跳到主要內容

臺灣博碩士論文加值系統

(3.234.211.61) 您好!臺灣時間:2021/10/18 17:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李崇逸
研究生(外文):Chung-Yih Lee
論文名稱:應用於數位監錄系統之多功能影像認證浮水印之研究
論文名稱(外文):The Study on Multipurpose Image Watermarking Applied on Digital Video Recorder
指導教授:陳聰毅陳聰毅引用關係陳昭和
指導教授(外文):Tsong-Yi ChenThou-Ho Chen
學位類別:碩士
校院名稱:國立高雄應用科技大學
系所名稱:電子與資訊工程研究所碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:54
中文關鍵詞:影像認證影像復原視訊壓縮
外文關鍵詞:Image AuthenticationImage RestorationVideo Compression
相關次數:
  • 被引用被引用:1
  • 點閱點閱:600
  • 評分評分:
  • 下載下載:23
  • 收藏至我的研究室書目清單書目收藏:0
隨著視訊壓縮技術的發展與應用,數位監控錄影系統的越趨普及化,許多民間公司與政府機關已將傳統的類比式閉路系統數位化。然而,資訊科技的日新月異,尤其在網際網路的公開環境下,資訊取得與複製更是較為以往便利,縱使在安全的資料庫環境下,仍有許多不法的方式能取得儲存於資料庫內的重要資料而加以變造,如何有效的防止資料被不法的盜用或竄改,是當前最重要的資訊安全課題之一。
本論文將介紹一種利用離散餘弦轉換(Discrete Cosine Transform)區塊係數之有效的影像認證與復原技術。主要概念是以離散餘弦轉換的區塊特性,將認證位元及復原資訊隱藏至DCT區域的中低頻位置,並利用漢明距離偵測所有可能的非法竄改的區域,當偵測到被竄改區域後,再將相對應區域的復原資訊取出,對被竄改的區域像素值做復原。
為了驗證本論文所提的影像認證與復原方法的可行性,本研究進行了一般影像處理技術對藏入之浮水印位元的影響,以及對藏入的資訊量在影像品質的影響提出一個統計報告。實驗結果證明,所提出的影像認證與復原方法在不使用原始影像的輔助之下,可以有效的偵測出被非法竄改的區域並加以進行資訊復原。
所提出的技術並可以應用於數位監錄系統的資料保護,一方面驗證所儲存的影像是否遭受惡意竄改,並在不需原始影像的協助之下,藉由所藏入的少量復原資訊使被竄改的區域還原到可以人眼識別的影像品質。
The traditional video surveillant devices have been used in supervising for a long time. Since the digital video technologies are more and more mature, these kinds of surveillant devices are being to be replaced by Digital Video Recorder in recent years. Even the computer security technologies make DVR systems into a safe space, there are still many methods to get the data that stored in a security database. One of the most important things is to prevent the data to be illegally used.
In this paper, we proposed an effective digital image watermarking method. The basic concept is to embed the selected watermarking bits into the selected DCT coefficients. We compare the embedded watermarking-bits and the feature-bits to determine if a block had been unauthorized tampered. After that, we can regenerate the tampered information by using the embedded feature-bits.
The proposed method could be used on Digital Video Recorder. We can authorize the validity of the stored video in the database. If an illegal video frame is detected, we can reconstruct the important frames by our algorithm.
中文摘要 i
英文摘要 ii
誌謝 iii
目錄 iv
表目錄 vi
圖目錄 vii
第一章、緒論 1
1.1 研究背景與目的 1
1.2 論文架構 3
第二章、相關文獻探討 4
2.1 資料隱藏的應用 4
2.2 數位浮水印的基本要件 4
2.3 各種影像攻擊方法 6
2.4 Kundur 浮水印驗證方法 7
2.5 Wang浮水印驗證方法 9
2.6 C.Y. Lin 浮水印驗證及影像復原方法 13
2.7 其它影像復原方法 16
第三章、有效的影像驗證及復原方法 23
3.1 相關知識 23
3.1.1 YCbCr色彩空間 24
3.1.2 離散餘弦轉換 25
3.1.3 JPEG壓縮標準 26
3.1.4 H.263壓縮標準 28
3.2 影像驗證的方法 30
3.2.1 認證位元的產生 31
3.2.2 藏入位置的選擇及隱藏方法 35
3.2.3 影像驗證程序 37
3.3 影像復原的方法 38
3.3.1 復原資訊的產生 39
3.3.2 影像復原程序 41
第四章、實驗結果 42
4.1 測試樣本與評估標準 42
4.2 水平能量與垂直能量分佈 44
4.3 藏入浮水印後的影像品質 45
4.4 影像驗證結果 47
第五章、結論與未來展望 49
參考文獻 50
著作清單 54
[1].Tsong-Yi Chen, Chien-Hua Huang and Thou-Ho Chen, “Authentication of Lossy Compressed Video Data by Semi-Fragile Watermarking”, IEEE 2004 International Conference on Image Processing (ICIP Singapore), 2004.
[2].Kwang-Fu Li, Tung-Shou Chen and Seng-Cheng Wu, ”Image tamper detection and recovery system based on discrete wavelet transformation”, Communications, Computers and signal Processing, 2001 IEEE Pacific Rim Conference on, Vol. 1, Aug. 2001, Page(s): 164 -167 vol. 1.
[3].Min Wu and Bede Liu, “Watermarking for Image Authentication”, Proceedings of IEEE International Conference on Image Processing, Oct. 4-7, 1998, Chicago, Illinois, USA, Vol. 2, Page(s): 437-441.
[4].Tae-Yun Chung, Min-Suk Hong, Young-Nam Oh, Dong-Ho Shin and Sang-Hui Park, “Digital Watermarking for Copyright Protections of MPEG2 Compressed Video”, IEEE Trans. on Consumer Electronics, Vol. 44, No. 3, Aug. 1998, Page(s): 895-901.
[5].Ching-Yung Lin and Shih-Fu Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content”, SPIE International Conf. on Security and Watermarking of Multimedia Contents II, Vol. 3971, No. 13, EI '00, San Jose, USA, Jan 2000.
[6].Ching-Yung Lin and Shih-Fu Chang, “SARI: Self-Authentication-and- Recovery Image watermarking system”, ACM Multimedia 2001 Workshops - 2001 Multimedia Conference, 2001, Page(s): 628-629.
[7].Ching-Yung Lin and Shih-Fu Chang, “Issues and Solutions for Authenticating MPEG Video”, SPIE International Conf. on Security and Watermarking of Multimedia Contents, Vol. 3657, No. 06, EI '99, San Jose, USA, Jan 1999.
[8].J. Fridrich and M. Goljan, “Images with Self-Correcting Capabilities”, IEEE International Conference on Image Processing (ICIP '99), Vol. 3, Oct. 1999, Page(s): 792-796.
[9].Hsien-Chu Wu and Chin-Chen Chang, “Detection and Restoration of Tampered JPEG Images”, The Journal of System and Software, Vol. 64, NO. 2, 15 Nov. 2002 Page(s): 151-161.
[10].Phen-Lan Lin, Po-Whei Huang and An-Wei Peng, “A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery”, Multimedia Software Engineering, 2004. Proceedings. IEEE Sixth International Symposium on 13-15 Dec. 2004, Page(s): 146-153.
[11].Chung-Shien Lu and Hong-Yuan Mark Liao, “Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme”, IEEE Transactions on Multimedia, Vol. 5, No. 2, Jun. 2003.
[12].Choi, Y. and Aizawa, I., “Digital watermarking using interblock correlation”, In: Proc. International Conference on Image Processing (ICIP '99), Vol. 2, 24–28 Oct. 1999, Page(s): 216–220.
[13].Yulin Wang and Alan Pearmain, “Blind image data hiding based on self reference”, Pattern Recognition Letters, Vo. 25, Issue 15, Nov. 2004, Page(s): 1681-1689.
[14].L. M. Marvel, G. Hartwig and C. G. Boncelet Jr., “Compression Compatible Fragile and Semi-Fragile Tamper Detection”, SPIE International Conf. on Security and Watermarking of Multimedia Contents II, Vol. 3971, No. 12, EI '00, San Jose, USA, Jan 2000.
[15].S. Bhattacharjee and M. Kutter, “Compression Tolerant Image Authentication”, IEEE International Conference on Image Processing (ICIP '98), Chicago, USA, Oct 1998.
[16].Phen-Lan Lin, Chung-Kai Hsieh and Po-Whei Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery”, Pattern Recognition, Vol. 38, Issue: 12, Dec. 2005, Page(s): 2519-2529,.
[17].Hae-Yeoun Lee, Heung-Kyu Lee and Junseok Lee, “Comparison of Feature Extraction Techniques for Watermark Synchronization”, 9th International Conference, KES 2005, Vol. 3, Sep. 2005, Page(s): 309-316.
[18].M. Kutter and F. A. P. Petitcolasb, "A fair benchmark for image watermarking systems", Electronic Imaging 1999. Security and Watermarking of Multimedia Contents, Vol. 3657, Sans Jose, CA, USA, 25-27 Jan. 1999. The International Society for Optical Engineering.
[19].Sviatoslav Voloshynovskiy, Shelby Pereira, Victor Iquise and Thierry Pun, “Attack modeling: Towards a second generation benchmark”, Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking, May 2001.
[20].Jiri Fridrich, Miroslav Goljan, Rui Du, “Invertible Authentication Watermark for JPEG Images” , Information Technology: Coding and Computing, Proceedings. International Conference, Apr. 2001, Page(s):223-227.
[21].林禎吉、賴溪松, 數位浮水印的技術, 資訊安全通訊第四卷第三期, 1998.06.
[22].張真誠、陳同孝、黃國峰, 數位影像處理技術, 松崗電腦圖書資料股份有限公司, 2001, 台北.
[23].Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing 2nd Edition, Prentice Hall, 2002.
[24].Digital Watermarking World, http://www.watermarkingworld.org/
[25].The Checkmark Watermark Benchmarking Project, http://watermarking.unige.ch/Checkmark/index.html
[26].The Stirmark Benchmark, http://www.petitcolas.net/fabien/watermarking/ stirmark/
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top