跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.82) 您好!臺灣時間:2025/02/07 03:05
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:蔡依儒
研究生(外文):I-Ju Tsai
論文名稱:利用秘密分享與小波轉換之氣象衛星影像著作權保護機制
論文名稱(外文):A Copyright Protection Scheme for Weather Satellite Image Using Secret Sharing and Wavelet Transform
指導教授:謝尚琳謝尚琳引用關係
指導教授(外文):Shang-Lin Hsieh
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:71
中文關鍵詞:數位浮水印離散小波轉換秘密分享
外文關鍵詞:discrete wavelet transform. secret sharingdigital watermark
相關次數:
  • 被引用被引用:0
  • 點閱點閱:128
  • 評分評分:
  • 下載下載:12
  • 收藏至我的研究室書目清單書目收藏:2
本篇論文使用氣象衛星影像作為保護的影像,且根據影像特性提出一種新的著作版權保護機制。論文所提出的方法首先會從氣象衛星影像中抽取出雲的影像,再將原本的影像和雲的影像組合成一張新的影像,以便抽取特徵。接著,新的影像將被分成許多沒有重疊的區塊,並將每個區塊做離散小波轉換。最後再使用秘密分享的機制來保護這張氣象衛星影像的著作權。
這個機制並不會嵌入任何資料到要保護的影像,所以不會影響到影像品質。此外,實驗結果顯示這個機制是強健的,而且可以抵抗一些基本的影像處理攻擊,像是JPEG壓縮、模糊化、銳利化、縮小、剪裁、加入雜點以及調整亮度或對比的操作。
This thesis takes weather satellite images as the host images and proposes a novel copyright protection scheme according to the properties of the images. First, the cloud image is extracted from the weather satellite image and then combined with the original satellite image to generate a new image for features extraction. Next, the scheme divides the new image into non-overlapping blocks and classifies the blocks according to the coefficients of the wavelet domain. Finally, the scheme uses the secret sharing scheme to protect the copyright of the weather satellite image.
The scheme does not embed a watermark to the host image. Therefore it does not decrease the image quality. Moreover, the experimental results show that the proposed scheme is robust and can resist basic image-processing attacks such as JPEG compression, blurring, sharpening, scaling, cropping, noise adding, brightness adjustment, and contrast adjustment.
ACKOWLEDGEMENTS i
CHINESE ABSTRACT ii
ABSTRACT iii
TABLE OF CONTENTS iv
LIST OF FIGURES vi
LIST OF TABLES xi
CHAPTER
1 INTRODUCTION 1
1.1 Motivation 1
1.2 Thesis Organization 3
2 RELATED BACKGROUND 4
2.1 Erosion and Dilation 4
2.2 Discrete Wavelet Transform 5
2.3 Secret Sharing 7
3 THE PROPOSED COPYRIGHT SCHEME 8
3.1 The Major Parts of the Proposed Scheme 9
3.1.1 Cloud Extraction 9
3.1.2 Combined Image Creation 10
3.1.3 Watermark Scrambling and Unscrambling 12
3.1.4 Classification and Features Extraction 13
3.1.5 Secret Sharing Scheme 15
3.1.6 Watermark Reduction 18
3.2 The Phases of the Proposed Scheme 19
3.2.1 Share Image Generation Phase 19
3.2.2 Watermark Retrieval Phase 21
4 EXPERIMENTAL RESULTS 23
4.1 JPEG Compression 26
4.2 Blurring 31
4.3 Sharpening 36
4.4 Scaling 41
4.5 Cropping 46
4.6 Noise Adding 51
4.7 Brightness Adjustment 56
4.8 Contrast Adjustment 61
4.9 Unique Identification 66
5 CONCLUSIONS 68
REFERENCES 69
[1]Shang-Lin Hsieh and Bin-Yuan Huang, "A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation," Proceedings of International Computer Symposium, pp. 661-666, 2004.
[2]Shang-Lin Hsieh, Hsuan-Chieh Huang, and I-Ju Tsai, "A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint Images as Watermarks," Proceedings of International Conference on Information Technology: New Generations, pp. 482-489, Apr. 2006.
[3]Chin-Chen Chang, Ju-Yuan Hsiao and Chi-Lung Chiang, "An Image Copyright Protection Scheme Based on Torus Automorphism," Proceedings of the First International Symposium on Cyber Worlds, pp. 217-224, Nov. 2002.
[4]R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A Digital Watermark," Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 86-90, Nov. 1994.
[5]Wen-Hsiang Tsai and Yen-Chung Chiu, "A Study on Digital Watermarking and Authentication of Images for Copyright Protection and Tampering Detection," Master Thesis, National Chiao Tung University, June 2004.
[6]Hung-Hsu Tsai, Kuo-Chun Wang, Yi-Chun Kao, and Hou-Chiang Tseng, "Classification-based Image Watermarking Using Rank Order in the Wavelet Domain," Proceedings of National Computer Symposium, 2005.
[7]Mauro Barni, Franco Bartolini, and Alessandro Piva, "Improved Wavelet-Based Watermarking through Pixel-Wise Masking," IEEE Transactions on Image Processing, Vol. 10, No. 5, pp. 783-791, May 2001.
[8]C.C. Chang and J.C. Chuang, "An image intellectual property protection scheme for gray-level images using visual secret sharing strategy," Pattern Recognition Letters, Vol. 23, pp. 931-941, Jun. 2002.
[9]Chuen-Ching Wang, Shen-Chuan Tai, and Chong-Shou Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Transaction on Fundamentals, Vol. E83-A, No. 8, pp. 1589-1598, Aug. 2000.
[10]Akio Miyazaki and Akihiro Okamoto, "Analysis of Watermarking Systems in the Frequency Domain and its Application to Design of Robust Watermarking Systems," Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 506-509, Oct. 2001.
[11]Ke Ding, Chen He, Ling-gi Jiang, and Hong-xia Wang, "Wavelet-Based Semi-Fragile Watermarking with Tamper Dectection," IEICE Transaction on Fundamentals, Vol. E88-A, No. 3, pp. 787-790, Mar. 2005.
[12]Jun Watanabe, Madoka Hasegawa, and Shigeo Kato, "A Study on a Watermarking Method for Both Copyright Protection and Tamper Detection," Proceedings of International Conference on Image Processing, Vol. 4, pp. 2155-2158, Oct. 2004.
[13]He Quan and He Suqin, "A Fragile Watermarking Based on the Triplet of Wavelet Coefficients," Proceedings of the 7th International Conference on Signal Processing, Vol. 3, pp. 2298-2301, Sept. 2004.
[14]Chin-Chen Chang and Henry Chou, "Some Studies on Digital Image Steganographic and Watermarking Techniques," Master Thesis, National Chung Cheng University, July 2003.
[15]Amara Graps, "An Introduction to Wavelets,” IEEE Transactions on Computational Science and Engineering, Vol. 2, Issue 2, pp. 50-61, summer 1995.
[16]Anthony T.S. Ho and Xunzhan Zhu, "A Slant Transform Watermarking for Copyright Protection of Satellite Images," Proceedings of the Fourth International Conference on Information, Communications and Signal Processing, Vol. 2, pp. 1178-1181, Dec. 2003.
[17]Shang-Lin Hsieh and Bin-Yuan Huang, "A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation," Master Thesis, Tatung University, July 2004.
[18]Shang-Lin Huang and Hsuan-Chieh Huang, "A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint Images as Watermarks," Master Thesis, Tatung University, July 2005
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 〈元儒時代吳澄從祀孔廟的歷程與時代意涵〉 朱鴻林 《亞洲研究》第23期1997年7月
2. 〈元代經學研究論著目錄(1900-1996)〉 黃智信 《中國文哲研究通訊》第7卷第2期(總第26期) 1997年6月
3. 〈黃震的躬行之學〉 黃紹梅 《鵝湖》第22卷第10期(總第262期) 1997年4月
4. 〈吳康齋的生活與學術〉 鍾彩鈞 《中國文哲研究集刊》第10期1997年3月
5. 〈《春秋》三傳「執」例試析〉 曾素貞 《中國文哲研究通訊》第6卷第2期(總第22期) 1996年6月
6. 〈春秋三傳「執諸侯」例試論〉 許秀霞 《中華學苑》第44期 1994年4月
7. 〈中華福地、古月還家──蒙元興亡與讖緯〉 蕭啟慶 《歷史月刊》第92期1995年9月
8. 〈元代春秋學撰著分類考述〉 劉明宗 《中國書目季刊》第27卷第1期1993年6月
9. 〈鄭玉教育思想新探〉 劉桂林 《孔孟月刊》第31卷第9期(總第369期) 1993年5月
10. 〈春秋三傳諱例異同研究〉 奚敏芳 《孔孟學報》第58期 1989年9月
11. 〈春秋微言大義〉 賴炎元 《木鐸》第11期 中國文化大學中文研究所、中國文學系編印 1987年2月
12. 〈略述元代朱學之盛〉 王明蓀 《中華文化復興月刊》第16卷第12期1983年12月
13. 〈元代新儒家正統思想的興起〉 (下)狄百瑞著、施寄錦譯《思與言》第21卷第3期1983年9月
14. 〈元代新儒家正統思想的興起〉 (中)狄百瑞著、施寄錦譯《思與言》第21卷第2期1983年7月
15. 〈元代新儒家正統思想的興起〉 (上)狄百瑞著、施寄錦譯《思與言》第21卷第1期1983年5月