跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2024/12/14 19:17
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:張嘉熒
研究生(外文):Chang Chia Ying
論文名稱:多樣化小波係數於彩色影像浮水印之研究
論文名稱(外文):A Saturation Adjustment Method for Emebdding Watermark into Color Images
指導教授:黃炳森黃炳森引用關係
學位類別:碩士
校院名稱:國防大學中正理工學院
系所名稱:電子工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:93
語文別:中文
論文頁數:65
中文關鍵詞:四個頻帶飽和度像素值頻率域
外文關鍵詞:afterdata
相關次數:
  • 被引用被引用:0
  • 點閱點閱:185
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
摘 要

在早期的浮水印技術,大多將浮水印藏匿於灰階的影像中,而本論文主要是針對彩色影像加以隱藏其浮水印資訊。由於RGB影像的相關性較高,所以將彩色影像投影到相關性較低的IHS模型中,在其IHS中加入浮水印的資訊,可使我們的浮水印更有效、更強健、且可藏匿更多的資訊。由於RGB的頻段相關性高,使得人眼對其細微的改變為之敏銳。因此,相對於人眼的敏銳性來看,飽和度的改變不易被人眼所察覺。
在本論文中主要於RGB的彩色空間,經由直接的修改RGB影像的像素值,將浮水印隱藏於飽和度中。起初,我們將RGB轉換成IHS ,再改變其飽和度的值;但經由快速的數學轉換可直接的在於RGB空間改變其值,而效果等同於轉換到IHS再改變其飽和度的值,此快速的直接轉換即為飽和度調整 (SA)。在藏匿的過程中,色調及亮度是不會改變的,只改變其飽和度的值。因而,飽和度調整的方法,省去複雜的矩陣運算,加速了實驗的時間。
本論文的另一個重點即為空間域至頻率域的轉換:離散小波轉換。我們將切割後的影像,以區塊為單位,對每個區塊做一階的離散小波轉換,使得每個區塊得到四個頻帶。而藏匿的方法即為改變四個頻帶中的係數,以加入浮水印的資訊。經由本論文的技術,影像經由多種攻擊,如JPEG2000壓縮攻擊、JPEG壓縮攻擊、縮放攻擊及裁切攻擊,都可成功地得到強健的浮水印。
ABSTRACT

The mainly focus of thesis is to hide watermark in the color image. Most of it is hiding on the grayscale images on the passed technology of the hided watermark. There is the more correlate relationship in the RGB band than in the IHS band on the color image. It is more effective, more robust, and more invisible in hiding more data if changes the color image to the lower relationship the IHS band to hide the data. Because of the relationship on RGB band is too high, and it is discovered if we change the less different on RGB band by the human eyes. Therefore, based on against the human eyes, it is less sensitive to saturation changes than to the variation of intensity and hue.
The goal of hiding the watermark into the saturation component achieves by directly modifying the R, G, and B value in RGB space. First, we transform the RGB space to IHS for hiding data in the saturation component. Then the high-speed equation uses to directly modify the difference in RGB space to IHS. The high-speed equation is the saturation adjustment (SA). There is no change on the value of hue and intensity by the hided data on the saturation component. However, let it more invisibility on human eyes.
The other important point in this thesis is to transform the spatial domain to the frequency domain by DWT. After segmenting the image to the blocks, it makes each block to the frequency domain by 1-level DWT, then, it gets four sub-bands on each block. The method of hiding data is changing the coefficient of the four sub-bands. The experimental results achieve robustness of watermark to image processing operations successfully, such as JPEG2000, JPEG, scaling and cropping.
誌 謝 ii
摘 要 iii
ABSTRACT iv
目 錄 v
圖 錄 vii
1. 緒 論 1
2. 浮水印相關技術 4
2.1 非盲目浮水印(Non-Blind Watermark) 6
2.2 盲目浮水印(Blind Watermark) 7
2.3 彩色浮水印 8
3. 飽和度調整運算 11
3.1 彩色模型 11
3.1.1 RGB彩色模型 11
3.1.2 CMY彩色模型 11
3.1.3 YIQ彩色模型 12
3.1.4 IHS彩色模型 13
3.2 飽和度的特性及其調整演算法 16
4. 浮水印嵌入與萃取 21
4.1 運用技術簡介 21
4.1.1 離散小波轉換 21
4.1.2 排序 23
4.1.3 加權 24
4.2 浮水印的嵌入 26
4.3 浮水印的萃取 30
5. 實驗結果 34
5.1 實驗一 34
5.1.1 藏匿浮水印於不同頻帶的影響 34
5.1.2 各種影像攻擊 36
5.2 實驗二 41
5.2.1 依不同的排序方法比較其優異性 41
5.2.2 各種影像攻擊 41
5.3 實驗三 44
5.3.1 依不同的加權方式比較其優異性 45
5.3.2 各種影像攻擊 45
6. 結 論 48
7. 未來的工作 50
參考文獻 51
自 傳 56
參考文獻

[1]Abdulaziz, N. K., and Pang, K. K., “Robust Data Hiding For Images,” Communication Technology Proceedings, WCC - ICCT 2000, International Conference, Beijing, Vol. 1, pp. 380-383, 21-25 Aug., 2000.
[2]Barreto, P., Kim, H. Y., and Rijmen, V., “Toward a Secure Public-key Blockwise Fragile Authentication Watermarking,” Proceeding of International Conference on Image Processing, Thessaloniki, Vol. 2, pp. 494-497, 7-10 Oct., 2001.
[3]Garg, G., Sharma, P. K., and Chaudhury, S., “Image Based Authentication Using DCT,” Pattern Recognition Letters, Vol. 22, No. 6, pp. 725-729, July, 2000.
[4]Hartung, F., and Kutter, M., “Multimedia Watermarking Techniques,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1079-1107, July, 1999.
[5]Barni, M., Bartolini, F., and Piva, A., “Improved Wavelet-Based Watermarking Through Pixel-Wise Masking,” IEEE Transactions on Image Processing, Vol. 10, No. 5, pp. 783-791, May, 2001.
[6]Hsu, C. T., and Wu, J. L., “Hidden Signature in Images,” Proceeding of International Conference on Image Processing, Lausanne, Vol. 03, pp. 223-226, 16-19 Sep., 1996.
[7]Liu, Tong, and Qiu, Zheng-Ding, “The Survey of Digital Watermarking-Based Image Authentication Techniques,” International Conference on Signal Processing, Aegean Island, Santorini, Hellas(Greece), Vol. 2, pp. 1556-1559, 26-30 Aug., 2002.
[8]Lee, J., and Won, C. S., “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 2, pp. 313-317, May, 2000.
[9]Lin, C. Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., and Lu, Y. M., “Rotation, Scale and Translation Resilient Watermarking for Images,” IEEE Transactions on Image Processing, Vol. 10, No. 5, May, 2001.
[10]Schneider, M., and Chang, S. F., “A Robust Content Based Digital Signature for Image Authentication,” Proceeding of International Conference on Image Processings, Lausanne, Vol. 03, pp. 227-230, 16-19 Sep., 1996.
[11]Skodras, A., Christopoulos, C., and Ebrahimi, T., “The JPEG-2000 Still Image Compression Standard,” IEEE Signal Processing Magazine, Vol. 18, No. 5, pp. 36-58, Sep., 2001.
[12]Shih, F. Y., and Wu, S. S. T., “Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition Letters, Vol. 36, No. 4, pp. 969-975, April, 2003.
[13]Sun, Q., Chang, S. F., Kurato, M., and Suto, M., “A Quantitative Semi-Fragile JPEG2000 Image Authentication System,” Proceeding of International Conference on Image Processing, Novosibirsk, Vol. 2, pp. II-921-II-924, 22-25 Sep., 2002.
[14]Tseng, Y. C., Chen, Y. Y., and Pan, H. K., “A Source Data Hiding Scheme for Binary Images,” IEEE Transactions on Communication, Vol. 50, No. 8, pp. 223-225, Aug., 2002.
[15]Wu, M., and Liu, B., “Watermarking for Image Authentication,” Proceedings of IEEE International Conference on Image Processing, Chicago, IL, Vol. 2, pp. 437-441, 4-7 Oct., 1998.
[16]Wong, P. W., “A Public Key Watermark for Image Verification and Authentication,” Proceedings of IEEE International Conference on Image Processing, Chicago, IL, Vol. 1, pp. 455-459, 4-7 Oct., 1998.
[17]Wong, P. W., and Memom, N., “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE Transaction on Image Processing, Vol. 10, No. 10, Oct., 2001.
[18]Wu, C. W., “On the Design of Dontent-Based Multimedia Authentication System,” IEEE Transaction on Multimedia, Vol. 4, No. 3, Sep., 2002.
[19]Yu, G. J., Lu, C. S., Liao, H. Y. M., and Sheu, J. P., “Mean Quantization Blind Watermarking for Image Authentication,” Proceedings of IEEE 2000 International Conference on Image Processing, Vancouver, BC, Vol. 2, pp. 706-709, 10-13 Sep., 2000.
[20]Zou, D., Wu, C. W., Xuan, G., and Shi, Y. Q., “A Content-Based Authentication System with Lossless Data Hiding,” IEEE International Conference on Multimedia and Expo, Baltimore, Maryland, Vol. 2, pp. 6-9, 6-9 July, 2003.
[21]陳同孝、張真誠、黃國峰,數位影像處理技術,松崗電腦圖書資料股份有限公司,2001。
[22]Ledley, R. S., Buas, M., and Golab, T. J., “Fundamentals of True-Color Image Processing,” Proceedings of International Conference on Pattern Recognition, Atlantic City, NJ , Vol. 1, pp. 791-795, 16-21 June, 1990.
[23]吳成柯、程湘君、戴善榮、雲立實,數位影像處理,儒林圖書有限公司,1996。
[24]Inoue, H., Miyazaki, A., Yamsmoto, A., and Katsura, T., “A Digital Watermark Technique Based on the Wavelet Transform and its Robustness on Image Compression and Transformation,” IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E82-A, pp. 391-395, Jan., 1999.
[25]Hsu, C. T., and Wu, J. L., “Multiresolution Watermarking for Digital Images,” IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp. 1097-1101, Aug., 1998.
[26]Hsu, C. T., and Wu, J. L., “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, Vol.8, No. 1, pp. 58-68, Jan., 1999.
[27]Shih, F. Y., and Wu, Y. T., “Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, April, 2003.
[28]Wu, Ja-Ling, “A Shift-Resisting Blind Watermark System of Panoramic Image,” Consumer Electronics on IEEE Transaction, Los Angles, CA, pp. 8-9, 13-15 June, 2000.
[29]Lu, P. C., Hsieh, C. H., and Tsai, J. C., “An Adaptive Algorithm for Cosine Transformed Images,” in the Proceedings of IEEE International Conference on Image Processing, Warwick, pp. 261-265, 18-20 Jul., 1989.
[30]Trista, Pei-chun, and Tsuhan, Chen, “A Framework for Optimal Blind Watermark Detection,” Technical Report AMP 01-03, Carnegie Mellon University, Pittsburgh, pp. 1-32, September, 2001.
[31]Barni, M., Bartolini, F., and Piva, A., “Multichannel Watermarking of Color Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 12, No. 3, Mary, 2002.
[32]Gilani, S. A. M., Kotopoulos, I., and Skodras, A. N., “Color Image-Adaptive Watermarking,” International Conference on Digital Signal Processing, Santorini, Hellas(Greece), Vol. 2, pp. 721-724, 1-3 July, 2002.
[33]Haykin, S., Adaptive Filter Theory, Prentice Hall, 2002.
[34]Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Attacks on Copyright Marking Systems,” Second International Workshop in the Proceedings of Information Hiding, Portland, Oregon, U.S.A., Springer-Verlag, pp. 219-239, 15-17 April, 1998.
[35]Petitcolas, F. A. P., “Watermarking Schemes Evaluation,” IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 58-64, Sept., 2000.
[36]Adams, M. D., and Kossentini, F., “JasPer: A Software-Based JPEG-2000 Codec Implementation,” International Conference on Image Processing, Vancouver, BC, Canada, Vol. 2, pp. 53-56, 10-13 Sept., 2000.
[37]Pratt, W. K., Digital Image Processing, Addison Wessley Publishing Company, 1991.
[38]Gonzalez, R. C., and Woods, R. E., Digital Image Processing, Prentice Hall, pp. 299-300, 2002.
[39]Kundur, D., and Hatzinakos, D., “Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles,” IEEE Transactions on Multimedia, Vol. 6, No. 1, pp. 185-198, Feb., 2004.
[40]Podilchuk, C. I., and Zeng, W., “Image-Adaptive Watermarking Using Visual Models,” IEEE Journal on Selected Areas in Communication, Vol. 16, No. 4, pp. 525-539, May, 1998.
[41]羅銘耀,“植基於小波轉換之彩色影像浮水印技術”,碩士論文,國立東華大學資訊工程研究所,花蓮,2004。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top