跳到主要內容

臺灣博碩士論文加值系統

(3.236.84.188) 您好!臺灣時間:2021/08/03 15:40
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳俊齊
研究生(外文):Chun-Chi Chen
論文名稱:以碎形編碼實現數位浮水印
論文名稱(外文):Digital Watermarks Using Fractal Coding Technique
指導教授:潘正祥廖炳松廖炳松引用關係
指導教授(外文):Jeng-Shyang PanPing-Sung Liao
學位類別:碩士
校院名稱:國立高雄應用科技大學
系所名稱:電子與資訊工程研究所碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:54
中文關鍵詞:浮水印碎形
外文關鍵詞:watermarkfractal
相關次數:
  • 被引用被引用:0
  • 點閱點閱:186
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在這科技日新月異的二十一世紀,個人電腦與高速度的寬頻網路已經成為公司與家庭的必備品,這使得一般文件、商業交易、多媒體影像、靜態圖片皆可在電腦上處理,並且利用寬頻網路,把這些數位資料傳送到世界各地。在這股新興生活之中,帶來優點也帶來了前所未有的缺點,只要資料在未受到保護的情況下,大家都能很輕易的複製,並且大量傳送到世界各地,造成了盜版猖獗的問題,因此浮水印的使用,將使資料能夠被保護,並且能確認該資料合法的持有者。

本論文首先提出奇偶演算法進行碎形浮水印嵌入。之後,再加上J. Puate與F. Jordan發表的LSR演算法和C. H. Li與S. S. Wang發表的Isometries演算法完成強健性碎形浮水印嵌入及多張碎形浮水印嵌入。本論文所提出新的碎形壓縮方法可以有效嵌入浮水印,同時滿足影像品質及抗JPEG壓縮。
In 21st century, personal computer and high rapid broadband network have become the necessaries in office and house where documents, business transaction, multimedia animation, photos and artwork are processed by computer. Besides that, it is possible to send those digital copies around the world by broadband network. On the other hand, this oncoming technique brings information community some disadvantage, too. As long as the digital copies were not protected by some ways, people can easily duplicate and spread them around the world which causes the problem of rampant illegal copies. Consequently, watermarking is recommended to protect digital copies and make sure the digital copies holders legal.
In this thesis, odd/even region algorithm first comes forward, and then integrating it with LSR algorithm made by J. Puate and F. Jordan, and Isometric algorithm made by C. H. Li and S. S. Wang, is proposed. After that, this thesis brings up a new fractal compression method which can embed watermark with satisfactory image quality and be tolerant with JPEG compression.
中 文 摘 要 i
ABSTRACT ii
目錄 iii
表目錄 v
圖目錄 vi
第一章、浮水印簡介 1
1.1 浮水印的重要性 1
1.2 浮水印的隱藏方法 2
1.3 浮水印影像的品質要求 6
1.4 研究的動機與目的 9
1.5 論文的章節結構 10
第二章、碎形理論與碎形浮水印 11
2.1 碎形理論 11
2.2 碎形壓縮與碎形編碼 19
2.3 碎形浮水印的技術 25
第三章、新穎碎形浮水印 32
3.1 奇偶區塊浮水印嵌入 32
3.2 強健性碎形編碼嵌入數位浮水印 33
3.3 以碎形編碼嵌入多個數位浮水印 36
第四章、實驗結果及說明 38
4.1 奇偶區塊浮水印嵌入實驗 38
4.2 強健性碎形影像壓縮浮水印嵌入實驗 43
4.3 以碎形編碼嵌入多個數位浮水印實驗 47
第五章 結論 51
參考文獻 52
[1] R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A Digital Watermark,” in Proc. ICIP94, IEEE Int. Conf. Image Processing, Vol. 2, pp. 86-90, 1994.
[2] W. Bender, D. Gruhl, and N. Morimoto, “Techniques for Data Hiding,” in Proc. SPIE, Vol. 2420, Feb. 1995.
[3] G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image watermarking,” in Proceedings of the IEEE International Conference on image processing, Vol. 2, pp. 237-240, Piscataway, NJ: IEEE Press, 1996.
[4] T. Moriya, Y. TakaShima, T. Nakamura, and N. Iwakami, “Digital watermarking Schemes based on vector quantization,” Speech Coding for Telecommunications proceeding, pp. 95-96, IEEE Workshop, 1997.
[5] Z. M. Lu, and S. H. Sun, “Digital Image Watermarking Technique Based on Vector Quantization,” Electronics Letters, Vol. 36, No. 4, pp. 303-305, Feb. 2000.
[6] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for image, audio and video,” in Proc. 1996 Int. Conf. Image Processing, Vol. 3, pp. 243-24, Lausannce, Switzerland, Sept. 1996.
[7] A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT –based watermark recovering without resorting to the uncorrupted original image,” in Proc. ICIP97, IEEE Int. Conf. Image Processing, pp. 520-527, Santa Barbara, CA, Oct. 1997.
[8] C. Podilchuk and W. Zeng, “Perceptual watermarking of still images,” in Proc.1997 IEEE 1st Workshop Multimedia Signal Processing, pp. 363-368, Princeton, NJ, June 1997.
[9] B. Tao and B. Dickinson, “Adaptive watermarking in the DCT domain,” IEEE Int. Conf. Acoustic, Speech and Signal Processing, 1997.
[10] R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perpetual watermarks for digital image and video,” Proc. IEEE, Vol.87, pp. 1108-1126, 1999.
[11] C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Image,” IEEE Trans. Image Processing, Vol.8, pp. 58-68, 1999.
[12] M. Barni, F. Bartolini, V. Cappellini, A. Lippi, and A.Piva, “A DWT-based technique for spatial-frequency masking of digital signatures,” in Proc. SPIE Int. Conf. Security and Watermarking of Multimedia Contents, Vol. 3657, pp. 31-39 San Jose, CA, 1999.
[13] D. Kundur and D. Hatzinakos, “A robust digital image watermarking scheme using wavelet-based fusion,” in Proc. ICIP97, IEEE Int. Conf. Image Processing, pp. 544-547, Santa Barbara, CA, Oct. 1997.
[14] J. J. K. O’ Ruanaidh, W. J. Dowling, and F. M. Boland, ”Watermarking digital images for copyright protection,” Proc. Inst. Elec. Eng. Vision, Image, and Signal processing, Vol. 143, No. 4, pp. 250-256, 1996.
[15] X. G. Xia, C. G. Boncelet, and G. R. Arce, “ A multiresolution watermark for digital images,” in Proc. ICIP97, IEEE Int. Conf. Image Processing, pp. 548-551, Santa Barbara, CA, Oct. 1997.
[16] J. J. K. O’Ruanaidh, W. J. Dowling, And F. M. Boland, “Phase watermarking of digital images,” in Proc. IEEE Int. Conf. Image processing (ICIP96), Vol. 3, pp. 239-242, Sept. 1996.
[17] P. Davern and M. Scott, “Fractal-based image steganography,” in Proc. Information Hiding, pp. 245-256, Univ. of Cambridge, U.K., May 1996.
[18] P. Bas, J. M. Chassery, and F. Davoine, “Using the fractal code to watermark images,” in Proc. in Proc. IEEE Int. Conf. Image processing (ICIP98), pp. 469-473, 1998.
[19] P. Bas, J. M. Chassery, and F. Davoine, “A geometrical and frequent watermarking scheme using similarity, “in Proc. SPIE Electronic Imaging’99, Security and watermarking of Multimedia Contents, pp. 264-272, San Jose, CA, Jan. 1999.
[20] J. Paute and F. Jordan, “Using fractal compression scheme to embed a digital signature into an image,” in Proc. SPIE Photonics East Symp. Boston, MA, Nov. 1996.
[21] C. H. Li and S. S. Wang, “Digital watermarking using fractal image coding,” Letter in IEICE Trans. Fundamentals, Vol. E83-A, No. 6, pp. 1286-1287, June 2000.
[22] T. S. Chen and H. Y. Wu, “The Application of Fast-Isometry Search Method on Fractal Image Compression,” Tainan, TW, June 1996.
[23] C. H. Yang, C. C. Tseng, and W. R. Tseng, “Sub-Optimal Least Squares Approach,” Kaohsiung, TW, June 2001.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. ˙陳志龍,刑事訴訟法修正之原則方向探討-兼論證據法則之修正方向,載於:月旦法學雜誌第45期,1999年2月。
2. ˙黃川口,股價操縱行為之法律觀,載於:銘傳學刊第4期,1993年。
3. ˙吳元曜,金融犯罪重罪化趨勢之評析,載於:軍法專刊第50卷第9期,2004年9月1日。
4. ˙蘇俊雄,刑事證據法的法律概念及其界限,載於:刑事法雜誌第17卷第1期,1973年2月。
5. ˙蘇俊雄,經濟犯在刑法概念上的基本問題,載於:刑事法雜誌第18卷第1期,1974 年2月。
6. ˙蔡碧玉,論我國檢察官在刑事訴訟上應有角色與定位,載於:月旦法學雜誌第45期,1999年2月。
7. ˙吳元曜,論經濟刑法之解釋方法,載於:刑事法雜誌第49卷第5期,2005年10月。
8. ˙吳克昌,集中交易市場信用交易炒作型態之淺析,載於:證交資料第448期,1999年8月。
9. ˙吳克昌,證券交易法反操縱條款之研析(下),載於:證交資料第483期,2002年8月。
10. ˙林鈺雄,檢察官在訴訟法上之任務與義務,載於:法令月刊第49卷第10期,1998年3月。
11. ˙蘇俊雄,刑事證據在認定事實上的作用及其邏輯原理,載於:刑事法雜誌第15卷第4期,1971年8月。
12. ˙蔡墩銘,刑事證明與舉證,載於:軍法專刊第42卷第7期,1996年7月。
13. ˙蔡墩銘,事實審法院之調查與證明責任,載於:月旦法學雜誌第80期,2002年1月。
14. ˙劉連煜,連續交易與炒股,載於:月旦法學教室第69期,2001年2月。
15. ˙溫祖德,證券交易法第一五五條「操縱股價」犯罪之研究,載於:刑事法雜誌第46卷第1期,2002年2月。