跳到主要內容

臺灣博碩士論文加值系統

(18.204.48.64) 您好!臺灣時間:2021/08/04 16:38
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:簡志丞
研究生(外文):Chih-Cheng Chien
論文名稱:運用還原機制在小波轉換為基礎之半易碎型數位浮水印
論文名稱(外文):A Wavelet-Based Semi-Fragile Watermarking with Recovery Mechanism
指導教授:蔡銘箴蔡銘箴引用關係
指導教授(外文):Min-Jen Tsai
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊管理研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:83
中文關鍵詞:半易碎型浮水印影像竄改偵測影像竄改還原
外文關鍵詞:Semi-fragile watermarkImage tamper detectionImage tamper recovery
相關次數:
  • 被引用被引用:0
  • 點閱點閱:545
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在資訊高度發展的今日,影像驗證系統廣泛地應用在數位影像財產權保護,以維護數位影像之完整性。本篇論文提出以離散小波轉換(discrete wavelet transform, DWT)為基礎之半易碎型浮水印影像驗證與還原演算法,透過影像驗證系統可以精確地將受到竄改的影像區塊標示出來,並可進一步加以還原竄改區塊的資訊。我們也透過實驗證實,本影像驗證還原演算法可以承受相當程度下的JPEG 壓縮及高斯雜訊處理 (additive white Gaussian noise, AWGN),且能成功驗證出影像受竄改的部位,並加以還原。

本論文是小波轉換為基礎之影像竄改偵測演算法,利用小波轉換之特性,由低頻區資訊產生影像驗證浮水印,並根據人類視覺上特性將影像驗證浮水印及影像還原資訊加以嵌入到小波轉換之高頻區,藉此我們能夠抵抗非惡意性的影像處理攻擊,且能正確地檢測出惡意的影像竄改行為,也能維持影像品質在一定的水準之上。
Nowadays, image authentication systems are widely applied to ownership protection and tampering detection of digital images. The main concept for those image authentication systems is that minor modifications which do not change the content of the image preserve the authenticity of the image, whereas modifications which do modify the content render the image not authentic. In this paper, we propose an image tampering authentication and recovery scheme based on discrete wavelet transform (DWT). Our image authentication system is able to locate precisely any malicious alteration made to the image and restore the altered or destroyed regions in order to allow the user to know what was the original content of the manipulated areas. We also analyze the robustness to mild modification like JPEG compression and channel additive white Gaussian noise (AWGN) and fragility to malicious attack.
This thesis is based on wavelet transformation image tampering detection scheme. By the property of discrete wavelet transform we generate the semi-fragile watermark from low-frequency band and embedding the watermark into the high-frequency band with Human Visual System(HVS). Then we can resist the mild modifications of digital image and be able to detect the malicious modifications precisely. The watermarked image still preserve high quality after embedding the semi-fragile watermark.
摘要 ........... i
ABSTRACT ..... ii
誌謝 . iii
目錄 .. iv
表目錄 ........ vi
圖目錄 ........ vii
第一章 緒論 .... 1
1.1 研究背景 ... 1
1.2 研究動機及目的 1
1.3 論文架構 ... 2
第二章 文獻探討 4
2.1 資訊隱藏 ... 4
2.2 數位影像驗證技術 ........ 4
2.2.1 定義與應用 ............ 4
2.2.2 影像驗證系統的特性需求 ................. 4
2.2.3 影像驗證浮水印型式 ... 6
2.2.4 易碎型浮水印演算法介紹 ................. 8
2.2.5 半易碎型浮水印演算法介紹 ............... 11
2.2.6 影像竄改還原演算法介紹 ................... 12
第三章 離散小波轉換為基礎之影像竄改偵測與還原演算法 17
3.1 影像驗證浮水印嵌入 .. 17
3.2 影像還原資訊嵌入 ...... 20
3.3 浮水印偵測與影像驗證 .... 24
3.4影像竄改還原 ............... 26
第四章 實驗結果與分析 ................... 28
4.1 半易碎型浮水印相關評定標準 ........... 28
4.2 實驗相關變數及項目設定 31
4.3 半易碎型浮水印抵抗非惡意攻擊實驗 ...... 34
4.3.1 半易碎型浮水印抵抗JPEG壓縮攻擊 ..........34
4.3.2 半易碎型浮水印抵抗AWGN雜訊攻擊 ......... 37
4.3.3 半易碎型浮水印抵抗對比加強處理 ... 39
4.3.4 半易碎型浮水印抵抗亮度加強處理 ... 42
4.3.5 半易碎型浮水印抵抗Median Filter攻擊 .... 44
4.3.6 半易碎型浮水印抵抗Salt & Pepper雜訊 .... 47
4.4 視覺上影像竄改攻擊實驗 50
4.5 同時受惡意及非惡意攻擊下實驗 .............. 54
4.5.1 JPEG壓縮格式下之影像驗證與還原 . 54
4.5.2 AWGN 雜訊下之影像驗證與還原 .... 63
4.6 影像還原能力比較 ... 77
第五章 結論與未來展望 ................ 80
參考文獻 .............. 81
[1] Chang C.C., Hu Y.S., Lu T.C., “A Watermarking-Based Image Ownership and Tampering Authentication Scheme”, Elsevier, Pattern Recognition Letter, 2005.
[2] Mehemt Utku Celik, Gaurav Sharma, Eli Saber, Ahmet Murat Tekalp, “Hierarchical Watermarking for Secure Image Authentication With Localization”, IEEE TRANS. IMAGE PROCESSING, VOL. 11, NO.6, JUNE 2002.
[3] Christian Rey, Jean-Luc Dugelay, “A Survey of Watermarking Algorithms for Image Authentication”, EURASIP Journal on Applied Signal Processing 2002:6, 613-621.
[4] Ke Ding, Chen HE, Ling-ge JIANG, Hong-zia WANG, “Wavelet-Based Semi-Fragile Watermarking with Tamper Detection”, IEICE TRANS. FUNDAMENTALS, VOL.E88-A, NO.3 MARCH 2005.
[5] Min-Jen Tsai, Kuang-Yao Yu, and Yi-Zhang Chen, “Joint Wavelet and Spatial Transformation for Digital Watermarking”, IEEE Trans. Consumer Electron., vol.46, no. 1, p. 237, Feb. 2000.
[6] M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. IEEE International Conference on Image Processing, vol.2,pp. 680-683, Santa Barbara, Calif, USA, October 1997.
[7] Lin, P.-L., Hsieh, C.-K. and Huang, P.-W., A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. v38 i12. 2519-2529, 2005.
[8] C.-Y. Lin and S.-F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, pp. 153-168, Feb. 2001.
[9] C.-Y. Lin and S.-F. Chang, “Semi-fragile watermarking for authenticating JPEG visual content,” Proc. SPIE—Security and Watermarking in Multimedia Contents II, vol. 3971, pp. (AUTHOR: PLS. SUPPLY PAGES), 2000.
[10] D. Zou, Y. Q. Shi, and Z. Ni, “A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform,” Proceedings of 6th IEEE Workshop on Multimedia Signal Processing, vol. 5, pp. 195-198, Sept.~Oct. 2004.
[11] P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, “Toward secure public-key blockwise fragile authentication watermarking,” Proc. Inst. Elect. Eng., vol. 149, no. 2, pp. 57-62, Apr. 2002.
[12] E.Lin, C.Podilchuk, and E.Delp, “Detection of image alterations using semi-fragile watermarks,” in Proc. SPIE, Security and Watermarking of Multimedia Contents II San Jose, CA, vol. 3971, pp. 152-163, Jan. 2000.
[13] K.H. Chi and L. C-Tsun, “Semi-fragile watermarking scheme for authentication of JPEG images,” Proc. International Conference on Information Technology: Coding and Computing (ITCC’04), vol.1, pp.7–11, April 2004.
[14] S. Walton, "Information authentification for a slippery new age," Dr. dobbs Journal, vol.20, no.4, pp. 18-26, 1999.
[15] C.W. Wu,“On the design of content-based multimedia authentication systems,”IEEE Trans. On Multimedia. Vol. 4, No.3, Sep. 2002.
[16] Queluz, M.P., “Authentication of digital images and video: Generic models and a new contribution,” Signal Process.: Image Comm. 16 (5), 461-475, 2001.
[17] Z.M. Lu, C.H. Liu, D.G. Xu, and S.H. sun, “Semi-fragile image watermarking method based on index constrained vector quantization,” Electron. Lett., vol.39, no.1, pp.35-36, 2003.
[18] J.Q. Hu, J.W. Huang, D.R. Huang, and Y.Q. Shi, “Image fragile watermarking based on fusion of multi-resolution tamper detection,” Electron. Lett., vol.38, no.24, pp.1512-1523, 2002.
[19] H. Yuan and X.P. Zhang, “A multiscale fragile watermarking based on the Gaussian mixture model in the wavelet domain,” Proc. 2004 Int. Conf. on Acoustics, Speech and Signal Processing, vol.3, pp.413-416, Montreal, QC, Canada, May 2004.
[20] K. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol.87, no.7, pp.1167-1180, 1999.
[21] Andrew B. Watson, Gloria Y. Yang, Joshua A. Solomon, and John Villasenor, “Visibility of Wavelet Quantization Noise,” IEEE TTRAN. On Image Processing, Vol.6, No.8, AUG. 1997.
[22] ö Ekici, B. Sankur, B. Coskun, U. Nazi and Akcay, “Comparative evaluation of semifragile watermarking algorithms”, Journal of Electronic Imaging, vol. 13(1), pp.209-216, 2004.
[23] Independent JPEG Gourp’s free JPEG software. http://www.ijg.org.
[24] http://www.faqs.org/faws/jpeg-faq
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top