跳到主要內容

臺灣博碩士論文加值系統

(18.208.126.232) 您好!臺灣時間:2022/08/12 01:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張惎紘
研究生(外文):Ji-Hong Chang
論文名稱:以簽章保障所有權之條碼數位浮水印系統
論文名稱(外文):Image Copyright Protection Using Bar-Code Watermark System with Digital Signature
指導教授:張隆紋張隆紋引用關係
指導教授(外文):Long-Wen Chang
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:26
中文關鍵詞:數位簽章資料隱藏數位浮水印條碼所有權保護RSA加密法SHA-1雜湊函數
外文關鍵詞:Digital SignatureData HidingDigital WatermarkBar-CodeCopyright ProtectionRSA CryptographySHA-1 Hash Function
相關次數:
  • 被引用被引用:1
  • 點閱點閱:233
  • 評分評分:
  • 下載下載:43
  • 收藏至我的研究室書目清單書目收藏:0
本論文以1024-bits RSA加密法保護交易的訊息,再以數位簽章處理買賣方(buyer-seller)的問題,防止買方非法散佈以及賣方假造散佈;然後將簽章編成條碼(bar-code)當作浮水印嵌入,使其具有相當高的錯誤矯正能力,只要從被破壞的影像中析出的浮水印相似度(Similarity)還在某個標準之上就可完全回復其文字型態的內容。
以條碼當作浮水印是一種完全創新的想法,以往強固性浮水印是將一個商標(meaningful logo)當作浮水印嵌入,並輔以錯誤矯正碼(error correcting code)修復破壞後的結果。而如果將要藏入的文字訊息先編成條碼,其承受破壞的能力將遠超過任何一種錯誤矯正碼,原因在於條碼才是真正有序的圖形,所謂的meaningful logo只對人眼有意義,圖檔本身其實是無序的,所以條碼可根據本身所具有的一些規則擁有強大的自我修復能力,這是使用meaningful logo再加上錯誤矯正碼也做不到的要求,這點在實驗的結果中很明顯地呈現出來。
In this thesis, we use 1024-bits RSA cryptography to protect the trade messages. We also use digital signature to prevent a buyer from unauthorized copies and to prevent a seller from forged unauthorized copies. We encode the signature with bar-code and embed the bar-code image into the original image. As long as the similarity of watermark extracts from the damaged image over a threshold, the signature can be fully recovered.
It is a new idea to bring the bar-code concept into the watermark system. The general method of robust watermark that people would utilize is to embed a meaningful logo into an image and correct the damaged watermark with error correcting code (ECC). Our simulation shows that the proposed algorithm gets much better results than that with ECC.
Abstract iv
1. Introduction 1
2. Preliminary 3
2.1 Discrete Cosine Transform 3
2.2 The RSA Algorithm 5
2.3 Introduction of Bar-Code 6
3. The Proposed Bar-Code Watermarking System 7
3.1 The Bar-Code Mechanism 7
3.2 The Verifying Procedure 10
3.3 The Watermark Embedding Procedure 12
3.4 The Watermark Extraction Procedure 15
4. Experimental Results 17
5. Conclusion 25
Bibliography 26
[1] Ko-Ming Chan, “Public Watermarking System based on Wavelet Transform with Cryptographic and Self-Correcting Watermark”, Department of Computer Science National Tsing Hua University, 2001.
[2] 國科會計劃,計劃主持人:賴溪松、邱榮輝、孫宏民教授,「資訊學門-資訊安全研究發展」規劃報告,Dec. 1999.
[3] N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proceedings, IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 4, May 1996, pp. 2168-2171.
[4] S. Craver, N. Memon, B. L and M. M Yeung “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in Communications, Vol. 16 Issue: 4, May 1998, pp. 573 —586.
[5] Houng-Jyh Wang and C.-C. Jay Kuo, "Image Protection via Watermarking on Perceptually Significant Wavelet Coefficients." IEEE 1998 Workshop on Multimedia Signal Processing, Redondo Beach, CA., Dec. 7-9, 1998.
[6] R. Rivest, A. Shamir, and L. Strawczynski, “A Method for Obtaining Digital Signature and Public-Key Cryptosystem,” Communication of the ACM, vol. 21, no. 2, Feb. 1978.
[7] Siang-Gen Sia, Charles G. Boncelet, and Gonzalo R. Arce, “A Multi-resolution Watermark for Digital Image,” in IEEE 1997.
[8] S. B. Wicker and V. K. Bhargava (eds.), Reed-Solomon Codes and Their Applications, IEEE Press, 1994.
[9] W. Stallings, "Cryptography and network security: principles and practice, 2nd Edition." Prentice Hall, 1999.
[10] Bruce Schneier, "Applied Cryptography", Second Edition, John Wiley & Sons, 1996.
[11] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, " Secure Spread Spectrum Watermarking for Multimedia", IEEE Transaction on Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
[12] C.-T. Hsu and J.-L. Wu, "Hidden Digital Watermarks in Images, "IEEE Transactions on Image Processing, Vol. 8,No. 1, pp.58-68, Jan. 1999.
[13] Kuo-Shing Liu, “Designing A Distributed RSA User System”, College of Management National Chiao Tung University, June 1992.
[14] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, Addison Wesley, 1992.
[15] Ping Wath Wong, Nasir Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification”, IEEE Transactions on Image Processing, Vol. 10, No. 10, pp 1593-1601, OCTOBER 2001.
[16] Chiou-Ting Hsu, Ja-Ling Wu, “Hidden Digital Watermarks in Images”, IEEE Transactions on Image Processing, Vol. 8, No. 1, pp 58-68, January 1999.
[17] Nasir Memon, Ping Wah Wong, “A Buyer-Seller Watermarking Protocol”, IEEE Transactions on Image Processing, Vol. 10, No. 4, pp 643-649, April 2001.
[18] Hiroo Wakaumi, Takatoshi Komaoka, Eiji Hankui, “Grooved Bar-Code Recognition System with Tape-Automated-Bonding Head Detection Scanner”, IEEE Transactions on Magnetics, Vol. 36, No. 1, pp 366-370, January 2000.
[19] 商品條碼應用手冊,中華民國商品條碼策進會/經濟部商業司,1993
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top