Watermarking with Multiresolution Analysis and PN Sequence", Trans. of IEICE (D-II), Vol. J80-D-II, No.11, PP. 3020, 1997.
[26]H. Inoue, A. Miyazaki, A. Yamamoto and T. Katsura, "A digital watermark based on the wavelet transform and its robustness on image compression", ICIP 98, Proceedings, Vol. 2, PP.391 -395, 1998.
[27]Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, and Hong-Yuan Mark Liao, "Cocktail Watermarking for Digital Image Protection", IEEE Transactions on Multimedia, Vol. 2, No. 4, PP. 209 -224, Dec. 2000.
[28]D. Chai and A. Bouzerdoum, "JPEG2000 Image Compression: An Overview", 7th Australian and New Zealand Intelligent Information Systems Conference, Nov. 2001.
[29]C. C. Chang, K. F. Hwang and Y. Lin, "A Proof of Copyright Ownership Using Moment-preserving", The 24th Annual International Computer Software and Applications Conference, PP. 198-203, 2000.
[30]M. Alghoniemy and A. H. Tewfik, "Image Watermarking by Moment Invariants", International Conference on Image Processing, Vol. 2, PP. 73-76 2000.
[31]M. Alghoniemy and A. H. Tewfik, "Geometric Distortion Correction Through Image Normalization", IEEE International Conference on Multimedia and Expo, Vol. 3, PP. 1291-1234, 1999.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top