( 您好!臺灣時間:2022/05/27 01:12
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::


研究生(外文):Po-Chien Lu
論文名稱(外文):On the design of Watermarking Techniques for Copyright Protection of 3D Mesh Model
指導教授(外文):Lih-Yang Wang
外文關鍵詞:3Dmeshwatermarkingcopyright protection
  • 被引用被引用:0
  • 點閱點閱:117
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在本論文中,提出了兩種基於空間域中強健型浮水印的技術以及一種易碎型浮水印的技術。在強健型浮水印技術中我們發展出分別將不同的大小的浮水印資料量或者是不同強度的浮水印資料嵌入到不同結構的三維網目區域中的演算法;而對於易碎型,我們也改良的傳統的嵌入資料散佈的方式,並且結合查表的方式(Look Up Table)在嵌入資訊後不會對原始三維網目模型造成任何改變。
在大部分對於三維模型於空間域中的浮水印嵌入技術都是將浮水印資料以隨機抽取的方式加以嵌入到三維網目中,但是在基於這樣的遷入方法下,很有可能會造成嵌入的浮水印資料在三維模型中分布不均勻的狀況發生。不同於以往的技術,我們發展出了一種可以保證能夠均勻地分佈嵌入浮水印資料區域的方法。我們針對原始三維模型做分割的動作,並設定一門檻值(threshold value)來對各區塊的密度比較作為是否繼續分割的判斷,而每一次的分割可將該區塊劃分為八個大小相同的子區塊(sub-block),並且再各區塊中所包含的都是一部分的網目資料,之後我們在嵌入浮水印資料到各目標區塊的網目資料中。
經過實驗的結果證明,所提出的浮水印演算法能夠有效的在經過攻擊後,包括隨機雜訊攻擊、網目簡化(mesh simplification)、切割攻擊後,仍然能有效的還原與驗證,達到保護影像智慧財產權之效果。
In the last years the applications using and managing 3D data are quickly increasing, the 3D geometric models have been widely used in areas such as CAD/CAM, Computer Graphics, animation, and medical applications. But nowadays are more and more people access digital 2D images or 3D models from Internet without licensing. Among all the research approaches that try to resolve this problem, digital watermarking is no doubt the most attractive one.
In this thesis, we proposed a two new spatial domain robust watermarking schemes for the triangular mesh model of three-dimensional object, first one we embedded the different amounts of watermark data into different 3D mesh structure area, and the other one we embedded the watermark data with different robustness into different 3D mesh structure area; and one fragile watermark to protect the multiple watermarks embedding attack.
Most of the previous spatial domain schemes embed watermark data with a random insertion strategy, the distribution of embedded data may be uneven. Unlike these methods, we develop a strategy to guarantee the even distribution of watermark data. We first calculate the smallest cubic sub-block of various sizes. Whenever the total density in a block exceeds a threshold value, the block is divided into 8 equal size cubic sub-blocks. Each block may contain a piece of triangular mesh, in which a fixed amount of watermark signal is embedded. The experimental results shows that the proposed watermarking scheme could survived the additive random noise, and mesh simplification, cropping and multiple watermark embedding attack, and provide well authentication to prove the copyright of rightful owner.
Abstract i
Contents iii
List of Table v
List of Figures vi
1.1 Motivation 1
1.2 Digital Watermarking Technique 2
1.3 The Classifications of Digital Watermarking Technique 4
1.3 .1 Visible and Invisible Watermarking Technique 4
1.3 .2 Robust and Fragile Watermarking Technique 4
1.3 .3 Spatial and Frequency Watermarking Technique 5
1.4 Structure of Thesis 6
Chapter 2 Related Research 7
2.1 Digital Watermarking for 3D Models 7
2.1.1 The Embedding Requirements of 3D Watermarking Technique 8
2.2 Embedding Targets 10
2.3 Previous 3D Watermarking Techniques 11
2.3.1 Robust 3D Watermarking Techniques 11
2.3.2 Fragile 3D Watermarking Techniques 14
2.4 Watermark Binding Scheme 15
Chapter 3 A Watermarking Algorithm for Image Copyright Protection 16
3.1 Introduction 16
3.2 Three-Dimensional Mesh Simplification 16
3.3 Human Visual System 18
3.3.1 Space Masking Effect 19
3.4 The Watermark Strategy 20
3.4.1 Embed with Different Amount of Watermark Data 22 Computing Block Division 22 Branch Sub-block Analysis 23 Watermark Embedding Process 24 Watermark Extraction Process 26 Discussions 27
3.4.2 Embed with Different Strength of Watermark Data 32 Computing Block Division 32 Branch Sub-block Analysis 33 Watermark Embedding Process 34 Watermark Extraction Process 36 Discussions 37
Chapter 4 A Watermarking Algorithm for Image Authentication 42
4.1 Introduction 42
4.2 The Yeung’s Fragile Watermarking Algorithm 43
4.3 The Watermark Strategy 44
4.3.1 Block Division 45
4.2.2 Watermark Embedding Process 47
4.2.3 Watermark Verification Process 48
4.3 Discussion 49
Chapter 5 Conclusion 52

1.Christine I. Podilchuk and Edward J., “Digital watermarking algorithms and applications, ” IEEE Signal Processing Magazine, July 2001.
2.L. Y. Wang and P. C. Lu, “On the Copyright Protection of Digital Image Based on Wavelet Transformation, ” IEEE ICSS 2005
3.L. Holt, B. G. Maufe, and A. Wiener, “Encoded Marking of a Recording Signal”, U.K., Patent GB 2196167A, 1988.
4.D. Hunter, “Handmade Paper and Its Watermarks,” A Bibliography, 1967.
5.W. Sezpanski, “A Signal Theoretic Method for Creating Forgery-proof Documents for Automatic Verification”, in J.S. Jackson, editor, 1979 Carnahan Conference on Crime Countermeasures, Page: 101-109, 1979.
6.F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, Vol. 87, Issue 7, Page: 1079-1107, July 1999.
7.Brassile,J., Low,S., Maxemchuk,N. and O’Gorman,L.: Electronic Marking and Identification Techniques to Discourage Document Copying, Proc. IEEE INFOCOM’94, Vol.3, pp1278-1287, 1994.
8.Nakamura, H. and Matsui, K., “Digital Watermarking onto Japanese Documents by Seal Image,” Trans. of I.P.S.J, Vol.38, No.11, pp2356-2361 ,1997.
9.Kundur, D. and Hatzinakos,D., ”Robust digital image watermarking method using wavelet-based fusion,” Proc. of IEEE Int. Conf. on Image Processing, Vol.1, pp.544-547 , 1997.
10.Xia,X., Boncelet,C.G. and Arce, G.R., “A multiresolution watermark for digital images,” Proc. of IEEE Int. Conf. on Image Processing, Vol.1, pp.548-551, 1997.
11.Ohnishi, J. and Matsui, K., “Embedding a seal into a picture under orthogonal wavelet transform,” Proc. of Int. Conf. on Multimedia Computing and Systems, pp.514-521, 1996.
12.Ohnishi, J. and Matsui, K., “Image coding for copyright protection by using wavelet ,” Trans. of I.P.S.J., Vol.38 No.3, pp.534-539, 1997.
13.Matsui, K., Ohnishi, J. and Nakamura, Y., “Embedding a signature to pictures under wavelet transformation,” Trans. of IEICE, Vol. J-79-D-II, No.6, pp1017-1024, 1996.

14.Pitas, I., “A method for signature casting on digital images,” Proc. IEEE Int. Conf. on Image Processing, Vol.3, pp.215-218, 1996.
15.Wolfgang, R.B. and Delp, E.J., “A watermark for digital images, A method for signature casting on digital images,” Proc. IEEE Int. Conf. on Image Processing, Vol.3, pp.219-222, 1996.
16.Swanson, D.M., Zhu, B., Chau, B. and Tewfik, A.H., “Robust Data Hiding for Images,” Proc. of IEEE Digital Signal Processing Workshop, pp.37-40, 1996.
17.Swanson, D.M., Zhu, B., Chau, B. and Tewfik, A.H., “Multiresolution Video Watermarking using Perceptual Models and Scene Segmentation,” Proc. of IEEE Int. Conf. on Image Processing, Vol.2, pp.558-561, 1997.
18.Yongjian Hu and Kwong S., “Wavelet domain adaptive visible watermarking,” Electronics Letters, Vol. 37, Issue 20, Page: 1219 –1220, 27 Sept. 2001.
19.Pei-Min Chen, “A visible watermarking mechanism using a statistic approach” WCCC-ICSP 2000 5th International Conference on Signal Processing Proceedings, Vol. 2, Page: 910 -913, 2000.
20.Kankanhalli M.S., Rajmohan, and Ramakrishnan K.R, “Adaptive visible watermarking of images,” IEEE International Conference on Multimedia Computing and Systems, Vol. 1, Page: 568 –573, 1999.
21.C. C. Chang, K. F. Hwang, and M. S. Hwang, “Robust authentication scheme for protecting copyrights of images and graphics,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 149, Issue 1, Page: 43-50, Feb. 2002.
22.C. C. Chang, K. F. Hwang, and M. S. Hwang, “A block based digital watermarks for copy protection of images,” APCC/OECC '99, Fifth Asia-Pacific Conference and Fourth Optoelectronics and Communications Conference, vol. 2, pp. 977 –980, 1999.
23.Fulin Su, Guoqiang Ma, and Hongtao Ge, “Robust image watermarking research based on DCT transform,” International Conferences on Info-tech and Info-net, ICII 2001 - Beijing. Vol. 5, Page: 83-88, 2001.
24.C.T. Li, F.M. Yang, and C.S. Lee, “Oblivious fragile watermarking scheme for image authentication” Acoustics, 2002 IEEE International Conference on Speech, and Signal Processing, Vol. 4, Page: 3445 –3448, 2002.
25.Alturki F. and Mersereau R., “Secure fragile digital watermarking technique for image authentication,” 2001 International Conference on Image Processing, Vol. 2, Page: 1031 –1034, 2001.

26.Inoue H., Miyazaki A., and Katsura T., “Wavelet-based watermarking for tamper proofing of still images,” 2000 International Conference on Image Processing, Vol. 2, Page: 88 –91, 2000.
27.Fridrich J., Goljan M., and Baldoza A.C., “New fragile authentication watermark for images,” 2000 International Conference on Image Processing, Vol. 1, Page: 446 –449, 2000.
28.Ohbuchi, R., Masuda, H., Aono, M., “Watermarking three-dimensional polygonal models through geometric and topological modifications,” Selected Areas in Communications, IEEE Journal on Volume 16, Issue 4, May 1998 Page(s):551 - 560 Digital Object Identifier 10.1109/49.668977, 1998.
29.Ashourian, M., Enteshari, R.; Jeon, J., “Digital watermarking of three-dimensional polygonal models in the spherical coordinate system,” Computer Graphics International, 2004. Proceedings 2004 Page(s):590 - 593 Digital Object Identifier 10.1109/CGI.2004.1309270, 2004.
30.Ahourian, M., Zhu, J., Jeorr, J., “A spatial and DCT-domain composite watermarking of three-dimensional triangle meshes,” Haptic, Audio and Visual Environments and Their Applications, 2004. HAVE 2004. Proceedings. The 3rd IEEE International Workshop on 2-3, Page(s):189 – 194, Oct. 2004
31.Yeung, M., Boon-Lock Yeo, “Fragile watermarking of three-dimensional objects,” Image Processing, ICIP 98. Proceedings. 1998 International Conference onVolume 2, 4-7, Page(s):442 - 446 vol.2 Digital Object Identifier 10.1109/ICIP.1998.723416, Oct. 1998.
32.Hao-Tian Wu, Yiu-Ming Cheung, “A fragile watermarking scheme for 3D meshes,” New York, NY, USA, SESSION: Authentication/protocols, Pages: 117 - 124 Year of Publication: 2005 ISBN:1-59593-032-9, 2005.
33.J. L. Mannos, D. J. Sakrison, “The effect of a visual fidelity criterion on encoding of images,” IEEE Trans. Inform. Theory, Vol. IT-20, Page(s):525-536, 1974.
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
第一頁 上一頁 下一頁 最後一頁 top
1. 邱貴發、鍾邦友(1993)。情境學習理論與電腦輔助學習軟體設計。臺灣教育,510,23-29。
2. 邱瓊慧(2002)。中小學資訊科技融入教學之實踐。資訊與教育雜誌,88,3-10。
3. 吳正己(2001)。從英特爾e教師計畫談資訊融入教學。資訊與教育雜誌,85,15-21。
4. 何榮桂(2002b)。台灣資訊教育的現況與發展—兼論資訊科技融入教學。資訊與教育雜誌,87,22-32。
5. 何榮桂、郭再興(1996)。多媒體電腦輔助教學在網路上的發展趨勢。資訊與教育雙月刊,55,25-31。
6. 尹玫君(2000)。國小老師的網路教學素養的培育。資訊與教育雜誌,79,13-19。
7. 王春展(1996)。情境學習理論及其在國小教育的應用。國教學報,8,53-71。
8. 王英州(2003)。教學媒體融入教學面臨的阻礙。資訊與教育雜誌,95,75-79。
9. 張振東(1989)。時間的基本概念。哲學與文化,16(2),47-54。
10. 張國恩(1999)。資訊融入各科教學之內涵與實施。資訊與教育雜誌,72,2-9。
11. 張國恩(2002)。從學習科技的發展看資訊融入教學的內涵。北縣教育,41,17-25。
12. 陳佩玉、鍾靜(2003)。國小學童時間單位量概念之研究。國教學報,15,61-88。
13. 陳映君(譯)(2002)。中川正樹。Introducting IT into Education and Learning in Japan : Policies,Practices and Problems。資訊與教育雜誌,87,49-56。
14. 陳健文、李世忠(2000)。網路新課程軟體的設計與製作─以國小三年級自然科網路電腦教學軟體為例。教育資料與圖書館學,37(4),404-417。
15. 楊家興(1995)。情境教學理論與超媒體學習環境。教學科技與媒體,22,40-48。