跳到主要內容

臺灣博碩士論文加值系統

(44.192.115.114) 您好!臺灣時間:2023/09/29 21:23
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳界偉
研究生(外文):Jie-Wei Chen
論文名稱:植基於浮水印的錯誤隱藏技術
論文名稱(外文):An Error Concealment Technique Based on Watermarking
指導教授:林信鋒林信鋒引用關係
指導教授(外文):Shin-Feng Lin
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:88
中文關鍵詞:浮水印錯誤隱藏
外文關鍵詞:error concealmentwatermarking
相關次數:
  • 被引用被引用:0
  • 點閱點閱:182
  • 評分評分:
  • 下載下載:13
  • 收藏至我的研究室書目清單書目收藏:1
在本論文中,我們將一張影像分成我們有興趣的部分(ROI),及背景部分(BG),利用離散餘旋演算法取出影像的低頻係數,然後將有興趣部分的低頻係數以浮水印的方式藏入原影像的背景中,當影像在有限頻寬或即時系統中遭受干擾而錯誤時,可利用錯誤隱藏的技術將原影像回復使人眼無法發覺。所以,ROI 部分擁有非常強的抗破壞性,即使整張影像的 ROI 部分都損壞,也可藉由藏在背景中的資訊,來修補 ROI 部分;至於 BG 的部分,則以傳統的錯誤隱藏技術來修補遺失的影像。在影像遭受大量錯誤時,ROI利用 BG 資訊回復影像,但因 BG 遭到大量損毀,以至於無法正確的回復 ROI,在這情況下,我們必須對影像再做後處理,來達到錯誤隱藏的效果。

雖然我們在前處理時預先在 BG 藏入 ROI 的特徵資訊,然而在人眼無法察覺,及不破壞影像的前提下,完成我們的演算法。影像中我們有興趣的部分,具有良好的強韌性,可抵抗因網路傳送錯誤所造成的影像破壞。實驗結果顯示,在前處理時,我們可得到一張失真非常少的影像,而錯誤隱藏完後,可以得到一張看起來無損壞的影像和非常高的 PSNR 值。和傳統的方法比較,我們強調 ROI 的強韌性。本方法美中不足的地方,在影像於高錯誤率中,無法正確地回復 ROI,然而這種情況是非常少見的,即使是傳統的錯誤隱藏法也無法回復這種高錯誤率的影像。
In this thesis, an image is divided into two parts, region of interest (ROI) and background (BG). The discrete cosine transform is utilized to extract low frequency coefficients of an image. The coefficients of ROI are embedded to BG by watermarking technique. When errors occur in limited channel or real time system, they can be recovered by error concealment technique. Even if all ROI are damaged, the information of ROI embedding to BG can be extracted to reconstruct ROI. Therefore, ROI is very robust to congestion channel. As for BG, the traditional error concealment technique is used. When an image suffers a great deal of errors, ROI can be recovered by extracting information from BG. If BG suffers too many serious errors to recover ROI correctly, the postprocess is necessary.

Although ROI coefficients are embedded into BG in advance, it is invisible to the human eyes and doesn’t destroy the image. Simulation results show the original image is only a little bit distortion after embedding ROI coefficients. Finishing error concealment process, the reconstructed image has high visual quality and PSNR value. To compare with traditional techniques, the proposed technique emphasizes robustness of ROI. The proposed technique cannot recover ROI correctly when an image with high damage. Under the circumstance of high error rate, traditional techniques cannot handle, either.
Chapter 1 Introduction
1.1 Problem formulation
1.2 Problem solution
1.3 Thesis organization
Chapter 2 Overview of Basic Techniques
2.1 Overview of JPEG
2.1.1 Introduction to JPEG
2.1.2 JPEG compression technique
2.1.3 Architecture of JPEG
2.1.4 Discrete cosine transform
2.2 Overview of error concealment
2.2.1 Introduction to error concealment
2.2.2 Category of error concealment
2.3 Overview of digital watermarking
2.3.1 Introduction to digital watermarking
2.3.2 Types of watermarking
Chapter 3 Related Works
3.1 Error concealment approach
3.2 Fragile watermarking approach
3.3 Transmission errors over network
3.3.1 Effect of transmission errors in JPEG
3.3.2 Solution of error propagation
Chapter 4 The Proposed Technique
4.1 The architecture of proposed technique
4.2 Preprocess
4.2.1 Region-of-interest
4.2.2 Image randomization
4.2.3 Generating ROI coefficients
4.2.4 Embedding ROI coefficients into BG
4.2.5 Embedding authentication codes
4.3 Error concealment process
4.3.1 Error detection
4.3.2 Extracting the embedded information
4.3.3 Recovery
4.4 Postprocess
Chapter 5 Simulation Results
5.1 The general test
5.1.1 Lena image test
5.1.2 Barbara image test
5.1.3 F16 image test
5.2 Embedding coefficients test
5.2.1 Zelda image test
5.2.2 Lena image test
5.3 ROI selecting test
5.3.1 The body of F16
5.3.2 The tail of F16
5.3.3 The airframe of F16
5.4 Comparison between BNM and the proposed technique
Chapter 6 Conclusion
References
[1] CCITT Recommendation T.81, “Digital Compression and Coding of Continuous-tone Still Images,” 1992.
[2] G. Wallace ,”The JPEG Still Picture Compression Standard,” IEEE Trans. Consumer Elec., vol. 38, no. 1, Feb. 1992, pp. xviii-xxxiii.
[3] CCITT Recommendation H.261, “Video codec for audiovisual services at px64 kbit/s,” 1990.
[4] D. Le Gall, “MPEG: A Video Compression Standard for Multimedia Applications,” Commun. ACM, vol.34, no. 4, Apr. 1991, pp. 46-58.
[5] Petsalis, M.E.; Soleymani, M.R.; Swamy, M.N.S., “Effects of errors and error recovery in images compressed by the JPEG still image compression standard algorithm,” Conference Proceedings., 1994 Canadian Conference on, 1994, Page(s): 396 -400 vol.1.
[6] Wai-Man Lam; Reibman, A.R., “An error concealment algorithm for images subject to channel errors,” IEEE Transactions on, Volume: 4 Issue: 5, May 1995, Page(s): 533 –542.
[7] Lam, W.-M.; Reibman, A.R., “Self-synchronizing variable-length codes for image transmission,” IEEE International Conference on , Volume: 3 , 1992,Page(s): 477 -480 vol.3.
[8] Hemami, S.S., “Robust image transmission using resynchronizing variable-length codes and error concealment,” IEEE Journal on, Volume: 18 Issue: 6, June 2000, Page(s): 927 –939.
[9] Victor DeBrunner, Linda DeBrunner, Longji Wang, and Sridhar Radhakrishnan, The University of Oklahoma, “Error Control and Concealment for Image Transmission,” IEEE Communications Surveys & Tutorials, First Quarter 2000,vol. 3 no. 1.

[10] Yao Wang; Qin-Fan Zhu, “Error control and concealment for video communication: a review,” Proceedings of the IEEE, Volume: 86 Issue: 5, May 1998, Page(s): 974 –997.
[11] W. Kwok and H. Sun, “Multi-Directional Interpolation for Spatial Error Concealment,” IEEE Trans. Consumer Elec., vol. 39, no. 3, Aug. 1993, pp. 45560.
[12] Yeung, M.M.; Mintzer, F., “An invisible watermarking technique for image verification,” Proceedings, International Conference on, 1997, Page(s): 680 -683 vol.2.
[13] Jae-Won Suh; Yo-Sung Ho, “Error concealment based on directional interpolation,” IEEE Transactions on, Volume: 43 Issue: 3, Aug. 1997,Page(s): 295 -30.2.
[14] Vijitha Weerackody, Christine Podilchuk, nad Anthony Estrella, “Transmission of JPEG-coded images over wireless channels,” Bell Labs Technical Journal, 1996.
[15] Victor DeBrunner, Linda DeBrunner, Longji Wang, and Sridhar Radhakrishnan, The University of Oklahoma, “Error Control and Concealment for Image Transmission,” IEEE Communicarions, Surveys and Tutorials, The electronic magazine of original poor-reviewed survey articles.
[16] Zhou Wang; Yinglin Yu; Zhang, D., “Best neighborhood matching: an information loss restoration technique for block-based image coding systems,” IEEE Transactions on, Volume: 7 Issue: 7, July 1998, Page(s): 1056 –1061.
[17] Jong Wook Park; Jong Won Kim; Sang Uk Lee, “DCT coefficients recovery-based error concealment technique and its application to the MPEG-2 bit stream error,” IEEE Transactions on, Volume: 7 Issue: 6, Dec. 1997,Page(s): 845 –854.
[18] Eugene T. Lin and Edward J. Delp, “A Review of Fragile Image Watermarks,” Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering, Purdue University, 1999.
[19] Fridrich, J., Goljan, M., Baldoza, A. C., “New Fragile Authentication Watermark for Images,” In Proc. ICIP, Vancouver, Canada, September, 2000.

[20] Ching-Yung Lin and Shih-Fu Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” Department of Electrical Engineering Columbia University, New York, NY 10027, USA, 2000.
[21] Fridrich, J., “A hybrid watermark for tamper detection in digital images,” Signal Processing and Its Applications, 1999. ISSPA '99. Proceedings of the Fifth International Symposium on, Volume: 1, 1999, Page(s): 301 -304 vol.1.
[22] Fridrich, J.; Goljan, M., “Images with self-correcting capabilities,” International Conference on, Volume: 3, 1999, Page(s): 792 -796 vol.3.
[23] Shao Yafei; Zhang Li; Wu Guowei; Lin Xinggang, “Reconstruction of missing blocks in image transmission by using self-embedding,” Proceedings of 2001 International Symposium on, 2001, Page(s): 535 –538.
[24] Peng Yin; Bede Liu; Yu, H.H., “Error concealment using data hiding,” IEEE International Conference on, Volume: 3, 2001, Page(s): 1453 -1456 vol.3.
[25] Yu, H.H.; Peng Yin, “Multimedia data recovery using information hiding,” IEEE, Volume: 3, 2000, Page(s): 1344 -1348 vol.3.
[26] Jue Wang; Liang Ji, “A region and data hiding based error concealment scheme for images,” IEEE Transactions on, Volume: 47 Issue: 2, May 2001,Page(s): 257 –262.
[27] Jae-Won Suh; Yo-Sung Ho, “Error concealment based on directional interpolation,” IEEE Transactions on, Volume: 43 Issue: 3, Aug. 1997,Page(s): 295 –302.
[28] Bhattacharyya, K.; Jamadagni, H.S., “DCT coefficient-based error detection technique for compressed video stream,” IEEE International Conference on, Volume: 3, 2000, Page(s): 1483 -1486 vol.3.
[29] Ancis, M.; Giusto, D.D., “Reconstruction of missing blocks in JPEG picture transmission,” IEEE Pacific Rim Conference on, 1999, Page(s): 288 –291.
[30] Shirani, S.; Kossentini, F.; Ward, R., “Error concealment methods, a comparative study,” IEEE Canadian Conference on, Volume: 2, 1999, Page(s): 835 -840 vol.2.

[31] Wang, Y.; Zhu, Q.-F.; Shaw, L., “Maximally smooth image recovery in transform coding,” Communications, IEEE Transactions on , Volume: 41 Issue: 10 , Oct. 1993,Page(s): 1544 –1551.
[32] Kwok, W.; Sun, H., “Multi-directional interpolation for spatial error concealment,” IEEE Transactions on, Volume: 39 Issue: 3, Aug. 1993, Page(s): 455 –460.
[33] Aign, S.; Fazel, K., “Temporal and spatial error concealment techniques for hierarchical MPEG-2 video codec,” IEEE International Conference on, Volume: 3, 1995, Page(s): 1778 -1783 vol.3.
[34] Myeong-Hoon Jo; Woo-Jin Song, “Error concealment for MPEG-2 video decoders with enhanced coding mode estimation,” Consumer Electronics, IEEE Transactions on, Volume: 46 Issue: 4, Nov. 2000, Page(s): 962 –969.
[35] Fridrich, J., Goljan, M., Memon, N., “Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme,” In Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2000, 428-437.
[36] Fridrich, J., Goljan, M., Memon, N., “Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique,” Submitted to the Journal of Electronic Imaging, March, 2000.
[37] Ismaeil, I.; Shirani, S.; Kossentini, F.; Ward, R., “An efficient, similarity-based error concealment method for block-based coded images,” International Conference on, 2000, Page(s): 388 -391 vol.3.
[38] Wong, W.Y.; Cheng, A.K.Y.; Ip, H.H.S., “Concealment of damaged blocks by neighborhood regions partitioned matching,” International Conference on, Volume: 2, 2001, Page(s): 45 -48 vol.2.
[39] C. Christopoulos, J. Askelof and M. Larsson, “Efficient methods for encoding regions of interest in the upcoming JPEG2000 still image coding standard,” IEEE Signal Processing Letters, September 2000.
[40] Jiwu Huang; Shi, Y.Q., “Embedding gray level images,” The 2001 IEEE International Symposium on, Volume: 5, 2001, Page(s): 239 -242 vol. 5.

[41] Jaejin Lee; Chee Sun Won, “Image integrity and correction using parities of error control coding,” IEEE International Conference on, Volume: 3, 2000, Page(s): 1297 -1300 vol.3.
[42] Farzam, M.; Shirani, S., “A robust multimedia watermarking technique using Zernike transform,” IEEE Fourth Workshop on, 2001, Page(s): 529 –534.
[43] Vijitha Weerackody, Christine Podilchuk, nad Anthony Estrella, “Transmission of JPEG-coded images over wireless channels,” Bell Labs Technical Journal, 1996.
[44] Yeung, M.M.; Mintzer, F., “An invisible watermarking technique for image verification,” International Conference on, 1997, Page(s): 680 -683 vol.2.
[45] Tien-Hsu Lee; Hsiu-Hua Hsu; Pao-Chi Chang, “Restart marker regulation technique for progressive JPEG image coding in mobile communications,” IEEE Communications Letters, Volume: 4 Issue: 12, Dec. 2000, Page(s): 411 -413 .
[46] Yi-Huang Han; Jin-Jang Leou, “Detection and correction of transmission errors in JPEG images,” IEEE Transactions on, Volume: 8 Issue: 2, April 1998, Page(s): 221 –231.
[47] Min Wu; Bede Liu, “Watermarking for image authentication,” International Conference on, Volume: 2, 1998, Page(s): 437 -441 vol.2.
[48] Christopoulos, C.; Skodras, A.; Ebrahimi, T.,” The JPEG2000 still image coding system: an overview,” Consumer Electronics, IEEE Transactions on, Volume: 46 Issue: 4, Nov. 2000,Page(s): 1103 –1127.
[49] Moccagatta, I.; Soudagar, S.; Liang, J.; Chen, H.,”Error-resilient coding in JPEG-2000 and MPEG-4,” IEEE Journal on, Volume: 18 Issue: 6, June 2000, Page(s): 899 –914.
[50] Diego Santa-Cruz, Raphaël Grosbois and Touradj Ebrahimi.,”JPEG 2000 performance evaluation and assessment,” Signal Processing: Image Communication, pages 113-130, volume 17, no. 1, 2002.
[51] Diego Santa-Cruz, Touradj Ebrahimi, Joel Askelöf, Mathias Larsson and Charilaos Christopoulos. “JPEG 2000 still image coding versus other standards,” In Proc. of the SPIE's 45th annual meeting, Applications of Digital Image Processing XXIII, volume 4115, pages 446-454, San Diego, California, Jul. 30-Aug. 4, 2000.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 18.林東泰(1991):大眾傳播與公共宣導-以能源政策宣導為例的構形評估研究,社會教育學刊,20期:89-160。
2. 16.黃琪璘,(1999),一項值得社會行銷的產品-健康的生活型態,國教之聲,33:1,18-26。
3. 17.鄭麗嬌,(1995),社會行銷理論在科技政策之應用--美國太空總署太空梭發射計畫之個案研究,政治科學論叢,6期:223--258。
4. 15.蔡敦浩,(1981),社會行銷的倫理構面,企銀季刊,4:4,125-128。
5. 13.洪英正,(1992),行銷觀念的擴大--社會行銷理論的整理與啟示,思與言,30卷,3期:87-105。
6. 12.洪順慶、邱創棟,(1991),理念行銷之分類與策略,管理評論,75-102。
7. 10.林東泰,(1996),社會行銷的理論與實務,社會教育學刊,25:49-75。
8. 9.黃俊英、耿筠,(民85),社會行銷之起源及發展,文大商管學報,1卷1期:1-21 。
9. 8.陳愷,(1991),從政策執行理論的發展談衡量政策執行續效的指標: 順服,中國行政,49期:37-63
10. 7.段重祺,(1984),公共政策與民眾順服,公共政策學報,7期:60-79。
11. 6.鄭勝分,(1997),臺灣環境管制政策研究:社區主義的觀點,中國行政評論,6卷2期:111-126。
12. 5.蔡勳雄,(1999),環保政策與經濟發展,政策月刊,44期:21-23。
13. 4.周育仁,(1994),美國政府對企業之管制政策,美國月刊,9卷3期:95-101。
14. 2.柯三吉,(1985),社會福利政策之執行:高雄市就業服務執行的個案分析,公共政策學報,8期:176-243。
15. 1.丘昌泰,(1995),我國環境管制政策之研究:政策管理體系的觀點,法商學報,31期:72-111。