跳到主要內容

臺灣博碩士論文加值系統

(44.192.115.114) 您好!臺灣時間:2023/09/30 18:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:顧政德
研究生(外文):Zheng-De Gu
論文名稱:植基於離散小波轉換之影像竄改驗證與回復技術
論文名稱(外文):Image Tamper proofing and recovery technique based on DWT
指導教授:林信鋒林信鋒引用關係
指導教授(外文):Shin-feng Lin
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:48
中文關鍵詞:離散小波轉換竄改驗證回復感興趣區
外文關鍵詞:recoveryregion of interesttamper proofingdiscrete wavelet transformation
相關次數:
  • 被引用被引用:1
  • 點閱點閱:215
  • 評分評分:
  • 下載下載:13
  • 收藏至我的研究室書目清單書目收藏:1


摘要
近年來,數位多媒體產業的發達和網際網路的流行,使得數位多媒體非常容
易被散播拷貝,同時數位影像也很容易被人利用影像處理軟體進行竄改。經過竄
改的影像在網路上散播常造成許多當事人的困擾,也使影像的真實性備受質疑。
有鑑於此,為了防止影像被惡意的竄改,我們提出了一個植基於離散小波轉換之
影像竄改驗證與回復技術。
我們利用JPEG-2000 中的ROI 觀念,把影像定出ROI 區域和ROB 區域,再經
由離散小波轉換將影像由空間域轉換到頻率域,取出其低頻的ROI 係數做為特徵
值,然後再將它嵌入於中頻帶的ROB 區域。原始影像經過嵌入資料後仍然可以有
相當好的品質,肉眼無法察覺嵌入前與嵌入後的影像有何不同,嵌入的資料可以
用來偵測圖是否被竄改並回復原來的資訊。本篇所提的方法不但可以偵測被竄改
的位置更可以回復原有資訊而且不需要原圖,驗證過程既簡單又有效率,回復後
的影像品質也相當好。



Abstract
In recent years, products of digital multimedia information and the Internet
technology are more and more advanced and popular. Users may illegally copy the
digital multimedia information and tamper it with current image processing tools. The
tampered images spread through the Internet cause lots of troubles and make its
reality doubtful. Accordingly, to avoid being tampered with malice, we propose an
image tamper proofing and recovery technique based on DWT.
We use the concept of ROI in JPEG-2000 to categorize ROI and ROB
respectively. Then we transfer images from spatial domain to frequency domain by
DWT. The ROI coefficient of low frequency is extracted to be the characteristic value
and if can be embedded into the ROB of middle frequency. Embedded data can be
used to prove whether images are tampered or not and help to recover the original
information. The proposed methods in this thesis can not only detect where an image
is tampered but also recover the original data without the original image. Simulation
results demonstrate that the proposed techniques out perform the existing techniques.



Contents
致謝1
摘要2
Abstract3
List of Figures6
List of Tables7
Chapter 1 Introduction8
1.1 Motivation8
1.2 Thesis Organization9
Chapter 2 Background10
2.1 Steganography10
2.2 Overview of JPEG-200011
2.3Discrete Wavelet Transform13
2.3.1 Introduction to Wavelet Transform13
2.3.2 Haar Transform14
2.4 Overview of Permutation Function17
Chapter 3 The Proposed Technique of Image Tamper Recovery19
3.1 Basic Concept of Proposed Scheme19
3.2 The proposed Algorithm in Frequency Domain21
3.2.1 Embedding the Characteristics of ROI21
3.3 Tamper Detection and Recovery Algorithm24
3.3.1 Tamper Detection Algorithm in ROI24
3.3.2 Tamper Recovery Algorithm in ROI26
3.4 The Proposed Algorithm in Spatial Domain26
3.4.1 Embedding the Characteristics26
3.4.2 Tamper Detection Algorithm27
3.4.3 Tamper Recovery Algorithm28
Chapter 4 Simulation Results29
4.1 Standard Test Images30
4.2 Standard Images with Information Hiding31
4.2 Tamper Proofing and Recovery33
4.3 Comparison with Related Research Works40
Chapter 5 Conclusion45
References46



46
References
[1] Tao Chen; Jingchun Wang; Yonglei Zhou, “Combined digital signature and digital
watermark scheme for image authentication”, International Conferences on Info-tech
and Info-net, vol. 5, pp.78 — 82, Nov. 2001.
[2] Chun-Shien Lu; Liao, H.-Y.M., ”Structural digital signature for image
authentication: an incidental distortion resistant scheme”, IEEE Transactions on
Multimedia, vol. 5, pp.161 — 173, June 2003.
[3] Kwang-Fu Li; Tung-Shou Chen; Seng-Cheng Wu, “Image tamper detection and
recovery system based on discrete wavelet transformation”, IEEE Pacific Rim
Conference on Communications, Computers and signal Processing, vol. 1, pp.164 -
167, Aug. 2001.
[4] Shinfeng D Lin, Shin-Chieh Shie, and Chien-Nan Chen, “Image Tamper Detection
and Recovery using Data Hiding”, Master thesis, CSIE, National Dong Hwa
University, July 2002.
[5] Tung-Shou Chen; Chen, J.; Jian-Guo Chen, “Tamper detection and retrieval
technique based on JPEG2000 with LL subband”, 2004 IEEE International
Conference on Networking, Sensing and Control, vol. 2, pp.1235-1240, March 2004.
[6] “Special Issue-Intellectual Rights on the Multimedia” Communications of the
CCISA, Jan. 2004.
[7] Li Zhi; Sui Ai Fen; Yang Yi Xian; ” A LSB steganography detection algorithm”,
14th IEEE Proceedings on Personal, vol.3, pp.2780 — 2783, Sept.2003.
[8] Amin, M.M.; Salleh, M.; Ibrahim, S.; Katmin, M.R.; Shamsuddin, M.Z.I., ”
Information hiding using steganography”, 4th National Conference on
Telecommunication Technology, pp.21 — 25, Jan. 2003.
[9] Po-Chyi Su; Kuo, C.-C.J.; ”Steganography in JPEG2000 compressed images”,
Consumer Electronics, IEEE Transactions on , Vol:49, Issue:4, pp:824 — 832, Nov.
47
2003.
[10] Ying Wang; Moulin, P.; “Steganalysis of block-DCT image steganography”,
Statistical Signal Processing, 2003 IEEE Workshop on, pp:339 — 342, Oct. 2003.
[11] 戴顯權, 陳政一, “JPEG-2000”, 紳藍出版社, Nov 2002.
[12] Rafael C. Gonzalez Richard E. Woods, “Digital image processing” second
edition.
[13] Jeong-Ho Park; Gee-Ju Chae; Jong-Hyun Park; Kyung-Ok Kim; “ROI coding
method for multispectral images”, 2003 IEEE International Geoscience and Remote
Sensing ymposium, vol. 6, pp.3592 — 3594, July 2003.
[14] Watanabe, O.; Kiya, H., “An extension of ROI-based scalability for progressive
transmission in JPEG2000 coding”, 2002 Asia-Pacific Conference on Circuits and
Systems, vol. 1, pp.535 — 540, Oct. 2002.
[15] 陳同孝, 張真誠, 黃國峰,“數位影像處理技術”, 松崗電腦圖書, Jun 2001
[16] 戴顯權,”資料壓縮”, 紳藍出版社, July 2001.
[17] R.z. Wang, C.F. Lin, J.C. Lin, “Image hiding by optimal LSB substitution and
genetic algorithm”, Pattern Recognition 34 (2001) 671-683.
[18] Kostopoulos, I.; Gilani, S.A.M.; Skodras, A.N, “Colour image authentication
based on a self-embedding technique”, 14th International Conference on Digital
Signal Processing, vol.2, pp.733 — 736, July 2002.
[19] Hua Zhong; Fang Liu; Li-cheng Jiao, “A new fragile watermarking technique for
image authentication”, 6th International Conference on Signal Processing, vol.1,
pp.792 - 795, Aug. 2002.
[20] Du Jiang; Huang Jingxiong; Xie Weixin, “ Study on tamper-proofing of digital
media”, Proceedings of the 3rd World Congress on Intelligent Control and
Automation, vol. 4, pp.2695 - 2698, July 2000.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 孔祥明(1999).婆媳過招為哪樁?-婆婆、媳婦與兒子(丈夫)三角關係的探討.應用心理研究,4,57-96.台北:五南。
2. 伊慶春(1987).已婚職業婦女職業取向、工作狀況、工作滿意和子女照顧方式之研究.中國社會學刊,(11),93-120。
3. 呂玉瑕(1996).兩性的角色分工與家庭發展.基督書院學報,(3),91-100。
4. 利翠珊(1998).三代同堂家庭中的代間關係與婚姻關係.家庭教育雙月刊,(2),1-9。
5. 利翠珊(1999a).已婚女性家庭系統的交會:親情與角色的兩難.中華心理衛生學刊,12(3),1-26。
6. 利翠珊(1999b).已婚女性與上一代的互動關係與情感連結.中華家政學刊,28,31-46。
7. 利翠珊(2002).婆媳與母女:不同世代女性家庭經驗的觀點差異.女學學誌:婦女與性別研究,13,(1),179-218。
8. 李光正(1996).光復後台灣已婚婦女家庭角色之變遷.社會科教育學刊,6,12-44。
9. 胡幼慧、周雅容(1996).婦女與三代同堂:老年婦女的經濟依賴與居住困境探索.婦女與兩性學刊,7,27-57。
10. 唐先梅(1999).從家務工作的本質談雙薪家庭夫妻家事分工.應用心理研究,4,131-173.台北:五南。
11. 陳昱儒、黃光國(1999).台灣社會中女性的生活場域與成就:女醫師為例.中華心理衛生學刊,12(1),109-150。
12. 許瑛玿(1996).婆媳角色在文化中的意函.輔導季刊,32(2),60-65。
13. 許敏桃(2002a).當代精神衛生護理照護之理路—在典範翻轉的世代中尋找定位.護理雜誌,49(4),14-19。
14. 曾英芬、陳彰惠、王惠珍、蔡秋月(1994).比較在家中與坐月子中心坐月子婦女的產後適應.高雄醫學科學雜誌,10,458-468。
15. 張思嘉(1999).從系統觀點看婚姻適應的研究.應用心理研究,2,111-123。