(3.227.235.183) 您好!臺灣時間:2021/04/17 10:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:林詩緯
研究生(外文):Lin Shih-Wei
論文名稱:以JPEG2000編碼法為基礎之漸進式影像鑑別技術
論文名稱(外文):A Progressive Image Authentication Scheme Base on JPEG 2000 Codec
指導教授:婁德權婁德權引用關係劉江龍劉江龍引用關係
指導教授(外文):Lou Der-ChyuanLiu Jiang-Lung
學位類別:碩士
校院名稱:國防大學中正理工學院
系所名稱:電子工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:47
中文關鍵詞:JPEG 2000漸近式影像鑑別JPSEC
外文關鍵詞:JPEG 2000ProgressiveImage AuthenticationJPSEC
相關次數:
  • 被引用被引用:0
  • 點閱點閱:136
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
對影像安全而言,影像鑑別技術是相當重要的一部分。影像壓縮技術日新月異,其功能已不僅在增加壓縮效率,同時也提供不同的功能特性以因應不同的應用需求。因此,一個有效之影像鑑別技術就必須根據影像壓縮技術本身特性而設計。JPEG 2000為一新興之影像壓縮標準,其提供了多樣化的功能以解決現今各種影像應用之領域,其中一個重要特性便是檔案串流具有可調性,解壓縮端僅需對所需之JPEG 2000壓縮位元串流進行解碼,即可獲得所要之影像,因此本論文便針對此一特性提出以JPEG 2000編碼法為基礎之漸進式影像鑑別技術。
有鑒於影像安全問題在各種影像應用領域中相當重要,JPEG 2000研究組織目前仍持續進行研究JPEG 2000影像相關之安全議題,並將其命名為JPSEC,其主要目的便是在符合JPEG 2000壓縮標準下,提供影像安全之標準規範。而本論文為因應這未來發展趨勢,在符合JPEG 2000檔案串流可調性之特性下,亦設計出符合JPSEC語法規範之漸進式影像鑑別技術。
本論文所提出之漸進式影像鑑別技術是以封包為最小鑑別單位,且由於封包同樣為JPEG 2000影像串流之最小單位,故本論文所提出之漸進式影像鑑別技術可完全支援JPEG 2000所有的漸進模式。並根據實驗結果顯示,本論文所提出之技術除了能針對存取部份影像串流達到漸進式影像鑑別之目的外,也可有效定位影像被竄改之區域。因此,本論文所提出之漸進式影像鑑別技術,可適用於不同的JPEG 2000影像編碼之應用。
Image authentication is a very important part for image security. Image compression technologies change with each passing day. They not only improve compression efficiency, but also provide a rich set of features for variety of applications. An efficient image authentication method should be developed according to the characteristics of the compression technique itself. JPEG 2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. One important aspect of JPEG 2000 is its scalable property. Decoder allows only extraction of sub-image from a single compressed image codestream for essential image data. Therefore, the thesis proposes a progressive image authentication scheme based on JPEG 2000 codec.
Recognizing that security is an important concern in many applications, the Joint Photographic Experts Group (JPEG) is on-going an activity known as Secure JPEG 2000 or JPSEC. Its goal is to extend the JPEG 2000 standard to provide a standardized framework for secure imaging. For tendency towards developing of future, the thesis also proposes another progression image authentication scheme integrated into JPSEC syntax for backward compatible with the scalable JPEG 2000 codestream.
The proposed image authentication schemes use the packets as the authentication units. Because the packets are also the basic units of the JPEG 2000 codestream, the proposed techniques fully support different progressive strategies for JPEG 2000 image coding. Experimental results show that the proposed authentication schemes can not only extract sub-codestream for progressive image authentication, but also locate the tampered image. Therefore, the proposed image authentication schemes are practical for various applications of progressive JPEG 2000 image authentication.
誌謝 ii
摘要 iii
ABSTRACT iv
目錄 v
表目錄 vii
圖目錄 viii
1. 緖論 1
1.1 研究背景 1
1.2 研究動機及目的 2
1.3 論文架構 3
2. JPEG 2000影像鑑別技術 4
2.1 前言 4
2.2 JPEG 2000影像壓縮技術 4
2.2.1 JPEG 2000編解碼架構 6
2.2.2 前置處理 7
2.2.3 離散小波轉換 10
2.2.4 量化 14
2.2.5 熵編碼 15
2.2.6 漸進式傳輸模式 19
2.3 強固型數位簽章鑑別技術 21
2.4 壓縮域圖像鑑別技術 21
2.5 以封包為基礎之漸進式鑑別技術 22
2.6 JPSEC鑑別法 22
2.7 小結 24
3. 以JPEG 2000編碼法為基礎之漸進式影像鑑別技術 25
3.1 前言 25
3.2 封包漸進式鑑別法 25
3.3 鑑別資訊產生及嵌入 26
3.3.1 相容於JPEG 2000 – Part 1之嵌入法 29
3.3.2 JPSEC語法嵌入法 30
3.4 竄改區域偵測 31
4. 實驗結果與討論 33
4.1 實驗環境 33
4.2 實驗結果 34
4.3 小結 40
5. 結論與未來研究方向 41
5.1 結論 41
5.2 未來研究方向 42
參考文獻 43
自傳 47
[1] 林志昌、王智弘,“數位影像認證技術之發展與新趨勢”,資訊安全通訊,第十卷,第一期,第93-107頁,2004年1月。
[2] Stallings, W., Cryptography and Network Security, Prentice Hall, New Jersey, 2003.
[3] Rivest, R., “The MD5 Message Digest Algorithm,” Internet Request for Comments 1321, 1992.
[4] Rivest, R., Shamir, A., and Adleman, L., “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, February, 1978.
[5] Skraparlis, D., “Design of an Efficient Authentication Method for Modern Image and Video,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, pp. 417-426, May, 2003.
[6] Schneider, M. and Chang, S.-F., “A Robust Content Based Digital Signature for Image Authentication,” Proceedings of the 1996 IEEE International Conference on Image Processing, Lausanne, Switzerland, Vol. 3, pp. 227-230, September, 1996.
[7] Bhattacharjeeand, S., and Kutter, M., “Compression Tolerant Image Authentication,” Proceedings of the IEEE International Conference on Image Processing, Chicago, United States, Vol. 1, pp. 435-439, October, 1998.
[8] Lou, D.-C. and Liu, J.-L., “Fault Resilient and Compression Tolerant Digital Signature for Image Authentication,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 31-39, February, 2000.
[9] Lin, C.-Y. and Chang, S.-F., “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Transactions on Circuits and Systems of Video Technology, Vol. 11, No. 2, pp. 153-168, February, 2001.
[10] Lu, C.-S. and Liao, M. H.-Y., “Structural Digital Signature for Image Authentication: an Incidental Distortion Resistant Scheme,” IEEE Transactions on Multimedia, Vol. 5, No. 2, pp. 161-173, June, 2003.
[11] Taubman, D. S. and Marcellin, M. W., JPEG 2000 Image Compression Fundamental, Standard and Practice, Kluwer Academic Publishhers, 2001.
[12] Taubman, D. S. and Marcellin, M. W., “JPEG 2000: Standard for Interactive Imaging,” Proceeding of the IEEE, Vol. 90, No. 8, pp. 1336-1357, August, 2002.
[13] Information Technology - JPEG 2000 Image Coding System-Part 8: Secure JPEG 2000, ISO/IEC Committee Draft 15444 - 8, 2004.
[14] Digital Compression and Coding of Continuous - Tone Still Images: Requirements and Guidelines, ISO/IEC International Standard 10918-1, 1992.
[15] Information Technology - JPEG 2000 Image Coding System, ISO/IEC Final Committee Draft 15444-1, 2000.
[16] 吳炳飛、胡益強、瞿忠正、蘇崇彥,JPEG 2000影像壓縮技術,全華科技圖書股份有限公司,台北,2003。
[17] Christopoulos, C., Skodras, A., and Ebrahimi, T., “The JPEG 2000 Still Image Coding System: An Overview,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 1103-1127, November, 2000.
[18] 戴顯權、陳政一,JPEG 2000,紳藍出版社,高雄,2002。
[19] Rabbani, M. and Joshi, R., “An Overview of the JPEG 2000 Still Image Compression Standard,” Signal Processing: Image Communication, Vol. 17, No. 1, pp. 3-48, January, 2002.
[20] http://www.jpeg.org/jpeg2000/index.html.
[21] Chen, W.-H., Smith, C. H., and Fralick, S. C., “A Fast Computational Algorithm for the Discrete Cosine Transform,” IEEE Transactions on Communications, Vol. 25, No. 9, pp. 1004-1009, September, 1977.
[22] Antonini, M., Barlaud, M., Mathieu, P., and Daubechies, I., “Image Coding Using the Wavelet Transform,” IEEE Transactions on Image Processing, Vol. 1, No. 2, April, 1992.
[23] 陳同孝,張真誠、黃國峰,數位影像處理技術,旗標出版股份有限公司,台北,2003。
[24] Sweldens, W., “The Lifting Scheme: A Custom - Design Construction of Biorthogonal Wavelets,” Applied and Computational Harmonic Analysis, Vol. 3, No. 2, pp. 186-200, April, 1996.
[25] Sweldens, W., “The Lifting Scheme: A Construction of Second Generation Wavelets,” SIAM Journals Mathematics Annual, Vol.29, No.2, pp. 511-546, March, 1998
[26] Adams, M. D. and Kossentini, F., “Reversible Integer - to - Integer Wavelet Transform for Image Compression: Performance Evaluation and Analysis,” IEEE Transactions on Image Processing, Vol. 9, No. 6, pp. 1010-1024, June, 2000.
[27] Shapiro, J. M., “Embedded Image Coding Using Zerotrees of Wavelet Coefficients,” IEEE Transactions on Signal Processing, Vol. 41, No. 12, pp.3445-3462, December, 1993.
[28] Said, A. and Pearlman, W. A., “A New Fast and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees,” IEEE Transactions on Circuits and System for Video Technology, Vol. 6, No. 3, pp. 243-250, June, 1996.
[29] Taubman, D., “High Performance Scalable Image Compression with EBCOD,” IEEE Transactions on Image Process, Vol. 9, No. 7, pp. 1158-1170, July, 2000.
[30] Sun, Q. and Chang, S.-F., “A Secure and Robust Digital Signature Scheme for JPEG2000 Image Authentication,” IEEE Transactions on Multimedia, Vol. 7, No. 3, pp. 480-494, June, 2005.
[31] Grosbois, R., Gerbelot, P. and Ebrahimi, T., “Authentication and Access Control in the JPEG 2000 Compressed Domain,” Proceedings of the SPIE - Applications for Digital Image Processing XXIV, San Diego, United States, Vol. 4472, pp. 95-104, July, 2001.
[32] Peng, C., Deng, R., Wu, Y., and Shao, W., “A Flexible and Scalable Authentication Scheme for JPEG 2000 Codestreams,” Proceedings of the Eleventh ACM International Conference on Multimedia, Berkeley, United States, pp. 433-441, November, 2003.
[33] Wu, Y., Ma, D., and Deng, R. H., “Progressive Protection of JPEG 2000 Codestreams,” Proceedings of the IEEE International Conference on Image Processing, Singapore, Vol. 5, pp. 3447-3450, October, 2004.
[34] http://jj2000.epfl.ch/.
[35] http://www.irfanview.com/.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔