跳到主要內容

臺灣博碩士論文加值系統

(44.200.169.3) 您好!臺灣時間:2022/12/01 01:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳明輝
研究生(外文):Ming-Hui Chen
論文名稱:高效率有趣方塊之錯誤隱藏演算法
論文名稱(外文):A High-performance Algorithm for Region-of-interest Error Concealment
指導教授:夏世昌夏世昌引用關係
指導教授(外文):Shih-Chang Hsia
學位類別:碩士
校院名稱:國立高雄第一科技大學
系所名稱:電腦與通訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:108
中文關鍵詞:離散餘弦轉換重要區域錯誤隱藏強健性DCTROI
外文關鍵詞:error concealmentROIprogressive transformrobustnesssub-band
相關次數:
  • 被引用被引用:0
  • 點閱點閱:110
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在本文中,我們提出一個高效能的演算法,作為重建有趣方塊錯誤隱藏技術之用。數位影像在傳送的過程中,當通道遭受到攻擊而產生區塊資料損壞時,我們必需要能夠將發生錯誤的區塊解碼還原,在這過程中,我們將會以離散餘弦轉換作為基礎,並且將轉換完成後低頻成份的係數,先經量化之後,再將量化後的係數分散到的嵌入原始影像的中高頻區域。這個技術僅嵌入少量的ROI係數至原始影像之中,而且不但在每個區塊中僅改變一個係數,並且還維持被改變的係數具有與原係數具有相同的符號。這個方法能夠達到從收集所有區塊的ROI係數後,加以重建還原ROI區塊之影像,而不需額外增加其他傳送的資訊,在本篇論文中,我們提出一個以物件導向的影像壓縮標準MPEG-4為基礎的數位監控系統,並使用軟體程式實現。
本文的模擬結果說明,我們所提出的演算法在ROI資訊有錯誤發生時能夠有效的重建ROI的影像,而且勝過目前所參考的錯誤隱藏技術。
This paper presents an high performance error concealment algorithm for recovering ROI (Region of interest) information with hiding techniques. While the channel suffers from cell lost, we need to keep entire ROI data from error decoding. The image performed by DCT transformation, based on the progressive transformation, the low-frequency components of ROI are quantized and then encoded to disperse its information into the high-frequency band or the middle-frequency band of original image. The technique is only embedded fewer coefficients of ROI into original image and not only the changed one coefficient in each intact blocks but also the coefficient sign is not changed after embedded procedure. The capability of protection is carried out with extracting the ROI coefficients form the intact blocks of a damaged image itself without increasing extra information.
第壹章 緒論- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1
1-1 前言- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1
1-2 研究動機 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1
1-3 論文組織 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -2
第貳章 資訊隱藏與浮水印技術相關研究- - - - - - - - - - - - - - - - -- - -- -3
2-1 資訊隱藏技術簡介 - - - - - - - - - - - - - - - - - - - - - - - - - - -3
2-2 浮水印技術簡介 - - - - - - - - - - - - - - - - - - - - - - - - -- - --4
2-2-1 數位浮水印技術之使用領域- -- - - - - - - - - - - - - - - - -- - 5
2.2.2 數位浮水印技術之使用領域 - - - - - - - - - - - - - - -- - -- - -6
2-3 離散餘弦轉換( DCT ) - - - - - - - - - - - - - - - - - - - - - - - - -9
2-4 反離散餘弦轉換( IDCT ) - - - - - - - - - - - - - - - - - - - - - - - 12
2-5 離散餘弦轉換的截尾誤差- - - - - - - - - - - - - - - - - - - - - - - 13
2-6 二維次頻帶(2D sub-band)- - - - - - - - - - - - - - - - - - - - - - - 14
2-7 量化 (quantize) - - - - - - - - - - - - - - - - - - - - - - - - - 15
2-8 峰值訊雜比( PSNR )- - - - - - - - - - - - - - - - - - - - - - - - - 17
2-9 ROI係數嵌入技術- - - - - - - - - - - - - - - - - - - - - - - - -- 18
第三章 有趣方塊之錯誤隱藏演算法- - - - - - - - - - - - - - - - - - - - - - 20
3-1 ROI影像嵌入隱藏技術- - - - - - - - - - - - - - - - - - - - - - - - - 20
3-1-1 原始影像分割及轉換- - - - - - - - - - - - - - - - - 21
3-1-2 ROI影像選擇及DCT轉換- - - - - - - - - - - - - - - - - - 23
3-1-3 ROI嵌入資訊的選擇與量化- - - - - - - - - - - - - - - - - 24
3-1-4 ROI嵌入資訊法則- - - - - - - - - - - - - - - - - - - - - - - 26
3-1-4-1 ROI嵌入資訊法則-- 與 同號- -
- - -- - - - -- - -26
3-1-4-2 ROI嵌入資訊法則-- 與 異號- -
- - -- - - - -- - -28
3-1-5 ROI嵌入資訊量及位置選擇- - - - - - - - - - - - - - - - -- - -31
3-1-6 反離散餘弦轉換合成影像資訊- - - - - - - - - - - - - -- 33
3-1-7 ROI嵌入流程- - - - - - - - - - - - - - - - - - - - - - - - -33
3-2 ROI影像資料重建演算法- - - - - - - - - - - - - - - - - - - - - - - - 36
3-2-1 合成影像分割及DCT轉換 - - - - - - - - - - - - - - - - - -- - 37
3-2-2 取回法則- -- - - - - - - - - - - - - - - - - - - - -- - -- -37
3-2-3 補零法則- - - - - - - - - - - - - - - - - - - - - - - - - - -38
3-2-4 反離散餘弦轉換ROI資訊- - - - - - - - - - - - - - - - - - - 40
3-2-5 ROI錯誤重建流程- - - - - - - - - - - - - - - - - - - - - - - 40
第四章 錯誤隱藏演算法模擬結果與比較- - - - - - - - - - - - - - - - - - 43
4-1 區塊大小16*16錯誤隱藏模擬結果 - - - - - - - - - - - - - --- - - 43
4-1-1 區塊大小16*16錯誤隱藏嵌入係數位置高頻區- - - - - - -- - -- - -44
4-1-2 區塊大小16*16錯誤隱藏嵌入係數位置中頻區- - - -- - -- - -- - - 46
4-2 區塊大小8*8錯誤隱藏模擬結果- - - - - - - - - - - - - - - - - - -- - -48
4-2-1 區塊大小8*8錯誤隱藏嵌入係數位置高頻區- - - - - - -- - -- - -- 48
4-2-2 區塊大小8*8錯誤隱藏嵌入係數位置中頻區- - - -- - -- - -- - -- - 50
4-3 嵌入係數位置相對於合成影像PSNR之關係- - - - - - - - - - - - -- - -- 52
4-3-1 區塊大小16*16錯誤隱藏嵌入係數位置之比較- - - - - -- - -- - -- -53
4-3-2 區塊大小8*8錯誤隱藏嵌入係數位置之比較- - - -- - -- - -- - -- - 56
4-4 嵌入係數位置相對於重建ROI影像之PSNR關係- - - - - - - - - -- - -- - -- 59
4-4-1 區塊大小16*16嵌入係數位置對重建ROI影響 - - - - - -- - -- - -- - 59
4-4-2 區塊大小8*8嵌入係數位置對重建ROI影響 - - - -- - -- - -- - -- - -63
4-5 重建ROI之比較- - - - - - - - - - - - - - - - - - - - - - - -- - - - - 67
4-6 JPEG影像壓縮模擬- - - - - - - - - - - - - - - - - - - -- - - - - - --70
4-7 嵌入巨區塊之ROI係數錯誤隱藏模擬結果- - - - - - - - - -- - -- - -- - --74
4-7-1 區塊大小8*8巨區塊錯誤隱藏嵌入高頻區係數- - - -- - -- - -- - -- - 74
4-7-2 區塊大小8*8 錯誤隱藏巨區塊重建之PSNR值- - - - -- - -- - -- - -- 75
4-7-3嵌入巨區塊之ROI係數錯誤隱藏模擬結果- - - - - - - - -- - -- - -- - 77
4-8 參考文獻比較- - - - - - - - - - - - - - - - - - - -- - - - - - --- - -79
第伍章 結論- - - - - - - - - - - - - - - - - - -- - - - - - - - -- - -- - -- - -81
[1] Recovery of corrupted image data based on the NURBS interpolation Jong Wook Park; Sang Uk Lee;Circuits and Systems for Video Technology, IEEE Transactions on
Volume 9, Issue 7, Oct. 1999 Page(s):1003 - 1008
[2] Error concealment based on directional interpolation Jae-Won Suh; Yo-Sung Ho;Consumer Electronics, IEEE Transactions on Volume 43, Issue 3, Aug. 1997
Pages):295 - 302
[3] Best neighborhood matching: an information loss restoration technique for block-based image coding systems Zhou Wang; Yinglin Yu; Zhang, D.;Image Processing, IEEE Transactions on Volume 7, Issue 7, July 1998 Page(s):1056 - 1061
[4] An efficient, similarity-based error concealment method for block-based coded Images Ismaeil, I.; Shirani, S.; Kossentini, F.; Ward, R.;Image Processing, 2000.
Proceedings. 2000 International Conference on Volume 3, 10-13 Sept. 2000 Page(s):388 - 391 vol.3
[5] A cell-loss concealment technique for MPEG-2 coded video Zhang, J.; Arnold, J.F.; Frater, M.R.; Circuits and Systems for Video Technology, IEEE Transactions on
Volume 10, Issue 4, June 2000 Page(s):659 - 665
[6] MPEG-2 error concealment based on block-matching principles Tsekeridou, S.; Pitas, I.;Circuits and Systems for Video Technology, IEEE Transactions on
Volume 10, Issue 4, June 2000 Page(s):646 - 658
[7] Temporal error concealment using selective motion field interpolation Chen, B.N.; Lin, Y.; Electronics Letters Volume 42, Issue 24, November 23 2006
Page(s):1390
[8] Multiresolution watermarking for digital images Chion-Ting Hsu; Ja-Ling Wu;Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on [see also Circuits and Systems II: Express Briefs, IEEE Transactions on]Volume 45, Issue 8, Aug. 1998 Page(s):1097 - 1101
[9] Hidden digital watermarks in images Chiou-Ting Hsu; Ja-Ling Wu;Image Processing, IEEE Transactions on Volume 8, Issue 1, Jan. 1999 Page(s):58 - 68
[10] I. Pitas and T. Kaskalis ,”Applying signatures on Digital images”, Nonlinear signal processing workshop, Thessaloniki,Greece, pp.460-463,1995
[11] M. D. Swanson, M. Kobayashi and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,”Proc. Of the IEEE, vol.86, no.6,pp.1064-1087,June 1998.
[12] Gonzalez, R. C. and Woods, R. E., "Digital Image Processing", 2nd Ed., Prentice Hall,Upper Saddle River, NJ, 2002.
[13] S. Kang and Y. Aoki, “ Digital image watermarking by fresnel transform and its robustness”, International Conference Image Processing, 1999,pp. 221- 225
[14] Jong Ryul Kim; Young Shik Moon “A robust wavelet-based digital watermarking using level-adaptive thresholding” Image Processing, 1999. ICIP99. Proceedings. 1999 International Conference on Volume: 2 , 1999 , Page(s): 226 -230 vol.2
[15] Pratt W. K., Digital Image Processing, Wiley, Toronto, Ont., Canada, 1978.
[16] Fridrich, J. and Goljan, M.; Baldoza, A.C. “New fragile authentication watermark for images”, Image Processing, 2000. Proceedings. 2000 International Conference on , Volume: 1 , 2000 Page(s): 446 -449 vol.1
[17] Min Wu; Bede Liu ,“Attacks on digital Watermarks”,Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on , Volume: 2 , 1999 Page(s): 1508 -1512 vol.2
[18]R. G. Van Schyndel, A. Z. Tirkel and C. F. Osborne, “A Digital watermark”,Proc. 1994 IEEE Int.Conf. on Image Processing, vol.11, pp.86-90,1994
[19] Thevenaz, P., Blu, T., and Unser, M., "Image Interpolation and Resampling," Academic Press, Orlando, FL, USA, 2000.
[20]Chien-cheng Tseng,Ren-Der Lin and Su-Ling Lee,”Image watermarking Based on Toral Automorphism,Block DC Value Quantization and Error Correcting-Code”,1999 12th IPPR Conference on Computer Vision,Graphics and Image
Processing, vo1.I,pp158-165,1999
[21] I. Cox, J. Kilian,T. Leighton,and T. Shamoon, ”Secure Spread Spectrum Watermarking for Images,Audio,and Video,”NEC Res. Inst., Princeton,NJ, Tech. rep. 95-10, 1995
[22] H. kii,J. Onishi and S. Ozawa, “The digital watermarking method by using both patchwork and DCT,”IEEE Multimedia Computing and System,Jun.1999,pp.895-899
[23] C.S Tsai,C.C. Chang, T.S. Chen and M.H. Chen,”Embeding robust gray-level watermarks in an image using discrete cosine transformation , ”to appear in Distributed Multimedia Database: Technques and Applications.
[24] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,”IEEE Transactions on Image Processing,Vol. 8, Jan. 1999,pp. 58-68
[25] W. Zeng and B. Liu, “On resolving rightful ownerships of digital images by invisible watermarks,”Proceedings of International Conference on Image
Processing,1997,pp. 552-555.
[26] Piva, A.; Barni, M.; Bartolini, F.; Cappellini, V. “DCT-based watermark recovering without resorting to the uncorrupted original image” Image Processing,
1997. Proceedings., International Conference on Volume: 1 , 1997 , Page(s): 520 -523
[27] Min-Jen Tsai,and Kuang-Yao Yu,”joint wavelet and spatial transformation for digi-tal watermarking”, IEEE Transactions on , Volume: 46 Issue: 1, Feb. 2000 Page(s):237
[28] Dugad, R.; Ratakonda, K.; Ahuja, N. “A new wavelet-based scheme for water-marking images” ,Image Processing, 1998. ICIP 98. Proceedings. 1998
International Conference onVolume: 2 , 1998 , Page(s): 419 -423 vol.2.
[29] Kaewamnerd, N.; Rao, K.R. “Wavelet based image adaptive watermarking scheme” Electronics Letters Volume: 36 4 , 17 Feb. 2000 ,
[30] A fragile watermark error detection scheme for wireless video communications Minghua Chen; Yun He; Lagendijk, R.L.;Multimedia, IEEE Transactions on
Volume 7, Issue 2, Apr 2005 Page(s):201 - 211
[31]Fast and low roundoff implementation of quadrature mirror filters for subband Coding Jar-Ferr Yang; Din-Yuen Chan; Yuan-Been Chen;Circuits and Systems for
Video Technology, IEEE Transactions on Volume 5, Issue 6, Dec. 1995 Page(s):524
[32] [25] 陳同孝、張真誠、黃國峰,數位影像處理技術(Digital Image Processing Techniques),松崗電腦圖書資料股份有限公司,2001年1月。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top