跳到主要內容

臺灣博碩士論文加值系統

(44.201.97.138) 您好!臺灣時間:2024/09/16 00:48
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:莊淑禎
研究生(外文):Shu-Shen Chuang
論文名稱:盲目型浮水印在彩色影像之研究
指導教授:黃炳森黃炳森引用關係
學位類別:碩士
校院名稱:國防大學中正理工學院
系所名稱:電子工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:95
語文別:中文
論文頁數:64
中文關鍵詞: 數位浮水印 盲目型 小波轉換
相關次數:
  • 被引用被引用:0
  • 點閱點閱:182
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
數位浮水印為現今在網路上對保護著作權及驗證多媒體資料的主要方法,因影像在傳輸時有可能遭受的所有刻意攻擊,影像嵌入之浮水印,如標籤、資訊等,亦可視為在現今通信上的重要工作之ㄧ。
本論文主要討論為盲目型浮水印中的半盲目型浮水印,也就是不需原圖,但仍需原圖的資訊以萃取出水印。提出的方法是在彩色影像經過離散小波轉換(DWT, Discrete Wavelet Transform)後嵌入不可見的二元浮水印的演算法。首先將原來的彩色影像轉換到YUV空間後,利用小波轉換的特性,在中高頻次頻帶部分,我們依據次頻帶的係數平均值及變異數來調整小波係數,以嵌入水印;在低頻次頻帶部份,我們則使用量化的方式來嵌入水印。除此之外,為了加強水印之強健性及不可見性,我們也利用了離散小波轉換後之影像區塊之變異數來選擇嵌入水印的區塊。最後再對嵌入影像之多水印最佳化處理。
在實驗結果部份,我們將影像經過多種攻擊,如JPEG壓縮攻擊、STIRMARK 4.0之高低通濾波器攻擊及模糊攻擊,都可以成功地得到強健的浮水印。
Digital watermarking is an important method for copyright protection and authentication of multimedia data on the internet. The watermarking can be viewed as one of major communication tasks, where the watermarking, acting like information and logo etc., is embedded into a host image, in a communication channel that susceptible to be attacked on purpose.
This paper concerns with the fragile watermarking belonging to the method of blind watermarking, so called semi-blind watermarking. That is by extracting watermarks without original images but some information of them are needed, in blind watermarking method. The proposed algorithm embeds invisible binary watermarks in the color image after Discrete Wavelet Transform (DWT).The original color image is first transformed into the YUV color space. In the mid-high frequency subband, by exploiting the excellent properties of the wavelet transform, we use the mean and variance of the detail subbands to modify the wavelet coefficients adaptively to embed the watermark. In the low frequency subband, we adopt the quantification method to embed the watermark. Besides, we use the variance of each image block after DWT to choose the block to embed the watermark. This way can enhance the watermark robustness and transparency. Finally, we apply the optimal watermarking scheme to combine extracted multiple watermark.
Experimental results show that the hidden watermarks are robust to the attacks of JPEG lossy compression, high-pass filter, low pass filter, and the blurring processing under Stirmark 4.0, and so on.
誌謝
摘要
ABSTRACT
目錄
表目錄
圖目錄
1. 緒論
2. 浮水印相關技術  
2.1 數位浮水印類型
2.2 數位浮水印基本架構
2.2.1 浮水印嵌入技術
2.2.2 浮水印萃取方法
2.3 小結
3. 浮水印架構
3.1 離散小波轉換
3.2 浮水印嵌入方法
3.3 浮水印嵌入
3.3.1 彩色模型轉換
3.3.2 選擇嵌入浮水印區塊
3.3.3 嵌入中高頻次頻帶提出方法
3.3.4 嵌入低頻次頻帶之提出方法
3.4 浮水印萃取
3.4.1 中高頻次頻帶萃取水印之提出方法
3.4.2 低頻次頻帶萃取水印之方法
3.5 貢獻
4.實驗結果
4.1 實驗簡介
4.1.1 加權
4.1.2 多數決
4.2 萃取水印
4.3 各種影像攻擊
4.3.1 JPEG攻擊
4.3.2 低通濾波(LP, Low Pass Filter)、高通濾波(HP, High Pass Filter)與模糊攻擊
4.3.3 改變影像大小的攻擊
4.4 小結
5.結論及未來工作
參考文獻
自 傳
[1]Wang, Y., and Pearmain, A., “Blind Image Data Hiding Based On Self Reference,” Pattern Recognition Letters, Vol. 25, pp.1681–1689, Nov. 2004.
[2]Coltuc, D., and Bolon, P., “Color Image Watermarking in HSI Space,” International Conference on Image Processing, Vancouver, British Columbia, Canada, Vol. 3, pp. 698-701, 10-13 Sept., 2000.
[3]Potdar, V. M., Han, S., and Chang, E., ”A Survey of Digital Image Watermarking Techniques,” 3rd International Conference on Industrial Informatics, Perth, Australia, pp.709-716, 10-12 Aug., 2005.
[4]Hartung, F., and Kutter, M., “Multimedia Watermarking Techniques,” Proceedings of IEEE, Vol. 87, No. 7, pp. 1079-1107, July, 1999.
[5]Zhang, G., Wang, S., and Nian, G., “A Blind Watermarking Algorithm Based on DWT for Color Image,” 10th Asia-Pacific Conference on Communication and 5th International Symposium on Multi-Dimension Mobile Communications, Beijing, China, Vol. 2, pp.634-638, 29 Aug.-1 Sept., 2004.
[6]Zhang, G., Wang, S., and Nian, G., “An Adaptive Block-based Blind Watermarking Algorithm,” 7th International Conference on Signal Processing, Beijing, China, Vol. 3, pp. 2294-2297, 31 Aug.-4 Sept., 2004.
[7]Chen, W. Y., and Chen, C. H., “Robust Watermarking Scheme for Still Images Using Frequency Shift Keying with High-Variance Block Selection,” Optical Engineering, Vol. 42, pp.1826-1835, Jun., 2003.
[8]Kang, X., Huang, J., Shi, Y. Q., and Lin, Y., “A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression,” Optical Engineering, Vol. 13, pp.776-786, Aug., 2003.
[9]Pereira, S. and Pun, T., “Robust Template Matching for Affine Resistant Image Watermarks,” IEEE Transactions on Image Processing, Vol. 9, Issue 6, pp. 1123 – 1129, June, 2000.
[10]Liu, L. S., Li, R. H., and Gao, Q., “A New Watermarking Method Based on DWT Green Component of Color Image,” Proceedings of 2004 International Conference on Machine Learning and Cybernetics, Shanghai, China, Vol. 6 , pp. 3949-3954, 26-29 Aug., 2004.
[11]Kong, X. W., Ma, T., Wei, W., and Yang, D. L., “Statistic-based Color Image Watermarking Scheme in DWT Domain,” International Conference on Machine Learning and Cybernetics, Xi'an, China, Vol. 5, pp.2907 – 2910, 2-5 Nov., 2003.
[12]Shiang, C., Chang, C. C., and Hu, Y. C., “Color Image Hiding Scheme Using Image Differencing,” Optical Engineering, Vol.44, pp. 017003-1 - 017003-9, Jan., 2005.
[13]Chen, L. H., and Lin, J. J., “Mean Quantization Based Image Watermarking,” Image and Vision Computing, p. 717-727, 2003.
[14]Hsu, C. T., and Wu, J. L., “Multiresolution Watermarking for Digital Images,” IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, Vol. 45, pp. 1097-1101, Aug., 1998.
[15]Hsu, C. T., and Wu, J. L. “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, Vol. 8, pp.58-68, Jan., 1999.
[16]Xie, G., and Shen, H., “Blind Grayscale Logo Watermarking Based on Image Fusion Principles,” IEEE-Eurasip Nonlinear Signal and Image Processing. Abstracts, Sapporo, Japan, pp.1-5, 18-20 May, 2005.
[17]Chen, D. Y., Huang, C. H., Wu, J. L., and Ouhyoung, M., “A Shift-resisting Blind Watermark System for Panoramic Images,” International Conference on Consumer Electronics, Taipei, Taiwan, pp. 8-9, 13-15 June, 2000.
[18]Choi, B.C., and Seo, D.I., “A Statistical Approach for Optimal Watermark Coefficients Extraction in HVS-based Blind Watermarking System,” The 7th International Conference on Advanced Communication Technology, Phoenix Park, South Korea, Vol. 2, pp.1085-1088, 21-23 Feb, 2005.
[19]Cheng, Q., and Huang, T. S., “A DCT-domain Blind Watermarking System Using Optimum Detection on Laplacian Model,” 2000 International Conference on Image Processing, Vancouver, British Columbia, Canada, Vol. 1, pp. 454-457, 10-13 Sept., 2000.
[20]Liu, Y., Gao, W., Cui, M., and Song, Y., “General Blind Watermark Schemes,” 2nd International Conference on Web Delivering of Music, Darmstadt, Germany, pp.143-149, 9-11 Dec., 2002.
[21]Liu, Z. B., Fan, J. L., and Zhang, H. C., “A Blind Watermarking Algorithm Based on Wavelet Lifting Transform,” 7th International Conference on Signal Processing, Beijing, China, Vol. 1, pp. 843-847,31 Aug.-4 Sept., 2004.
[22]Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Attacks on Copyright Marking Systems,” Second International Workshop in the Proceedings of Information Hiding, Portland, Oregon, U.S.A., Springer-Verlag, pp.219-239, 15-17 April, 1998.
[23]Petitcolas, F. A. P., “Watermarking Schemes Evaluation,” IEEE Signal Processing Magazine, Vol. 17, No.5, pp.58-64, Sept., 2000.
[24]Huang, F., and Guan, Z. H., “A Hybrid SVD-DCT Watermarking Method Based on LPSNR,” Pattern Recognition Letters, Vol. 25, pp.1769-1775, Nov., 2004
[25]Adams, M. D., and Kossentini, F., “JasPer: A Software-based JPEG-2000 Codec Implementation,” International Conference on Image Processing, Vancouver, BC, Canada, Vol. 2, pp. 53-56, 10-13 Sept., 2000.
[26]Shih, F. Y., and Wu, Y. T., “Combinational Image Watermarking in the Spatial and Frequency Domain,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, April, 2003.
[27]Barni, M., Bartolini, F., and Piva, A, “Multichannel Watermarking of Color Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 12, Issue 3, pp. 142 -156, March 2002.
[28]Chou, C. H. and Liu, K. C., “An Oblivious And Robust Watermarking Scheme Using Perceptual Mode,” Conference focused on Video/Image Processing and Multimedia Communications, Zagreb, Croatia, Vol. 2, pp. 713- 719, 2-5 July 2003.
[29]廖德明,”以亮度區塊為主嵌入浮水印之研究” ,碩士論文,國立高雄第一科技大學電腦與通訊工程系,高雄,第17-20頁,2001。
[30]張真誠、黃國峰、陳同孝,電子影像技術,松崗電腦圖書資訊股份有限公司,第8-11頁,2000。
[31]孫陸和、陳哲明、牛夏牧,數字水印技術與應用,科學出版社,第57-59頁,2005。
[32]http://www.watermarkingworld.org/faq.html
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 邱月琴(2002),〈多元化時代國民中學教師績效評估制度之檢討與展望〉,《人事行政》,第141期,頁31-39。
2. 林進材(1998),〈教師效能的研究及其在教學上的應用〉,《教育資料文摘》,第41卷第1期,頁134-147。
3. 吳璧如(2002),〈集體教師效能感初探〉,《教育資料與研究》,第49期,頁72。
4. 王文科(1987),〈「公立學校教職員成績考核辦法」簡評〉,《現代教育》,第6期,頁21-26。
5. 吳政達(1995),〈教師評鑑方法之探討(上)〉,《教育研究》,第83期,頁107-112。
6. 吳天方、林致瑋(2004),〈職校教師評鑑領域與指標〉,《技術及職業教育》,第79期,頁29-34。
7. 高強華(1998),〈迎接教師參與的教改新世紀-教師權利與義務的新境界〉,《教育資料與研究》,第22期,頁26-29。
8. 張倍禎、王健華(2002),〈大學教學優良教師評鑑指標的建立—教學資源中心教師評鑑個案研究〉,《教學科技與媒體》,第59期,頁46-62。
9. 張德銳(1999),〈我國中小學教師分級制度可能面臨的問題與因應策略〉,《教育資料與研究》,第31期,頁27-31。
10. 張慧淳、蔡金蘭、馮國超、宋鴻洲、劉淑玲、李朝畫、高瑞敏、鄭偉琪、張彩雲、張嘉亨、洪莉玲(1988),〈教師考核辦法之檢討與改進〉,《現代教育》,第11期,頁107-118。
11. 陳志成(2003),〈教師成績考核制度之探討〉,《教育資料與研究》,第54期,頁95-102。
12. 陳美博(2000),〈國小教師評鑑制度之探討〉,《國教天地》,第138期,頁40-44。
13. 陳富銘(2002),〈教師評鑑的六W〉,《屏縣教育季刊》,第11期,頁24-27。
14. 湯誌龍(2001),〈中小學教師評鑑制度之研究-澳洲維多利亞省的實施經驗〉,《比較教育》第51期,頁105-127。
15. 馮莉雅(2002),〈學生評鑑教師教學效能之探討〉,《教育資料與研究》,第47期,頁86-91。