(34.229.64.28) 您好!臺灣時間:2021/05/06 05:26
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:蔡宗志
研究生(外文):Tsung-Chih Tsai
論文名稱:基於符水印及特徵註冊具法律效力的全新影像版權保護機制-以影像方塊特徵為例之研究
論文名稱(外文):A Novel Framework for Legally Effective Image Copyright Protection Based on Feature Registration and Watermarking- An example using a simple image block feature
指導教授:沈岱範
指導教授(外文):Day-Fann Shen
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:電機工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:93
語文別:中文
論文頁數:81
中文關鍵詞:影像方塊特徵演算法並聯比對法出現次數排序法影像版權保護浮水印
外文關鍵詞:WatermarkingImage Copyright ProtectionOccurrence Counts OrderingParallel Local CheckImage Block Feature
相關次數:
  • 被引用被引用:0
  • 點閱點閱:123
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來浮水印演算法,被用來做為保護數位影像版權,但眾多的文獻均著重於技術層面上的考量,如添加雜訊、影像壓縮、剪裁處理等,忽略了最初的目地保護數位影像擁有者。由於浮水印在遭受多重浮水印攻擊時[4],若不能明確的證明出此版權擁有者,則此架構便不適用於保護數位影像版權。
我們提出的影像版權保護新架構,此架構詳細的說明具有保護版權擁有者,需在法律效力的仲裁端配合之下,才能達到保護的目地,此架構是用影像方塊特徵演算法來做為向仲裁端註冊的註冊碼,並且發展出符合此演算法架構下的串聯、並聯比對系統。然而,由於網路的盛行,為了防範非法盜用者於網路上散佈,使用浮水印快速搜尋特性用於主動偵查網路上的非法盜用者。最後依據影像版權保護架構制定出來的性能評估準則,分別與Hu Moments和Zernike Moments比較,比對方法使用並聯架構下的影像方塊特徵演算法能獲得最佳的改善,來達到保護版權擁有者。
In recent years the watermark algorithm is used to protection images copyright, but the multitudinous literature emphatically in the technical stratification plane consideration, like the noise, image compression, crop etc, neglected the initial purpose to protection images copyright owner, because the watermark when suffered multiple attack[4] , if cannot be proof the copyright owner, then this algorithm cannot protection image copyright a.
We proposed the image copyright protects the new overhead construction, this overhead construction detailed showing has protection copyright owner, must in under the legal effect arbitration end coordination, be able to achieve the protection an item place, this overhead construction is develops the algorithm with the image block characteristic to do for to the arbitration end registration code, and develops conforms to this to develop under the algorithm overhead construction the series, the parallel ratio to the system. However, because network being in vogue, in order to guard against the illegal embezzlement to spread in the network, the use floats the illegal embezzlement which the watermark fast search characteristic uses in to investigate in the network on own initiative. Finally performance appraisal criterion which formulates based on the image copyright protection overhead construction, separately compares with Hu Moments and Zernike Moments, compared to under the method use is parallel overhead construction image block characteristic to develop the algorithm to be able to obtain the best improvement, achieves protection copyright owner.
目 錄

中文摘要 ………………………………………………………………… I
英文摘要 ………………………………………………………………… II
誌謝 ………………………………………………………………… III
目錄 ………………………………………………………………… IV
表目錄 ………………………………………………………………… VI
圖目錄 ………………………………………………………………… VII
第一章 緒論…………………………………………………………… 1
1.1 研究背景……………………………………………………… 1
1.2 資料回顧與研究動機………………………………………… 2
1.2.1浮水印在影像智慧財產權保護上的重大缺失……… 2
1.2.2 制定出一套具法律效力系統流程並建立評估準則… 4
1.3 論文的具體貢獻……………………………………………… 5
1.4 論文架構概述………………………………………………… 5
第二章 文獻回顧……………………………………………………… 6
2.1 何謂智慧財產權………..……………………………………. 6
2.2 數位內容保護的重要性……………………………………… 6
2.3 各類浮水印演算法及其限制…………………..…….……… 9
2.4 CBIR技術……………………………………………………… 12
2.5 特徵抽取文獻回顧………………………………………..…. 12
2.5.1 Invariant Moments Feature………………………... 12
2.5.2 Invariant Zernike Moments……….……………… 15
第三章 基於特徵註冊與浮水印具法律效力之影像版權保護新架構-
以影像方塊特徵為例………………………………………. 17
3.1 具版權保護流程架構圖與說明……………………..………. 17
3.2 影像方塊特徵為基礎之影像註冊演算法…………………… 19
3.3 正規化 (Normalization)…………………………………… 20
3.3.1像素值二值化………………………………………...… 20
3.3.2尺寸正規化 ( Size Normalization)………………………21
3.4 影像方塊劃分 (Subblocks Dividing)…………...………… 21
3.5 方塊特徵萃取 (Block Feature extraction)……………... 22
3.6 演算法比對方法……………………………………………... 23
3.6.1串聯比對…………………………………..…………….. 23
3.6.2並聯比對…………………………………............... 24
3.7 主動偵測基制規範定…………............................ 26
第四章 實驗與性能評估比較…………………………………….…... 27
4.1測試環境……………………………………………………… 27
4.2測試影像資料搜集…………………………………………… 27
4.3演算法測試評估準則………………………………………… 29
4.4演算法強健性之實驗………………………………………… 29
4.4.1實驗一:截除影像商標出處…………………………… 30
4.4.2實驗二:影像添加盜版者商標…………………........ 32
4.4.3實驗三:影像經高斯模糊處理……………………… 34
4.4.4實驗四:影像添加雜訊干擾……………………….... 36
4.4.5實驗五:影像惡意破壞 (一) ……………………….. 38
4.4.6實驗六:影像惡意破壞 (二)………………………... 40
4.4.7實驗七:影像惡意破壞 (三) ……………………….. 42
4.4.8實驗八:影像惡意破壞 (四)………………………... 44
4.5搜尋效能評估……………………………………………...... 47
4.6搜尋時間評估………………...……………………………… 48
4.7實驗結果分析與討論………………………………………... 48
第五章 結論與未來發展……………………………………………... 50
附錄A 基於符水印及特徵註冊具法律效力的全新影像版權保護機制-
以影像方塊特徵為例之研究……………………………........ 51
參考文獻 ………………………………………………………………….... 52
簡歷 …………………………………………….................... 70
[1] Voyatzis, G.; Pitas, I. “The use of watermarks in the protection of digital
multimedia products”, Proceedings of the IEEE Volume:87 7, July 1999, Page(s):1197 –1207.
[2] NBS FIPS PUB 46,”Data Encryption Standard”,National Bureau of Standards,U. S. Department of Commerce(1980).
[3] R.Rivest,A Shamir and L.Adleman,”Amethod for Obtaining Digital Signatures and Public-Key Cryptosystems”,Communications of the ACM,Vol.21,No.2,
Feb.1978. , Page(s):120-126.
[4] Craver, S.; Memon, N.; Yeo, B.-L.; Yeung, M.M. “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications”
,Selected Areas in Communications, IEEE Journal on Volume: 16 4 , May 1998 , Page(s): 573 -586
[5] Pitas, I. “A method for watermark casting on digital image”, Circuits and Systems for Video Technology, IEEE Transactions on Volume: 8 6 , Oct. 1998 , Page(s): 775 -780
[6] R. G. Van Schyndel, A. Z. Tirkel and C. F. Osborne, “A Digital watermark”, Proc. 1994 IEEE Int.Conf. on Image Processing, 1994, vol.11, pp.86-90.
[7] Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. “Secure spread spectrum
watermarking for multimedia”, Image Processing, IEEE Transactions on Vol.
612, Dec. 1997 , pp.1673 -1687.
[8] http://www.watermarkingworld.org/ 調查時間為民國94年6月.
[9] http://www.watermarkingworld.org/WMMLArchive/0005/msg00011.html調查時間為民國94年6月
[10] http://www.watermarkingworld.org/WMMLArchive/0005/msg00009.html調查時間為民國94年6月
[11] H. H. Yu and P. Yin, “Multimedia data recovery using information hiding,” in Proc. of IEEE Int. Global Telecommunications ConPLRence, San Francisco, CA, USA, Nov. 2000, vol. 3, pp. 1344-1348. 28. P. Yin, B. Liu, and H. H. Yu, “Error concealment using data hiding,” in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, May 2001, vol. 3, pp. 1453-1456.
[12] Hu ,M.K., “Visual Pattern Recognition by Moment Invariants” IRE Trans. Info .Theory ,1962 ,vol:IT-8,pp:179-187.
[13] J. L. Shih, L. H. Chen, “A new system for trademark segmentation and retrieval, ”Image and Vision Computing, vol. 19, pp. 1011-1018, 2001.
[14] Hae-Kwang Kim, “A modified Zernike moment shape descriptor invariant to translation, rotation and scale for similarity-based image retrieval”, IEEE International Conference on, Volume: 1 , 30 July-2 Aug, 2000.
[15] Y . S. Kim and W. Y. Kim, “Content-based trademark retrieval system using visually salient features”, Image and Vision Computing Vol.16, pp.931-939, 1998.
[16] http://citynight.oso.com.tw/hoax/shell.htm 調查時間為民國94年6月
[17] http://www-2.cs.cmu.edu/~chuck/lennapg/ 調查時間為民國94年6月
[18] R.G van Schyndel,A.Z. Tirkel, and C.F. Osborne,“ A Digital Watermark
,”IEEE Int. Conf. on Image Proc.,1994,Vol.2,pp.86-94.
[19] Zhao , E. j. , ”Towards Robust and Hidden Image Copyright Labeling ,”in Proc. Of IEEE Workshop on Nonlinear Signal and Image Processing,1995.
[20] Patis , I .,”A Method for Signature Casting on Digital Image ,” in Proc. of IEEE Conf. on Image Processing ,1996 , vol.3, pp.215-218.
[21] M. Kutter, F. Jordan , and F. Bossen ,”Digital Watermarking of Color Image using Amplitude Modulation ,”Journal of Electronic Imaging , 1998,Vol.7 ,
No.2 ,pp.326-326.
[22] M.D. Swanson, B. Zhu , and A. H. Tewfik ,“Robust Data Hiding for Images,
”IEEE Digital Signal Processing Wrokshop , (Loen, Norway).1996,pp.37-40.
[23] N.Nikolaidis and I. Pitas,“Robust Image Watermarking in the Spatial Domain,
”Signal Processing ,1998,Vol.66,No.3,pp.385-403.
[24] W.Bender, D.Gruhl, and N.Morimoto,“Techniques for Data Hiding,”Pro. Of the
SPIE Conference on Storage and Retrieval for Image and Video Databases III,
1995 Feb ,Vol.2420,pp.164-173.
[25] Lin,S.D.and Chen,C.F.,“A Robust DCT-Based Watermarking for Copyright
Protection, Original Manuscript Received, 2000 June.
[26] I.J. Cox , J. Kilian , F.T. Leighton and T. Shamoon ,”Secure Spread Spectrum
Watermarking for Multimedia ,”IEEE transactions on Image Processing ,
1997,Vol.6,NO.12,pp.1673-1687.
[27] M Barni, F. Bartolini , V. Cappellini and A. Piva,“A DCT-domain System for
Robust Image Watermarking ,”Signal Processing , 1998 , Vol.66,No.3,pp.357
-372.
[28] Tsai, M. J., Yu, K. K. And Chen, Y. Z. ,”Joint Wavelet and Spatial Transformation for Digital Watermarking “, Original Manuscript Received January 11,2000.
[29] C.T Hsu and J.L.Wu ,“Hidden Digital Watermarks in Images,”IEEE
Transactions on Image Processing , 1999 Jan ,Vol.8, No.1,pp.58-68.
[30] F.Hartung , and M.Kutter,“Multimedia Watermarking Techniques,
”Proceedings of the IEEE ,1999 July , Vol.87,No.7,pp.1079-1107.
[31] F.A.P.Petitcolas, R.J. Andreson, and M.G.Kuhn,“Information Hiding-A
Survery,”Proceedings of the IEEE,1999 July,Vol.87,No.7,pp.1062-1078.
[32] V.N. Gudivada and V.V. Raghavan, eds., “Content-based Image Retrieval
Systems”, Computer, Vol. 28, No. 9, Sept. 1995, pp. 18-22.
[33] M. Flickner, H. Sawhney, W. Niblack, J. Ashley, Q. Huang, B. Dom, M.
Gorkani, J. Hafner, D. Lee, D. Petkovic, D. Steele, and P. Yanker, “Query by
image and video content: The QBIC system”, IEEE Computer, vol. 28, no. 9,
pp. 23-32, 1995.
[34] A. Pentland, R. W. Picard and S. Sclaroff,“Photobook: content-based
manipulation of image database,” SPIE Storage and Retrieval for Image and
Video Database II vol.2185, pp.34-47, 1994.
[35] J. R. Smith and S. F. Chang, “Visualseek: A fully automated context-based image
query system,” in Proc. ACM Multimedia, pp. 87-98, 1996.
[36] Chien-cheng Tseng, Ren-Der Lin and Su-Ling Lee, ”Image watermarking Based on
Toral Automorphism, Block DC Value Quantization and Error Correcting
Code”,1999 12th IPPR ConPLRence on Computer Vision, Graphics and Image
Processing, vo1.I,pp158-165,1999.
[37] H. H. Yu and P. Yin, “Multimedia data recovery using information hiding,” in Proc.
of IEEE Int. Global Telecommunications ConPLRence, San Francisco, CA, USA,
Nov. 2000, vol. 3, pp. 1344-1348.
[38] Pei, S.-C.and Ching-Min Cheng ,“Extracting Color Features and Dynamic
Matching for Image Data-Base Retrieval, ” Circuits and Systems for Video
Technology, IEEE Transactions on Volume 9, Issue 3, April 1999
Page(s):501 – 512
[39] Gevers, T. and Smeulders, A.W.M,“PicToSeek : Combining Color and
Shape Invariant Features for Image Retrieval, ” Image Processing, IEEE
Transactions , 2000 Jan , Vol. 9, No:1, Page(s):102 – 119.
[40] Yixin Chen; Wang, J.Z,“A Region-Based Fuzzy Feature Matching Approach
to Content-Based Image Retrieval,”Pattern Analysis and Machine
Intelligence, IEEE Transactions , 2002 Sept ,Vol. 24, Issue 9, Page(s):1252
-1267.
[41] Wang, Z. , Chi, Z. and Feng, D.,“Shape based leaf image retrieval,”Vision, Image and Signal Processing, IEE Proceedings, 2003 Feb,Vol.150, No.1,
Page(s):34 – 43.
[42] Natsev, A. , Rajeev Rastogi , Shim, K.,“WALRUS : A Similarity Retrieval Algorithm for Image Databases,” Knowledge and Data Engineering, IEEE Transactions, 2004 Mar ,Vol.16, No: 3, Page(s):301 – 316.
[43] 王錦堂, 沈岱範 ,“數位影像版權保護演算法之性能評估與特徵比對之保護機制”,國立雲林科技大學碩士論文,2000
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔