(3.235.11.178) 您好!臺灣時間:2021/03/05 16:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:許_逸民
研究生(外文):Yi-min Hsu
論文名稱:以DWT和DCT為基礎的影像破壞偵測與回復
論文名稱(外文):Image Tamper Detection and Recovery based on DWT and DCT
指導教授:吳永基吳永基引用關係
指導教授(外文):Yung-Gi Wu
學位類別:碩士
校院名稱:立德管理學院
系所名稱:應用資訊研究所
學門:電算機學門
學類:電算機應用學類
論文種類:學術論文
畢業學年度:95
語文別:英文
論文頁數:36
中文關鍵詞:破壞回復破壞偵測離散餘弦轉換感興趣區塊
外文關鍵詞:tamper recoverytamper detectionDCTROI
相關次數:
  • 被引用被引用:0
  • 點閱點閱:85
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在這篇研究中,提出一個可偵測被破壞浮水印並且可回復嵌入資料的方法。 一般浮水印技術都應用在所有權的保護上。 使用者去選擇一張影像的重要區域來當成想保護的感興趣區塊(ROI),而這些所要保護的ROI我們當成浮水印來藏入在影像當中。 當重要區域遭受到惡意人士的破壞或者捏造時,系統將會偵測出來並且復原重要區域。 系統會經由DCT萃取出這些特徵值,並且對影像執行DWT後把特徵值藏入。 肉眼無法發覺原圖與嵌入後的差異。假如影像遭受到破壞,系統不需要查證於原圖就可以偵測出破壞並且復原ROI。提出的方法不僅簡單而且有效率,另外嵌入特徵值的測試圖被保護的ROI回復的品質也很好。
In this paper, a reversible data embedding for tamper-proof watermarks technique is proposed. In generally, watermarking is used for the purpose of ownership protection. The important regions in the image can be selected by the users as the region of interest (ROI) to protect. And those ROIs are regarded as the watermark and then being embedded in the image. When these important regions are tampered or faked by malicious attacker, the system can detect and recover the ROI. The system extracts the characteristic values by Discrete Cosine Transform (DCT) and embeds those characteristic values into the image by Discrete Wavelet Transform (DWT) to hide those watermarks. The difference between the embedded and original images is invisible by the human eyes. If the image is tampered, the system can detect the tamper and recover the original ROIs. The proposed method is simple but efficient; in addition, the recovered quality of protected ROI is very well from the simulation tests.
摘 要 .......................................I
ABSTRACT ......................................II
誌 謝 ......................................IV
CONTENTS .......................................V
LIST OF FIGURES ......................................VI
LIST OF TABLES........................................................................................VII
CHAPTER 1 INTRODUCTION ......................................1
CHAPTER 2 DCT AND BLOCKY DWT TECHNIQUES.....................................5
2.1 DISCRETE COSINE TRANSFORM (DCT) ......................................5
2.2BLOCKY DISCRETE WAVELET TRANSFORM(DWT) ......................................6
CHAPTER 3 THE PROPOSED SYSTEM ......................................8
3.1 DESCRIPTIONS OF EMBEDDING, TAMPER DETECTION AND RECOVERY SYSTEMS ......................................8
3.2 EXTRACTION OF THE CHARACTERISTIC VALUES ......................................9
3.3 EMBEDDING THE CHARACTERISTIC VALUES ......................................11
3.4 TAMPER DETECTION AND RECOVERY ......................................14
CHAPTER 4 EXPERIMENTAL RESULTS ......................................16
4.1 PROTECTION OF ONE ROI ......................................17
4.2 PROTECTION OF MULTI-ROI ......................................23
4.3 APPLICATION OF MEDICAL IMAGES ......................................26
CHAPTER 5 CONCLUSION ......................................31
REFERENCES ......................................33
PUBLICATION LIST ......................................36
[1] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” in Proceedings of the IEEE, Vol.87, No. 7, pp. 1079-1107, July 1999.

[2] C.T. Hsu and J.L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. Circuits and Systems II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp.1097-1101, August 1998.

[3] C.T. Hsu and J.L. Wu, “Hidden digital watermarks in images,” IEEE Trans. on Image Processing, Vol. 8, No. 1, pp. 58-68, January 1999.

[4] C.W. Ngo, T.C. Pong and R.T. Chin, “Exploiting image indexing techniques in DCT domain,” Pattern Recognition, Vol. 34, No.9, pp 1841-1851, Sep. 2001.

[5] X-G Xia, C.G.Boncelet, and G. R. Arce, “Wavelet Transform Based Watermark for Digital Images,” Optics Express, Vol. 3, No. 12, pp. 497-511, Dec. 1998.

[6] D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” in Proceedings of the IEEE, Vol. 87, No. 7, pp. 1167-1180, July 1999.

[7] J. Fridrich, “Image watermarking for tamper detection,” in Proceedings of International Conference on Image Processing, Chicago, IL, Vol. 2, pp. 404-408, Oct. 1998.

[8] A. Wakatani, “Digital watermarking for ROI medical images by using compressed signature image,” in Proceedings of the International Conference on System Sciences, Hawaii, America., Vol. 6, pp. 2043-2048, Jan. 2002.

[9] B. M. Planitz,, A. J. Maeder, “A Study of Block-Based Medical Image Watermarking Using a Perceptual Similarity Metric,” in Proceedings of the Digital Imaging Computing: Techniques and Applications, Cairns, Australian, pp. 483-490, Dec. 2005.

[10] H. R. Lee and K. H. Rhee, “Reversible data embedding for tamper-proof watermarks,” in Proceedings of the International Conference on Innovative Computing, Information and Control, Beijing, China, Vol. 3, pp. 487-490, August 2006.

[11] I. Kim, S.S. Han and J.H. Shin, “An improved tamper- detection method for digital images,” in Proceedings of IEEE International Symposium on Industrial Electronics, Pusan, Korea, Vol. 1, pp. 227-231, June 2001.

[12] K.F. Li, T.S. Chen and S.C. Wu, “Image tamper detection and recovery system based on discrete wavelet transformation,” in Proceedings of the International Conference on Communications, Computers and Signal Processing, Victoria, BC, Vol. 1, pp. 164-167, August 2001.

[13] T.S. Chen, J. Chen and J.G Chen, “Tamper Detection and Retrieval Technique Based on JPEG2000 with LL Subband,” in Proceedings of the International Conference on Networking, Sensing and Control, Taipei, Taiwan, Vol. 2, pp. 1235-1240, March 2004.

[14] Z.D. Gu, “Image Tamper Proofing and Recovery Technique Based on DWT”, Master thesis, CSIE, National Dong Hwa University, Hualien, Taiwan, July 2004.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔