(3.238.96.184) 您好!臺灣時間:2021/05/08 04:06
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:曾正男
研究生(外文):Jengnan Tzeng
論文名稱:子空間數位影像版權保護之浮水印技術:對稱與非對稱
論文名稱(外文):Subspace Watermarking Method for Copyright Protection:Symmetric and Asymmetric
指導教授:陳宜良陳宜良引用關係
指導教授(外文):I-Liang Chern
學位類別:博士
校院名稱:國立臺灣大學
系所名稱:數學研究所
學門:數學及統計學門
學類:數學學類
論文種類:學術論文
畢業學年度:92
語文別:英文
論文頁數:70
中文關鍵詞:浮水印非對稱性
外文關鍵詞:Copyright protectionprojection attackasymmetric watermarking
相關次數:
  • 被引用被引用:0
  • 點閱點閱:126
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
對於保護數位影像資料,數位影像浮水印技術是一般公認有效的
保護方法。我們提供了一套浮水印技術,這套技術針對每一張受
保護的圖片計算最適合加入浮水印的空間。在此空間上我們分別
設計出對稱與非對稱的加密方式來保護影像。不論是對稱或是非
對稱的方法,保護影像的能力與錯誤判別的機率皆相似。我們提
供的方法可以提昇現有浮水印技術的保護能力。
The watermarking method has emerged as an important
tool for content tracing, authentication, and data hiding in
multimedia applications.
We propose a watermarking strategy in which the watermark of a host is selected from the robust

features of the estimated forged images of the host.
We introduce the concept of watermark space which is
obtained from Monte Carlo simulations of potential pirate attacks on the host image.
The subspace approach can be used for symmetric and asymmetric
watermarking scheme for copyright protection.
Both of them reveal the phenomena of a high detection probability and low false positive

probability.
In either scheme, significant efforts have been made to
explore the probability of successful hacking into our system.
The result shows our schemes sustain most known attacks.
1 Introduction 1
2 Watermark Space 5
3 Symmetric Subspace Watermarking Method 16
4 Conventional Asymmetric Watermarking Schemes 36
5 Asymmetric Subspace Watermarking Method 43
6 Conclusion 62
Reference 67
References
[1] A. Adelsbach, S. Katzenbeisser, A. R. Sadeghi, Watermark detection with
zero-knowledge disclosure," ACM Multimedia Systems, Springer Verlag, vol.
9, pp. 266-278, 2003.
[2] M. Barni, F. Bartolini, T. Furon, A general framework for robust watermarking
security," Signal Processing, 83, pp. 2069-2084, 2003.
[3] W.Bender, D. Gruhl, and N. Morimoto, Techniques for data hiding," Proc.
SPIE, pp. 452-455, June 1995
[4] J. A. Bloom, I. J. Cox, T. Kalker, J. P. Linnartz, M. L. Miller, and C.
B. S. Traw, Copy protection for DVD video," Proc. IEEE, vol. 87, pp.
1267-1276, July 1999. Spec al Issue on Copyright and Privacy Protection.
[5] L. Boney, A. H. Tew c, and K. N. Hamdy, Digital watermarks for audio
signals," Proc. Multimedia, 1996, pp. 473-480
[6] S. Craver, ero knowledge watermark detection," Proceedings of the Third
International Workshop on Information Hiding, vol. 1768 of Lecture Notes
in Computer Science, pp. 101-116, Spring 2000.
[7] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, Resolving rightful
ownership with invisible watermarking teachniques: Limitations, attacks,
and implications," IEEE J. Select Arreas Commun., vol. 16, pp. 573-587,
Many 1998. Special Issue on Copyright and Privacy Protection.
[8] S.Craver, N.Memon, B.L. Yeo and M.M.Yeung, Can invisible watermarks
resolve rightful ownerships?", IBM Tech.Report, RC20509, 1996.
[9] I. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum
watermarking for multimedia," IEEE Trans. on Image Processing, vol. 6,
pp. 1673-1687, Dec. 1997.
[10] I. Cox and J. P. Linnartz, Some general methods for tampering with watermarks,"
IEEE J. Select. Areas Commu., vol. 16, pp. 587-593, May 1998.
Special Issue on Copyright and Privacy Protection.
[11] I. Cox, M. Miller, and A. Mckellips, Watermarking as communication with
side information," Proc. IEEE, vol. 87, pp. 1127-1141, July 1999.
[12] I. Cox, M. Miller, and J. Bloom, Digital Watermarking," Morgan Kauf-
mann Publishers, pp. 173-177, 2002.
[13] J.F.Delaigle, J.M.Boucqueau, J.J.Quisquater and B.Macq, Digital images
protection techniques in a broadcast framework : an overview", Proceedings
of ECMAST''96, vol.2, pp 711-727, 1996.
[14] J. Eggers, J. Su, and B. Girod, Public Key Watermarking by Eigenvectors
of Liner Transforms." Watermarking Workshop, Erlangen, Germany, Oct
1999.
[15] J. Eggers, J. Su, and B. Girod, Public key watermarking by eigenvectors
of linear transforms," Proc. Eur. Signal Process. Conf., Tampere, Finland,
Sept. 2000.
[16] J. Eggers, J. Su, and B. Girod, Asymmetric watermarking schemes,"
Tagungsband des GI Workshops Sicherheit in Mediendaten, Berlin, Germany,
Sept. 2000.
[17] T. Furon, I. Venturini, and P. Duhamel, An uni ed approach of asymmetric
watermarking schemes," Proceeding of SPIE: Security and Watermarking of
Multimedia Contents III, P. W. Wong and E. Delp, Eds, San Jose, U.S.A.,
Jan. 2000.
[18] T. Furon and P. Duhamel, An asymmetric watermarking method," IEEE
Trans. on Signal Processing, vol. 51, no. 4, pp. 981-995, April 2003.
[19] F. Hartung and B. Girod, Fast public-key watermarking of compressed
video," Proc. IEEE Int. Conf.Image Process., Oct. 1997.
[20] G. Hartung and M. Kutter, Multimedia watermarking techniques," Proc.
IEEE, vol. 87, July 1999.
[21] T. Kalker, Watermark estimation through detector observations," Proc.
IEEE Benelux Signal Processing Symposium 98, Leuven, Belgium, March
1998.
[22] T. Kalker, A security risk for publicly available watermark detectors,"
Proc. Benelux Inform. Theory Symp., Veldhoven, The Netherlands, May
1998.
[23] A. Kerckho s, La cryptographie militaire," J. Sci. Militaires, vol. 9, pp.
5-38, Jan. 1883.
[24] M. Kutter, S. Voloshynovskiy, and A. Herrigel, Watermark copy attack,"
SPIE Security and Watermarking of Multimedia Contents III, P. W. Wong
and E. Delp, Eds, San Jose, U.S.A., Jan. 2000.
[25] J. C. A. Van Der Lubbe, Basic Methods of Cryptography, Cambridge, 1998.
[26] M. L. Miller and J. A. Bloom, Computing the probability of false watermark
detection," Proc. of the Workshop on Information Hiding, Dresden,
Germany, Sept. 1999.
[27] P. Moulin and J. A. O''Sullivan, Information-theoretic analysis of watermarking,"
Procc. IEEE ICASSP 2000, Istanbul, Turkey, June 2000.
[28] P. Moulin and E. Delp, A mathematical appraoch to watermarking and
data hiding," Tutorial material in IEEE ICIP, Thessaloniki, Greece, 2001.
[29] P. Moulin and A. Ivanovic, The zero-rate spread-spectrum watermarking
game," IEEE Trans. on Signal Processing, vol.51, no. 4, pp. 1098-1117,
April 2003.
[30] N. Otsu, A threshold selection method from gray-level histograms," IEEE
Trans. Syst., Man, Cybern., vol. SMC-9, Jan. 1979
[31] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Attacks on copyright
marking systems," Lecture Notes on Computer Science 1525: Information
Hiding, pp. 218-238, 1998.
[32] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Information hiding
- A survey," Proc. IEEE, pp. 1062-1078, 1999.
[33] D.Kundur and D. Hatzinakos, Digital watermarking using multiresolution
wavelet decomposition" Proc. IEEE Int. Conf. Acoustics Speech, Signal
Processing, vol. 5,pp.2969-2972, 1998
[34] B.Macq and J.J.Quisquater, Cryptology for Digital TV Broadcasting,"
Proceeding of the IEEE, vol 83, no 6, pp.944?57, 1995.
[35] I. Pitas, A method for watermark casting on digital image," IEEE Trans.
Circuits and Video Technol., vol. 8, pp. 775-780, Oct. 1998.
[36] H. V. Poor, An introduction to signal detection and estimation, Springer,
1994.
[37] J. G. Proakis, Digital Communications, New York: Mc Graw-Hill, 1995.
[38] J. O''Ruanaidh, T. Pun, Rotation, Scale and Translation Invariant Digital
Image Watermarking", Proceedings of ICIP''97, Santa Barbara, CA, USA,
October 26-29, 1997, Vol I, pp. 536-539.
[39] R. Van Schyndel, A. Tirkel, and I. Svalbe, Key independent watermark
detection," Proc. Int. Conf. Multimedia Comput. Syst., vol. 1, Florence,
Italy, June 1999.
[40] C. E. Shannon. Channels with side information at the transmitter," IBM
Journal of Research and Development, pp 289-293, 1958
[41] J. Smith and C. Dodge, Developments in steganography," Proc. of Third
Int. Workshop on Information Hidding, A. P tzmann, Ed. Dresde, Germany,
pp. 77-87, Sept. 1999.
[42] J. Stern and J. P. Tillich, Automatic detection of a watermarked document
using a private key," Proc. 4th Int. Workshop Information hiding, vol. 2137,
I. S. Moskowitz, Ed., Pittsburg, PA, Apr. 2001.
[43] D.R.Stinson, Cryptography, theory and practice", CRC Press, 1995.
[44] M. Swanson B. Zhu, A. Tew k, and L .Boney, Robust audio watermarking
using perceptual masking," Signal Process., vol. 66, no. 3, pp. 337-355, May
1998.
[45] M. D. Swanson, M. Kobayashi, and A. H. Tew k, Multimedia dataembedding
and watermarking technologies," Proc. IEEE, vol. 86, pp. 1064-
1087, June 1998.
[46] W. Trapper, M. Wu, Z. Wang, K. J. R. Liu, Anti-Collusion ngerprintng
for multimedia," IEEE Trans. on Signal Processing, vol. 51, no.l 4 pp.
1069-1087, April 2003. Special Issue on Signal Processing for Data Hiding in
Digital Media & Secure Content Delivery.
[47] S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, A stochastic
approach to content adaptive digital image watermarking," The Thrid Inter-
national Workshop of Information Hiding, Dresden, Germany, pp. 211-236,
September 1999.
[48] R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, Perceptual watermarks
for digital images and video," Proceedings of the IEEE, vol. 87, no. 7, pp.
1108-1126, July 1999.
[49] M..M. Yeung, F.Mintzer, An invisible Watermarking technique for image
Veri cation", Proceedings of ICIP''97, Santa Barbara, CA, USA, October
26-29, 1997, Vol II, pp. 680-683.
[50] M. M. Yeung, Digital watermarking," Communications of the ACM, ACM
41(7):31-33, July 1998.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔