跳到主要內容

臺灣博碩士論文加值系統

(44.222.82.133) 您好!臺灣時間:2024/09/08 18:08
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:莊上墀
研究生(外文):Shang-Chih Chuang
論文名稱:應用於多媒體詮釋資料傳遞功能之不可視顯性浮水印技術
論文名稱(外文):Unseen Visible Watermarking for Multimedia Metadata Delivery
指導教授:吳家麟
指導教授(外文):Ja-Ling Wu
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:59
中文關鍵詞:不可視顯性浮水印影像強化具內容適性之不可視顯性浮水印技術具材質適性之不可視顯性浮水印技術二維條碼裝置的可適性
外文關鍵詞:Unseen visible watermarking (UVW)image enhancementcontent versatile unseen visible watermarking (CV-UVW)text-adaptive unseen visible watermarking (TA-UVW)fidelityrobustness2-D barcodesdevice versatility
相關次數:
  • 被引用被引用:0
  • 點閱點閱:327
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在本論文中,我們提出了一種新的浮水印機制,稱為不可視顯性浮水印技術(unseen visible watermarking、UVW)。以此技術嵌入的不可視顯性浮水印,可用來傳遞描述多媒體數位內容的詮釋資料(metadata)。在一般的情況下,不可視的顯性浮水印係處於不可視的狀態,但可以透過使用一般顯示裝置所提供的常見影像強化(image enhancement)功能加以揭露。相較於顯性浮水印技術(visible watermarking),不可視顯性浮水印技術可以讓嵌入浮水印後的數位內容的外觀與嵌入前看來疏無二致,因而得以完全保留其商業價值。相對於隱性浮水印技術(invisible watermarking),我們所提出的技術不需要特製的解譯器(explicit extractor),因此可免去部署該解譯模組所需的額外成本,並增加此技術的應用範圍。換言之,使用者不但可以透過各種顯示裝置享受高品質的多媒體內容,也可以很便利地取得能夠提高數位內容附加價值的額外資訊。此外,我們的系統還整合了二維條碼(2‐D barcodes),以改進顯性浮水印技術只能嵌入人眼可辨識但機器無法解譯的浮水印這項限制。然而,基本的不可見顯性浮水印亦有其缺點,就是只能應用在具備某些特殊性質的數位內容上。針對這個問題,我們提出了具內容適性之不可視顯性浮水印技術(content‐versatile UVW),以增加本技術的多媒體內容適用性。我們認為不可視顯性浮水印技術比現存的數位浮水印機制更接近現實世界中廣泛使用的實體浮水印技術。
We propose a novel class of watermarking schemes named as unseen visible watermarking (UVW). In this work, originally invisible patterns carrying metadata will be disclosed as long as image enhancement operations provided by common display devices are applied to the marked contents. The proposed schemes not only surpass existing visible watermarking schemes in better fidelity but also solve the limitations of invisible watermarking schemes that specific extraction modules must be deployed. Therefore, users of legacy display devices can enjoy high-quality visual experiences and still retain the convenience of value added metadata. Moreover, 2-D barcodes are integrated with the proposed UVW scheme to alleviate the constraint that conventional visible watermarking schemes cannot be directly used to deliver machine-readable metadata. On the other hand, the basic implementation of UVW suffers from the problem that messages cannot be readily embedded into contents lacking certain characteristics. A class of extended schemes, denoted as content-versatile unseen visible watermarking (CV-UVW), is devised to increase the content applicability of UVW schemes. We believe that the structures of UVW schemes are more similar to real-world watermarks than that of any existing digital watermarking scheme.
1 Introduction ......................................................... 1

2 RelatedWorks ......................................................... 6
2.1 Digital Watermarking ............................................. 6
2.2 Two-Dimensional Barcodes ......................................... 8

3 Unseen Visible Watermarking ......................................... 11
3.1 Analogy between Image Enhancement and Real-World Watermarking ... 11
3.2 The System Overview ............................................. 14
3.3 Implementations and Experiments ................................. 15
3.3.1 Gamma Correction: the Simplest Case ......................... 16
3.3.2 Detailed Implementation ..................................... 19
3.3.3 UVW for Images .............................................. 24
3.3.4 UVW for Uncompressed and Compressed Video ................... 25
3.3.5 UVW for Digital Documents ................................... 29
3.3.6 UVW Delivering Machine-Readable Messages .................... 32
3.3.7 Resistance to Geometric Attacks ............................. 33

4 Content-Versatile Unseen Visible Watermarking ....................... 34
4.1 UVW Based on Histogram Equalization ............................. 35
4.2 UVW Based on Contrast Stretching ................................ 36
4.3 UVW Based on Operation Concatenation ............................ 37
4.4 Texture-Adaptive Unseen Visible Watermarking .................... 41

5 Between Visible and Invisible Watermarking .......................... 48
5.1 Visual Quality .................................................. 49
5.2 Device Versatility / Deployment Cost ............................ 49
5.3 Content Versatility ............................................. 50
5.4 Message Type Versatility ........................................ 51
5.5 Robustness ...................................................... 51
5.6 Summary ......................................................... 52

6 Conclusions and FutureWorks ......................................... 54

References ............................................................ 55

Vita .................................................................. 58
[1] G. Braudaway, K. A. Magerlein, and F. Mintzer. Protecting publicly available images with a visible image watermark. In Proceedings of the SPIE, International Conference on Electronic Imaging, 1996.
[2] B. Chen and G.W.Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4):1423–1443, May 2001.
[3] S. C. Chuang, C. H. Huang, and J. L. Wu. Unseen visible watermarking. In Proceedings of IEEE International Conference on Image Processing, 2007.
[4] J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673–1687, 1997.
[5] J. Cox, M. L. Miller, and J. A. Bloom. Digital Watermarking. Morgan Kaufmann, 2002.
[6] Data Matrix. http://www.acuitycimatrix.com/index.html.
[7] R. C. Gonzalez and R. E. Woods. Digital image processing. Prentice Hall; 2nd edition, 2002.
[8] L. Hakola and H. Linna. Detection of printed codes with a camera phone. In IARIGAI, 2005.
[9] C. H. Huang, S. C. Chuang, and J. L. Wu. Digital invisible ink and its applications in steganography. In ACM Multimedia and Security Workshop, 2006.
[10] C. H. Huang and J. L. Wu. Attacking visible watermarking schemes. IEEE Transactions on Multimedia, 6(1):16–30, Feb 2004.
[11] M. E. Jernigan and F.D’Astous. Entropy-based texture analysis in the spatial frequency domain. IEEE Transactions on Pattern Analysis and Machine Intelligence, 6(2):237–243, 1984.
[12] K. Kamijo, N. Kamijo, and M. Sakamoto. Electronic clipping system with invisible barcodes. In Proceedings of the 14th annualACMinternational conference on Multimedia, pages 753–762. ACM Press New York, NY, USA, 2006.
[13] M. Kankanhalli, Rajmohan, and J. R. Ramakrishnan. Adaptive visible watermarking of images. In Proceedings of IEEE International Conference on Multimedia Computing and Systems, 1999.
[14] H. Linna. Disposable and multipurpose indicators and codes for communicative packaging. In PIRA Smart and Intelligent Packaging Europe Conference, 2004.
[15] C. S. Lu. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing, 2005.
[16] H. S. Marvar and A. F. Florencio. Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 51(4):898–905, 2003.
[17] J. Meng and S. F. Chang. Embedding visible watermarks in the compressed domain. In Proceedings of IEEE International Conference on Image Processing, 1998.
[18] S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli. A dct domain visible watermarking technique for images. In Proceedings of IEEE International Conference on Multimedia and Expo, 2000.
[19] QR code. http://www.qrcode.com/.
[20] M. D. Swanson, B. Zhu, and A. H. Tewfik. Data hiding for video-in-video. In Proceedings of IEEE International Conference on Image Processing, 1997.
[21] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Communication Magazine, Aug 2001.
[22] M.Wu and B. Liu. Multimedia data hiding. Springer, 2003.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top