(3.237.20.246) 您好!臺灣時間:2021/04/15 12:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:鄭嘉松
研究生(外文):Chia-Sung Cheng
論文名稱:植基於禁止搜尋演算法之多用途數位浮水印技術
論文名稱(外文):Optimization of Multi-Purpose Watermarking Algorithm Based on Tabu Search
指導教授:廖斌毅潘正祥
指導教授(外文):Bin-Yih LiaoJeng-Shyang Pan
學位類別:碩士
校院名稱:國立高雄應用科技大學
系所名稱:電子與資訊工程研究所碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:81
中文關鍵詞:禁止搜尋演算法數位浮水印可見浮水印多用途
外文關鍵詞:Tabu SearchDigital Watermarkingvisible watermarkMulti-Purpose
相關次數:
  • 被引用被引用:0
  • 點閱點閱:576
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:10
  • 收藏至我的研究室書目清單書目收藏:0
由於數位科技的發展,複製的程序越來越簡單,因此數位影像很容易被複製,甚至被竄改。有鑑於此,我們可利用數位浮水印技術來解決此問題,證明數位影像的版權所有及保障智慧財產權。在本論文中,我們提出一多重浮水印技術做為多媒體資料保護。我們首先分析並介紹過去許多植基於Spatial及DCT/Wavelet視覺模組方法的優缺點。此外,為了克服先前方法的缺點並自適應於各種影像攻擊,我們嵌入兩個扮演功能互補角色的浮水印,以期在遭遇任何攻擊情況下,至少還有一個浮水印能存活。以可見的浮水印宣告版權擁有人,並且用不可見的浮水印作為版權保護。 這兩個浮水印運用不同的技術嵌入在影像中。此外提出一個最佳化技術,以禁止搜尋演算法實現浮水印的強健性與改善影像品質。實驗結果證明我們所提的方法能有效改善數位浮水印技術中,影像品質與強健性浮水印相互制衡的問題。
This paper presents an image watermarking method for two purposes: one is to notify the copyright owner with a visible watermark, and the other is to protect the copyright with an invisible watermark. These two watermarks are embedded in different domains with different techniques. An innovative watermarking scheme based on tabu search (TS) algorithms in both the spatial domain and the transform domain is proposed. The fidelity performance of an existing image watermarking scheme is enhanced through the TS optimization. The experimental results show that the proposed techniques can improve the degraded image quality greatly. Simulation results show that the proposed method may improve the PSNR for embedding the visible watermark and enhance the robustness of the invisible watermark
中文摘要 i
英文摘要 ii
致謝 iii
目錄 iv
圖目錄 vii
表目錄 xi
第一章 緒論
1.1 前提------------------------------------------------1
1.2 研究動機與目的--------------------------------------1
1.3 論文架構--------------------------------------------3
第二章 數位浮水印技術發展與簡介
2.1 數位浮水印的分類------------------------------------5
2.2 數位浮水印的特性------------------------------------7
2.3 空間域及頻域中的數位浮水印技術----------------------9
2.3.1 空間域數位浮水印技術-------------------------------10
2.3.2 頻率域數位浮水印技術-------------------------------11
2.4 結語-----------------------------------------------22
第三章 禁止搜尋演算法
3.1 禁止搜尋演算法之基本概念---------------------------23
3.2 禁止搜尋演算法主要組成要素-------------------------24
3.3 禁止搜尋演算法的演算法則---------------------------28
3.4 禁止搜尋演算法運算流程-----------------------------28
3.5 結語-----------------------------------------------30
第四章 多重浮水印嵌入技術
4.1 多重浮水印概論-------------------------------------32
4.2 多重浮水印技術-------------------------------------32
4.2.1 可見浮水印嵌入技術---------------------------------33
4.2.2 不可見浮水印嵌入技術-------------------------------42
4.3 互補式多重浮水印嵌入技術---------------------------46
4.4 結語-----------------------------------------------48
第五章 植基於禁止搜尋演算法之多用途數位浮水印技術
5.1 影像攻擊-------------------------------------------51
5.1.1 低通濾波器-----------------------------------------51
5.1.2 中值濾波器-----------------------------------------52
5.1.3 JPEG壓縮攻擊---------------------------------------53
5.2 影像攻擊討論 57
5.3 植基於禁止搜尋演算法之多用途數位浮水印技術---------58
5.3.1 數位浮水印嵌入架構---------------------------------58
5.3.2 數位浮水印嵌入方法---------------------------------59
5.4 結語-----------------------------------------------62
第六章 實驗結果
6.1 可見浮水印之實驗結果-------------------------------64
6.2 不可見浮水印之實驗結果-----------------------------65
6.3 植基於禁止搜尋演算法之多用途數位浮水印實驗結果-----71
第七章 結論
7.1 總結-----------------------------------------------76
7.2 未來展望-------------------------------------------77
參考文獻----------------------------------------------------78
[1] I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, 1997, “Secure spread spectrum watermarking for multimedia” IEEE Trans. on Image Processing, vol. 6, Issue:12, pp.1673-1687, Dec.
[2] M.J. Tsai, K.Y. Yu, and Y.Z. Chen, 2000, “Joint Wavelet and Spatial Transformation for Digital Watermarking” IEEE Trans. on Consumer Electronics, vol. 46, Issue: 1, pp. 237, Feb.
[3] A. H. Tewfik and M. Swanson, 1997, “Data hiding for multimedia personalization, interaction, and protection,” IEEE Signal Processing Mag. , pp.41-44, July.
[4] C. S. Lu, and H. M. Liao, 2001, “Multipurpose watermarking for image authentication and protection,” IEEE Trans. on Image Processing, vol. 10, no. 10, pp. 1579-1592.
[5] Z. M. Lu, H. T. Wu, D. G. Xu and S. H. Sun, 2003, “A multipurpose image watermarking method for copyright notification and protection,” IEICE Trans. Inf. and Syst., vol. E86-D, no. 9, pp. 1931-1933.
[6] J. Meng, and S. F. Chang, 1998, “Embedding visible video watermarks in the compressed domain,” Proc. of IEEE Int. Conf. on Image Processing (ICIP’98), pp. 474-477.
[7] M. S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, 1999, “Adaptive visible watermarking of images,” Proc. of IEEE Int. Conf. on Multimedia Computing and Systems, pp. 568-573.
[8] P. M. Chen, 2000 , “A visible watermarking mechanism using a statistic approach,” Proc. of IEEE 5th Int. Conf. on Signal Processing (WCCC-ICSP’2000), pp. 910-913.
[9] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, 2000, “A DCT domain visible watermarking technique for images,” Proc. of IEEE Int. Conf. on Multimedia and Expo(ICME’2000), pp. 1029-1032.
[10] Y. J. Hu, and S. KWONG, 2001, “Wavelet domain adaptive visible watermarking,” Electron. Lett., vol. 37, no. 20, pp. 1219-1220.
[11] Fergusson, R.J. , Soraghan, J.J. , 1999. “HVS based motion estimation on the TMS320C80 multimedia video processor,” Image Processing And Its Applications, Seventh International Conference on (Conf. Publ. No. 465) vol.1, pp. 489 -492, Jul.
[12] Delaigle, J.F, Devleeschouwer, C. , Macq, B. , Langendijk, L. , 2002. “Human visual system features enabling watermarking,” Multimedia and Expo, Proceedings. 2002 IEEE International Conference on , vol. 2 , pp.148-152.
[13] J. Huang and Y. Q. Shi, 1998, “An adaptive image watermarking scheme based on visual masking,” Electron. Lett. , vol. 34, pp.748-750, Apr.
[14] Guoliang Fan and Wai-Kuen Cham, 2001, “Postprocessing of low bit-rate wavelet-based image coding using multiscale edge characterization,” Circuits and Systems for Video Technology, IEEE Transactions on , vol. 11 Issue: 12, pp. 1263 —1272, Dec.
[15] J. Huang and Y. Q. Shi, Apr, 1998, “An adaptive image watermarking scheme based on visual masking,” Electron. Lett. , vol. 34, pp.748-750.
[16] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, 1999, “A DCT-domain system for robust image watermarking,” Signal Processing, vol. 66 , no.3, pp. 357-372.
[17] J.J. Chase and B.S. Manjunath, 1998, ” A robust embedded data from wavelet coefficients,” Proc. Of the SPIE International Conference on Strage and Retrieval for Image and Video Databases , vol. 3312, pp.308-317.
[18] C.H. Lee and Y.K. Lee, 1999, “ An adaptive digital image watermarking technique for copyright protection,” IEEE Trans. on Consumer Electronic, vol. 45, no.4, pp.1005-1013, Nov.
[19] F. Glover and M. Laguna, 1997, Tabu search. Boston, MA: Kluwer Academic Publishers.
[20] D. T. Pham and D. Karaboga, Intelligent optimisation techniques, 2000, “genetic algorithms, tabu search, simulated annealing, and neural networks”, London.
[21] C. S. Lu, H. Y. Mark Liao, S. K. Huang, and C. J. Sze, 1999, “Cocktail Watermarking on Images”, to appear in 3rd International Workshop on Information Hiding, Dresden, Germany, Sept. 29-Oct. 1 .
[22] S. G. Mallat, 1989, “A Theory for multiresolution signal decomposition: the wavelet representation,” IEEE Trans. On PAMI, vol. 11, no. 7, pp. 674-693.
[23] M. Antonini, M. Barlaud, P. Mathieu and I Daubechies, 1992 , “Image Coding Using Wavelet Transform, ” IEEE Trans. on Image Processing, vol. 1, no. 2, pp. 205-220.
[24] C.T. Hsu and J.L. Wu, 1998, ” Multi-resolution watermarking for digital images”, IEEE Trans. Circuits Syst. Part-II , vol. 45, no. 8, pp. 1097-1101, Aug.
[25] J.R. Hernandez, M. Amado and F.P. Gonzalez, 2000, ” DCT-domain watermarking techniques for still image :detector performance analysis and a new structure”, IEEE Trans. on Image Processing, vol. 9, No.1, pp.55-68, Jan.
[26] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, 2004, “Genetic Watermarking Based on Transform Domain Techniques,” Pattern Recognition, vol. 37, no. 3, pp. 555—565.
[27] H. C. Huang, J. S. Pan, C. S. Shieh, and F. H. Wang, 2003, “Genetic-based Progressive Image Watermarking Algorithms,” Proceedings of the 37th IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., pp. 62—65.
[28] Zhigang Fan and de Queiroz R. , 2000, “Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history,” Image Processing. Proceedings. 2000 International Conference on . vol. 1 , pp. 948 -951.
[29] 鍾國亮,民國九十一年,資料壓縮的原理與應用,全華。
[30] 鍾國亮,民國九十一年,影像處理與電腦視覺,初版,東華書局。
[31] 戴顯權,民國九十年,資料壓縮,紳藍。
[32] 陳同孝,張真誠,黃國峰,民國九十年,數位影像處理技術,松崗。
[33] B.M. Macq, J.J.Quisquater, 1995, “Cryptography for Digital TV Broadcasting”, Proc. of the IEEE, vol. 83, No.6, pp.944-957, June.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔