(3.237.20.246) 您好!臺灣時間:2021/04/15 12:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:劉議隆
研究生(外文):Yi-Long Liu
論文名稱:數位影像傳輸與驗證技術之研究
論文名稱(外文):The Techniques of Digital Image Transmission and Authentication
指導教授:張真誠張真誠引用關係
指導教授(外文):Chin-Chen Chang
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:58
中文關鍵詞:漸進式影像傳輸影像認證
外文關鍵詞:progressive image transmissionimage authentication
相關次數:
  • 被引用被引用:0
  • 點閱點閱:221
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著網際網路的快速發展,有越來越多的公司及網站提供了許多如:數位圖書館、數位影像資料庫及數位照片展覽館等等的數位資訊服務。有許多的影像都被數位化後在各種網路上傳送著。因此,便產生了兩個關於數位影像傳輸的課題:漸進式影像之傳輸與數位影像之驗證。
因為當今的網路上到處都是數位影像,於是如何減少傳輸數位影像所需要的傳輸量也就成了一個大問題。如果人們可以在收到少部分的數位影像資訊時就可以知道這張數位影像是否是他/她所需要的,則網路的傳輸量也就會因此減少了。當我們對數位影像加以漸漸式傳輸的處理,接收者就可以在收到少量的資訊時知道數位影像大概的輪廓,於是漸進式影像傳輸的技術即是我們需要探討的方向。因此在本篇論文的前半部分即是在找尋一種新的漸進式影像傳輸的方法。
而在本篇論文的後半部分,我們則在探討數位影像驗證的課題。因為數位影像的取得在現在的網路環境中十分的方便。使用者可以輕易的下載一張數位影像並在影像中加以修改並且辯稱他/她擁有本張數位影像所有權。因此需要一種數位影像驗證的機制來保障創作者的所有權及智慧財產權。所以本篇論文提出了一個可以抵抗一般影像處理的數位影像認證方法來達到保護創作者的所有權及智慧財產權之目的。

With the rapid growing development of the Internet, there are more and more companies and organizations to provide digital services such as digital libraries, image database, and digital picture exhibition center and so on. A lot of images are digitized and transmitted on the Internet, Intranet or other types of networks. Thus, there are two issues occurred: digital image transmission and digital image protection.
Due to that the network is full of digital images, how to decrease the transmission amount of data becomes a big problem. If people could know which image is the one he/she wants with little transmitted information, the transmission amount of network will be decrease. By applying progressive image transmission method to digital image, the receiver could know the contour of the image in little transmitted information. Thus, a progressive image transmission method is essentials here. This thesis looks for a new progressive image transmission method in the first part.
The rest of this thesis looks for an image authentication method. Because of digital images can be downloaded everywhere. The user can download any digital image and make some manipulation on it easily. Hence, the forger can pretend that he/she owns the copyright of this image. Therefore, an appropriate mechanism such as image authentication method is essential to protect intellectual property rights or copyrights. This thesis proposed a block-based robust image authentication scheme using vector quantization encoding. And the proposed scheme can withstand regular image processing operations.

Chapter 1 Introduction 1
1.1 Research Motivation 1
1.2 Related Concepts 3
1.2.1 Bit-Plane Method (BPM) 3
1.2.2 Improved Bit-Plane Method (IBPM) 5
1.3 Thesis Organization 6
Chapter 2 Related Works 7
2.1 Singular Value Decomposition (SVD) 7
2.2 Vector Quantization (VQ) 10
2.2.1 Training Step 11
2.2.2 Encoding Step 12
Chapter 3 Progressive Image Transmission Using Singular Value Decomposition 16
3.1 The Proposed Method 17
3.2 Decomposition Step 18
3.3 Quantization Step 19
3.3.1 Direct 8-bit Quantization 19
3.3.2 Truncation 21
3.3.3 Bit Reduction Quantization 23
3.4 Sending Step 25
3.5 Combination Step 25
3.6 Experiments 26
3.6.1 Progressive Transmission Result 26
3.6.2 A Comparison of BPM and IBPM 30
3.6.3 Comparison with the Direct 8-bits method 32
Chapter 4 A Block-based Robust Image Authentication Scheme Using Vector QuantizationEncoding 34
4.1 The Proposed Method 35
4.2 PCA VQ-Codebook 36
4.3 Feature Extraction 37
4.4 Image Authentication 40
4.5 Experiments and Results 43
4.5.1 Image Authentication Part 43
4.5.2 Robustness Test Part 49
Chapter 5 Conclusions 54

[1] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, No. 6, Jun. 2002, pp. 585-595.
[2] D. H. Bailey., “Extra-High Speed Matrix Multiplication on the Cray-2,” SIAM Journal on Scientific and Statistical Computing, vol. 9, no. 3, May 1988, pp. 603-607.
[3] C. C. Chang, F. C. Shine, and T. S. Chen, “A New Scheme of Progressive Image Transmission Base on Bit-Plane Method,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, Beijing, China, 1999, pp. 892-895.
[4] T. S. Chen and C. C. Chang, “Progressive Image Transmission Using Side Match Method,” Information Systems and Technologies for Network Society, World Scientific Publishing Co. Pte. Ltd., Singapore, 1997, pp. 191-198.
[5] K. L. Chung, C. H. Shen, and L. C. Chang, “A novel SVD- and VQ-based image hiding scheme,” Pattern Recognition Letters, Vol. 22, No. 9, Jul. 2001, pp. 1051-1058
[6] G. H. Golub and C. F. Van Loan., “Matrix Computations,” The Johns Hopkins University Press., Baltimore, MD (Chapter 8), 1989.
[7] R. M. Gray, “Vector Quantization,” IEEE ASSP Magazine, 1984, pp. 4-29.
[8] S. F. Hsiao, J. M. Delosme, “Parallel singular value decomposition of complex matrices using multidimensional CORDIC algorithms,” IEEE Transactions on Signal Processing, Vol. 44, No. 3 , Mar. 1996, pp. 685 -697.
[9] M. S. Hsieh, D. C. Tseng, and Y. H. Huang, “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,” IEEE Transactions on Industrial Electronics, Vol. 48, No. 5, Oct. 2001, pp. 875-882.
[10] K. L. Hung, C. C. Chang, and T. S. Chen, “A Side-Match Reconstruction Method Using Tree Structure VQ for Transmitting Image Progressively,” to appear in IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, 2003.
[11] J. H. Jiang, C. C. Chang, and T. S. Chen, “Selective Progressive Image Transmission Using Diagonal Sampling Technique,” Proceedings of International Symposium on Digital Media Information Base, Nara, Japan, 1997, pp. 59-67.
[12] K. Konstantinides, B. Natarajan, and G. S. Yovanof, “Noise Estimation and Filtering Using Blocked-Based Singular Value Decomposition,” IEEE Transactions on Image Processing, Vol. 10, No. 3, 1997, pp. 479-483.
[13] R. C. Lee, T. H. Chin, and S. C. Chang, “Application of Principal Component Analysis to Multikey Searching,” IEEE Transactions on Software Engineering, Vol. SE-2, No. 3, Sep. 1976, pp. 185-193.
[14] C. Y. Lin and S. F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation, ” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11 , No. 2 , Feb. 2001 pp.153 - 168
[15] Y. Linde, A. Buzo, and R. M. Gray, “An Algorithm for Vector Quantization Design,” IEEE Transactions on Communications, Vol. 28, Jan. 1980, pp. 84-95.
[16] C. S. Lu, and H. Y. M. Liao, “Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme,” IEEE Transactions on Multimedia, Vol. 5, No. 2, 2003, pp. 161-173.
[17] P. Tsai, Y. C. Hu, and C. C. Chang, “Using Set Partitioning in Hierarchical Tree to Authenticate Digital Images,” Signal Processing: Image Communication, Vol. 18, No. 9, Oct. 2003, pp. 813-822.
[18] C. H. Tzeng and W. H. Tsai, “A New Approach to Authentication of Binary Images for Multimedia Communication With Distortion Reduction and Security Enhancement,” IEEE Communications Letters, Vol. 7, No. 9, Sep. 2003, pp. 443-445.
[19] P. W. Wong, “A Public Key Watermark for Image Verification and Authentication,” Proceedings of IEEE International Conference on Image Processing, Vol. 1, Chicago, IL, Oct. 1998, pp. 425-429.
[20] P. W. Wong and N. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE Transactions on Image Processing, Vol. 10, No. 10, Oct. 2001, pp. 1593-1601.
[21] C. W. Wu, “On the Design of Content-Based Multimedia Authentication Systems,” IEEE Transactions on Multimedia, Vol. 4, No. 3, Sep. 2002, pp. 385-393.
[22] J. F. Yang and C. L. Lu, “Combined Techniques of Singular Value Decomposition and Vector Quantization for Image Coding,” IEEE Transactions on Image Processing, Vol. 4, No. 8, 1995, pp. 1141-1146.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔