跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.91) 您好!臺灣時間:2025/03/16 12:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:吳美宜
研究生(外文):Mei-Yi Wu
論文名稱:物件影像浮水印與調色盤影像資料隱藏技術之研究
論文名稱(外文):A Study on Object Image Watermarking and Palette Image Steganography
指導教授:何裕琨
指導教授(外文):Yu-Kuen Ho
學位類別:博士
校院名稱:國立成功大學
系所名稱:電機工程學系碩博士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:93
語文別:英文
論文頁數:94
中文關鍵詞:數位浮水印資料隱藏幾何攻擊調色盤影像
外文關鍵詞:steganographypalette imagesgeometric attacksdigital watermarking
相關次數:
  • 被引用被引用:0
  • 點閱點閱:212
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來由於網際網路的發達,使得現代人可以輕易的自網際網路下載與傳送各式影像,或是經由影像軟體,將影像放大、縮小和切割,甚至隨意修改影像的內容。為了落實保護智慧財產權的目的,數位浮水印技術,透過編碼的方式,將資料轉成數位訊息,再利用浮水印嵌入的技術,將浮水印藏匿至數位影像、媒體中。由於在嵌入浮水印時,即考慮到可能遭受到的攻擊與破壞,因此,即使有人非法盜用或利用影像處理軟體進行竄改,皆可經由浮水印偵測/擷取技術,取出浮水印,驗證數位影像、媒體之所有權。

在過去幾年當中,浮水印技術的研究已逐漸受到重視。然而,一般的浮水印技術,只能抵抗普通的影像處理,對於旋轉、縮放、座標轉換等幾何攻擊,還未能做到有效的保護,主要的原因在於浮水印藏入與取出位置的同步定位的問題,由於藏入浮水印後的影像在經過幾何攻擊後,浮水印資料所在位置難以掌握,使得所藏入的浮水印無法正確被抽取或是偵測出來。目前一些相關的研究如藏入看不見之固定樣式的圖案或是利用特徵點所組成的三角形來定位浮水印位置等方法,然而這些方法仍有改善的空間;本研究的主要目的是利用影像中物件形狀的特性來作為同步定位的參考,並藉由形狀的切割之改良式拼湊法以發展可抗各類幾何攻擊之數位浮水印方法。

此論文提出兩種利用物件主軸以及主軸方向所定位之空間浮水印方法:(1)利用物件形狀切割之浮水印方法以及(2)抗幾何攻擊之調色盤影像浮水印方法。首先,為達到同步定位之目的,利用物件形狀以及幾何特性探討各種取得補丁(patch)之物件形狀切割方法;應用於各種切割方法中的幾何特性包括主軸長度、質心的座標以及特徵向量等;運用這些特性,所嵌入之數位浮水印便可抵抗幾何攻擊。這樣的抗幾何攻擊之數位浮水印法亦可適用於其他影像格式,例如調色盤影像。有別於灰階以及全彩影像,調色盤影像具有顏色不連續的特性,要在有限色盤的限制下兼顧浮水印之不可見性(imperceptible)以及強固性(robustness)是具有挑戰性的工作,本論文中提出利用物件形狀的同步定位應用在調色盤影像浮水印之演算法。另外,影像或照片之變造也是數位浮水印被廣為探討之議題之一,運用物件形狀以及幾何特性,本論文亦提出一個可以抵抗物件切割與張貼(cut-and-paste)攻擊之技術,實驗結果說明所提出的方法具有優良的效果。

另外在資料隱藏(steganography)技術方面,本論文也提出兩種方法:具高品質之調色盤影像資料隱藏方法以及利用統計資料隱藏技術於紋理分類的方法。我們利用疊代方式尋找調色盤中較不重要的顏色,將空出的顏色以最有資料隱藏價值的顏色取代,持續疊代的結果,可以改進常用的調色盤資料隱藏方法,產生更高品質的偽裝影像。最後我們利用統計資料隱藏技術中抗攻擊的特性,轉換成為紋理影像的特徵用於紋理影像的辨識,實驗結果說明所提出的方法仍可有效辨識經雜訊或是壓縮攻擊過之紋理影像,具有高度的實用性。
The current rapid development of information technologies makes provision of commercial multimedia services on Internet. However, in rerum natura, digital multimedia is easy to be copied, re-scaled, rotated, transformed, and modified using handy processing software without much effort. This fact has derived an urgent demand for reliable and secure copyright protection for digital multimedia. Watermarking is the technology used for copy control and media identification and tracing. Most proposed watermarking methods are designed for the protection of digital images. Theses methods embed a short message (a watermark) in the image without affecting the usability but that can be detected using dedicated analysis software.

Watermarking techniques have been widely discussed and developed in recent years. However, studies which focus on watermarking techniques those can resist geometrical attacks are still not quite mature. Geometrical attacks like rotation, scaling, and transforming will miss-position the location of watermark embedded. There are some previous works working on this problem for watermark re-synchronization. We use the geometrical features of object shape in a digital image to achieve the goal of watermark re-synchronization to obtain quite remarkable imperceptibility and robustness.

In this dissertation, we aim to design some information hiding techniques for protecting images and private messages of communication on the Internet. Four information hiding related schemes are proposed. They are (1) Geometric attack free self-synchronized object image watermarking schemes (2) Palette-based object image watermarking scheme (3) Palette-based image Steganography scheme, and (4) Hierarchic texture classification based on statistical steganography.

First of all, to achieve the goal of watermark re-synchronization and embed digital watermark into an object image, geometric features of an object image like the length of principal axes, eigenvectors, and orient of mass center are use for subdividing the object shape. Using those geometric features for shape subdividing makes re-synchronization of watermark detection possible. In our study, different shape subdivision methods, including self-similarity, parallel segmentation and recursively principal axes, are proposed for object watermark embedding. And the geometric attack resistance schemes for object images can be applied to different image formats, including raw and palette-based images. Unlike the true color images and gray level images, palette-based images have discrete color palette. To embed watermark into limited colors and hold the imperceptibleness and robustness is a challenging work. An algorithm for palette-based object image watermarking is proposed here. These proposed methods are easily implemented and can obtain comparable NC values to against outside geometrical attacks such as rotation, scaling and translation.

For the issue of steganography, an iterative method of palette-based image steganography scheme is proposed to improve the existed methods. Better quality of stego- images can be produced using the proposed method. Besides, we also proposed a hierarchic texture classification using statistical steganography technique to obtain robust texture features for texture classification. Experimental results show that the proposed methods can achieve high accuracy rate and also work well even the query textures are distorted by noise corruption or compressed.
CONTENTS

ABSTRACT(IN CHINESE) I
ABSTRACT III
CONTENTS VI
LIST OF TABLES VIII
LIST OF FUGURES IX
CHAPTER 1 INTRODUCTION 1
1.1 Motivation 1
1.2 Background of Information Hiding 1
1.3 Review of Steganographic Techniques 2
1.4 Review of Palette Image Steganographic Techniques 7
1.5 Review of Watermarking Techniques 12
1.6 Background and related works for texture classification 27
1.7 Dissertation Organization 28
CHAPTER 2 ROBUST OBJECT-BASED IMAGE WATERMARKING SCHEME TO GEOMETRIC
ATTACKS 30
2.1 Proposed Watermark Method 30
2.2 Watermark Embedding and Extraction 31
2.3 Experimental Results 33
2.4 Discussions 40
2.5 Parallel Subdivision of Object Image Scheme 42
2.6 Recursively Principal Axes Subdivision Scheme 47
2.7 An extended application of image authentication 50


CHAPTER 3 PALETTE-BASED IMAGE WATERMARKING SCHEME
59
3.1 Architecture of Proposed Scheme 59
3.2Proposed Watermark Embedding and Extraction 60
3.2 Experimental Results and Discussions 62

CHAPTER 4 PALETTE-BASED IMAGE STEGANOGRAPHY 65
4.1 The Proposed Method 65
4.2 Experimental Results and Dicissions 69

CHAPTER 5 HIERARCHIC TEXTURE CLASSIFICATION BASED ON
STATISTICAL STEGANOGRAPHY 78
5.1 Statistical Steganographic Techniqes and Texture Features 78
5.2 Directional Steganographic Histogram 79
5.3 Texture Decision Tree 80
5.4 Texture Classification Results 81

CHAPTER 6 CONCLUSIONS 88

REFERENCES 90
[1] S. Katzenbeisser , F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishers, Boston, London, 2000.
[2] I.J. Cox, M.L. Miller, J.A. Bloom, Digital Watermarking, Morgran Kaufmann Publishers, San Francisco, 2002.
[3] R.J. Anderson, F.A.P. Petitcalas, “On the limt of steganography”, IEEE Journal Selected Areas Communication. Vol.16, pp. 474-481, 1998.
[4] J. Fridrich, “Applications of Data Hiding in Digital Images”, Tutorial for The ISSPA’99, Brisbane, Australia, August,1999.
[5] M. T. SandfordⅡ, J. N. Bradley, and T. G. Handel,” The Data Embedding Method”, SPIE Photonics East Conference ,1995.
[6] Y.K. Lee and L.H. Chen,”High Capacity Image Steganographic Model”, IEE Proceedings Vision, Image and Signal Processing, Vol. 147, Issue 3, pp. 288-294, 2000.
[7] D.C. Wu and W.H. Tsai,” A Steganographic Method for Images by Pixel-Value Differencing”, Pattern Recognition Letters, Vol.24, 1613-1626, 2003.
[8] D.C. Wu and W.H. Tsai, “Spatial-domain image hiding using image differencing,” IEE Proceedings-Vision, Image and Signal Processing, vol. 147, no. 1, pp. 29-37, 2000
[9] N.F. Maxemchuk, “Electronic Document Distribution”, AT & T Technical Journal, Vol. 73, pp. 73-80, 1994.
[10] W. Bender, D.Gruhl, N.Morimoto, and A. Lu, “Techniques for Data Hiding”, IBM System Journal, Vol. 35, Nos 3&4, pp.313-336, 1996.
[11] P. Bas, J-M. Chassery, and F. Davoine,”Using the Fractal Code to Watermark Images”, Proc. of ICIP, vol.1, pp.469-473, 1998.
[12] T. S. Chen, C.-C. Chang, and M.-S. Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization”, IEEE Trans. Image Processing, Vol. 7, No.10, pp. 1485-1488,1998
[13] M. Y. Wu and J. H. Lee, A Novel Data Embedding Method for Two-Color Facsimile Images, International Symposium on Multimedia Information Processing, pp.125-130, 1998.
[14] M. S. Fu, O. C. Au, “Data Hiding Watermarking for Halftone Images”, IEEE Trans. on Image Processing, Vol. 11, No.4, pp.477-484, 2002.
[15] Y.-C. Tseng and H.-K. Pan, "Data Hiding in 2-Color Images", IEEE Trans. on Computers, 51(7), pp. 873-880, 2002.
[16] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, "A Secure Data Hiding Scheme for Binary Images", IEEE Trans. on Communications, Vol. 50, No. 8, pp. 1227-31, 2002.
[17] N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the Unseen”, IEEE Computer, February, pp.26-34,1998.
[18] Steganography software for Widows,
http://www.jjtc.com/stegoarchive/stego/software.html
[19] R. Machado, EZ Stego, [http://www.stego.com]
[20] J. Fridrich,” A New Steganographic Method for Palette-Based Images”, IS&T PICS, Savannah, Georgia, April 25-28, pp. 285-289, 1999.
[21] J. Fridrich and R. Du,” Secure Steganographic Methods for Palette Images”, Proc. The 3rd Information Hiding Workshop, LNCS vol. 1768, Springer-Verlag, New York, pp. 47-60, 2000.
[22] A. Westfeld and A. Pfitzmann,”Attacks on Steganographic Systems”, Proc. The 3rd Information Hiding Workshop, LNCS vol. 1768, Springer-Verlag, New York, pp. 61-75, 2000.
[23] J. Fridrich, M. Goljan and D. Hogea, “Steganalysis of JPEG Images: Breaking the F5 Algorithm”, 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, pp. 310-323, 2002.
[24] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, Boston, 2000.
[25] N. F. Johnson and S. Jajodia,” Steganalysis of Images Created Using Current Steganography Software”, Proc. The Second Information Hiding Workshop, LNCS vol. 1525, Springer-Verlag, 1998, pp. 273-289
[26] N. Provos and P. Honeyman,”Detecting Steganographic Content on the Internet”, CITI Technical Report 01-11, 2001.
http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
[27] I. J. Cox, M.L.Miller, and J. A. Bloom, Digital Watermarking. New York: Morgan Kaufmann, 2002.
[28] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” in Proc. Security and Watermarking of Multimedia Contents, Jan. 1999, pp.226-239
[29] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia, “IEEE Trans. Image Processing, vol. 6,pp. 1672-1687, Dec.1997.
[30] C. S. Lu, S.K. Huang, C.J.Sze, and H.Y.M. Liao,” Cocktail watermarking for digital image protection, ”IEEE Trans. Multimedia, vol. 2, pp.209-224,Dec. 2000.
[31] C.T.Hsu and J.L. Wu Multiresolution watermarking for digital images,” IEEE Trans. Circuits syst. II,vol. 45, pp 206-216, Aug 1998.
[32] Chiou-Ting Hsu; Ja-Ling Wu;”Hidden digital watermark in images,”IEEE Trans. Image Processing, vol.8, pp. 55-68,Jan.1999.
[33] J. Haung, Y.Q. Shi, and Y. Shi, “ Embedding image watermarks in DC components,” IEEE trans. Circuits Syst. Video Technol., vol. 10, pp. 974-979, Sept. 2000.
[34] P.H.W.Wong, O.C.Au, and J.W.C.Wong, “ Image watermarking using spread spectrum technique in log-2-spatio domain,” in Proc. IEEE Int. Symp. Circuits and Systems, vol. 1, May 2000, pp. 224-227.
[35] F. Hartung, Digital Watermarking and Fingerprinting of Uncompressed and compressed Video, Germany : Shaker Verlag, 2000
[36] C.S.Lu and H.Y.Liao, “ Multipurpose watermarking for image authentication and protection,” IEEE Trans. Image Processing, vol.10, pp.1579-1592, Oct. 2001
[37] J.R. Hernandez, F.P. Gonzalez, J.M. Rodriguez, and G.. Nieto, “Performance analysis of a 2-d-multipulse amplitude modulation scheme for data hiding and watermarking of still images,” IEEE J.Select. Areas Commun., vol. 16, pp.510-524, May 1998.
[38] J.R. Hernandez, M. Amado, and F. Perez- Gonzalez, “DCT-domain watermarking techniques for still images : detector performance analysis and a new structure,“ IEEE Trans. Image Processing, vol.9, pp55-68, Jan,2000.
[39] G.G.Langelaar and R.lagedijk, “Optimal differential energy watermarking of DCT encoded images and video,“ IEEE Trans. Image Processing, vol. 10, pp. 148-158, Jan.2001.
[40] P.W. Wong and N. Memon, “Secrete andpublic key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Processing, vol. 10, pp.1593-1601, Oct. 2001.
[41] Y.J. Zhang, T. Chen, and J. Li, “Embedding watermarks into both DC and AC components of DCT,” in Proc.SPIE Security and Watermarking of Multimedia Contents III, Jan.2001, pp.424-435.
[42] C.Y.Lin, M.Wu, J.A.Bloom, I,J,Cox, M.L.Miller, andY. M. Lui.” Rotation, scale, and translatio resilient watermarking for images,” IEEE Trans. Image Processing, vol. 10, pp.767-782, May 2001.
[43] V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” IEEE Trans. Image Processing, vol. 10, pp. 1741-1753, Nov.2001.
[44] V. Licks and R. Jordan, “On digital image watermarking robust to geometric transformation,” in Proc. IEEE Int. Conf. Image Processing, vol. 3, Sept. 2000, pp.690-693.
[45] S. Stankovic, I. Djurovice, and I. Pitas, “Watermarking in the space/ spatial-frequency domain using two-dimensional Randon-Wigner distribution, “IEEE Trans. Image Processing, vol. 10, pp.650-658, Apr. 2001.
[46] H. S. Kim, H. K. Lee,”Invariant Image Watermark Using Zernike Moments”, IEEE Trans. On Circuit and Systems for Video Technology, Vol. 13, No.8, pp.766-775,2003.
[47] P. Bas, J.-M. Chassery, B. Macq, “Geometrically Invariant Watermarking Using Feature Points”. IEEE Trans. On Image Processing. Vol.11, No. 9, pp. 1014- 1028, 2002.
[48] Y. Choi and K. Aizawa, “Digital watermarking using inter-block correlation : extension to JPEG coded domain,” in Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Mar. 2000, pp.133-138.
[49] W. Luo, G. L. Heileman, and C.E. Pizano, “Fast and robust watermarking of JPEG files,” in Proc. IEEE 5th Southwest Symp. Image Analysis and Interpretation, April 2002, pp.158-162.
[50] S. Arena, M.Caramma, and R.Lancini, “Digital watermarking applied to MPEG-2 coded video sequences exploiting space and frequency masking, “in Proc. IEEE Int. Conf. Image Processing, vol. 1,Sept. 2000, pp.438-441.
[51] Swanson, M.D., Zhu, B., Chau, B., Tewfik, A.H., 1997. Object-based transparent video watermarking. IEEE Workshop on Multimedia Signal Processing, Princeton, NJ, USA, June 1997, pp.369-374.
[52] Piva, A., Caldell, R., Rosa, A.D., 2000. A DWT - based object watermarking system for MPEG-4 video streams. Proc. IEEE Int. Conf. On Image Processing, Vancouver, Canada, Sep. 2000. vol. 3, pp.5-8.
[53] Guo, H., Shi, P.F., 2002. Object-based watermarking scheme robust to object manipulations, Electronics Letters , 38 (25),1656 –1657.
[54] Lu, C.S., Liao, H.Y.M., 2001. Video object-based watermarking: a rotation and flipping resilient scheme, Proc. ICIP 2, 483 –486.
[55] D. C. He and L. Wang,”Texture Unit, texture spectrum and texture analysis”, IEEE Trans. On Geoscience and Romote Sensing, vol. 28, pp.509-512, 1990.
[56] C.L. Gilchrist, J.Q. Xia, L.A. Setton, E.W. Hsu, “High-resolution determination of soft tissue deformations using MRI and first-order texture correlation”, IEEE Transactions on Medical Imaging”, vol.23, pp. 546-553, 2004
[57] T. Gevers,” Image segmentation and similarity of color-texture object”, IEEE Transactions on Multimedia, Vol. 4, No. 5,pp.509-516, 2002
[58] S. Liapis and G.. Tziritas,” Color and texture image retrieval using chromaticity histograms and wavelet frames”, IEEE Transactions on Multimedia, Vol. 4, No. 5, pp.676-686, 2004
[59] S.Peleg, J.Naor, R.Hartley, and D.Avnir, “Multiple resolution texture analysis and classification”, IEEE Trans.PAMI, vol. 6, pp. 518-523, 1984.
[60] T.R. Reed and J.M. Du Buf,”A review of recent textures segmentation and feature extraction techniques”, CVGIP: Image Understanding, vol. 57, pp.359-372, 1993.
[61] D. C. He and L. Wang,” Texture classification using texture spectrum”, Pattern Recognition vol. 23, pp.905-910, 1990
[62] J.S. Weszka, C.R.Dyer and A. Rosenfeld,”A comparative study of texture measure for terrain classification”, IEEE Trans. MSC, vol. 6, pp. 269-285, 1976.
[63] P.Brodatz, Textures: A photographic album for artists and designers. Reinhold, New York, 1968.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top