跳到主要內容

臺灣博碩士論文加值系統

(3.237.38.244) 您好!臺灣時間:2021/07/26 11:08
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李明航
研究生(外文):Ming-Harng Lee
論文名稱:強健性浮水印之研究
論文名稱(外文):Study on Robust Watermark Technology
指導教授:洪盟峰洪盟峰引用關係
指導教授(外文):Mong-Fong Horng
學位類別:碩士
校院名稱:樹德科技大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:61
中文關鍵詞:浮水印漢明碼DCT強健性
外文關鍵詞:watermarkhamming coderobustDCT
相關次數:
  • 被引用被引用:0
  • 點閱點閱:173
  • 評分評分:
  • 下載下載:12
  • 收藏至我的研究室書目清單書目收藏:0
本論文針對空間域、頻域兩個領域各提出可利用漢明碼修正錯誤之浮水印技術與可容忍高壓縮率之強健性DCT 浮水印法。空間域方面提出利用漢明碼來保護嵌入的浮水印,並將編碼的資料分散地隱藏在圖像裡,使得即使圖像在傳輸過程中損壞或遭惡意破壞,仍儘可能地保存原有浮水印。因此使得浮水印的強健性有所提升。另外,在頻域方面,我們的研究中發現:利用離散餘弦轉換(DCT)進行影像壓縮及解壓縮處理時,影像區塊內的直流成份(DC)具有高度的強健性,因此我們利用此一頻域的特性,開發可容忍高壓縮率的浮水印法。使得浮水印經過影像處理時所需要的壓縮程序時,仍可以保留高品質的浮水印。並實驗驗證本文提出之浮水印法對於抵抗圖像區塊裁剪、雜訊干擾以及圖像JPEG 壓縮之強健性。從實驗中可發現空間域浮水印法對於雜訊干擾的強健性優於頻域浮水印法,而頻域浮水印法對於圖像區塊裁剪和JPEG 壓縮則優於空間域浮水印法。並且,本論文將Su 等人的研究與本論文所提出的方法做比較,發現在壓縮實驗部份,本論文提出的方法於同樣Q 值為15 條件下,所取出之浮水印與原浮水印有83%之相似度,優於Su 的最高80%的相似度。而與葛萬成等人的研究比較中,在27.77:1 的壓縮比下仍可取出與原浮水印有83%以上的相似度,優於葛在27.5:1 的相似度82.91%証明本方法在JPEG 圖像壓縮的強健性優於Su 與葛所提出的方法,可容忍於高壓縮率。
In this thesis, a spatial-domain and a frequency-domain watermarking techniques are proposed to improve the robustness of watermark hidden in images against the attacks including compression, cutting, and pepper-salt noise. In the spatial domain approach, the technique of hamming code is employed to protect the watermark spread-hiding in images. This hybrid scheme can effectively maintain the integrity of
hidden watermark, even corrupted in either transmission corrupt or malicious attack. Besides, in frequency-domain watermark technology, the DC component of the frequency conversion of an image has the feature of robustness. Thus, a DC-component based watermarking is proposed to overcome the watermark distortion caused by image compression. To evaluate the performance of the proposed schemes, we use the standard image database to conduct a series of experiments to compare and to analyze the spatial domain and frequency domain schemes. The experimental results depict that (1) the spatial-based scheme has a better robustness than the frequency-based scheme in case of random noise (2) the frequency-based scheme has a better robustness than the spatial-based scheme in cases of cutting and compression attacks. Besides, comparing to the previous related works, the proposed schemes have a higher similarity of the recovered watermarks than before. Thus, the improvement of watermark robustness is properly verified.
摘要.................................................................................................................................i
A B S T R A C T ...........................................................................................................ii
目錄...............................................................................................................................iii
圖目錄............................................................................................................................v
表目錄............................................................................................................................vii
一、緒論.......................................................................................................................1
1.1 前言...........................................................................................................................1
1.2 研究動機及目的.....................................................................................................3
1.3 綱要簡介.................................................................................................................3
二、文獻探討...............................................................................................................4
2.1 何謂浮水印............................................................................................................4
2.1.1 浮水印起源........................................................................................................ 4
2.1.2 理想浮水印應有特性........................................................................................ 5
2.2 浮水印分類,以嵌入方式區分...........................................................................6
2.2.1 空間域(Spatial domain)浮水印法............................................................... 6
2.2.2 頻域(Frequency domain)浮水印法.............................................................. 6
2.3 現在浮水印分類...................................................................................................7
2.3.1 易碎浮水印(Fragile Watermark).................................................................. 7
2.3.2 半易碎浮水印(Semi-fragile Watermark) ..................................................... 8
2.3.3 強健型浮水印(Robust Watermark).............................................................. 8
2.4 國內外相關研究...................................................................................................8
2.5 常見浮水印攻擊方法...........................................................................................9
2.6 文獻回顧..............................................................................................................12
三、研究方法...............................................................................................................21
3.1 可利用漢明碼修正錯誤之浮水印技術.............................................................21
3.1.1 漢明碼介紹................................................................................................. 21
3.1.2 可利用漢明碼修正錯誤之浮水印技術之研究方法................................. 23
3.2 可容忍高壓縮率之強健性DCT 浮水印法.......................................................29
3.2.1 餘弦轉換(DCT)簡介.................................................................................. 29
3.2.2 圖像壓縮介紹............................................................................................. 31
3.2.3 可容忍高壓縮率之強健性DCT 浮水印之研究方法............................... 36
四、實驗.......................................................................................................................42
4.1 實驗目的............................................................................................................42
4.2 實驗環境.............................................................................................................42
4.3 實驗結果.............................................................................................................43
4.3.1 空間域與頻域浮水印加入隨機雜訊之實驗............................................. 43
4.3.2 空間域與頻域浮水印隨機區塊裁剪之實驗............................................. 46
4.3.3 空間域與頻域浮水印壓縮圖像之實驗..................................................... 51
4.3.4 實驗結果分析與比較................................................................................. 52
五、結論.......................................................................................................................57
參考文獻.......................................................................................................................59
[1] J. Wilkins, Mercury: Or the Secret and Swift Messenger, 3rd ed., John Benjamins, US, 1984.
[2] 資策會FIND/經濟部技術處「創新資訊應用研究計畫」,2006 年第四季台灣有線寬頻網路用戶數成長情況。http://www.find.org.tw/find/
[3] 保護智慧財產權警察大隊, 查緝侵害智慧財產權案件統計表
http://www.tipo.gov.tw/iprp/
[4] F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999
[5] W. N. Cheung, “Digital Image Watermarking in Spatial and Transform Domain,” Proc. of TENCON 2000, vol. 3, pp. 374-378, 2000
[6] R.G.van Schyndel and A.Z.Tirkel, C.F.Osborne, “A DIGITAL WATERMARK”, Proc. of ICIP, vol. 2, pp. 86-90, 1994
[7] M. Al-khassaweneh and S. Aviyente, “A Time-Frequency Inspired Robust Image Watermarking,” Proc. of IEEE Conference Record of the Thirty-Eighth Asilomar Conference, vol. 1, pp. 392-396, 2004
[8] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997
[9] J. Z. Wang and G. Wiederhold, "WaveMark: Digital Image Watermarking Using Daubechies' Wavelets and Error Correcting Coding," Proc. of SPIE, vol. 3528, pp. 432-439, 1999
[10] Ö. Ekici, B. Sankur, B. Coskun, U. Naci, and M. Akcay, “Comparative evaluation of semifragile watermarking algorithms,” Journal of Electronic Imaging, vol. 13, no. 1, pp. 209-216, 2004
[11] J. Fridrich, M. Goljan, and A. C. Baldoza, “NEW FRAGILE AUTHENTICATION WATERMARK FOR IMAGES,” Proc. of ICIP, vol. 1, pp. 446-449, 2000
[12] C. Y. Lin and S. F. Chang, “Semifragile Watermarking for Authenticating JPEG Visual Content,” Proc. SPIE Security and Watermarking of Multimedia Content II, vol. 3971, pp. 140-151, 2000
[13] I. J. Cox, J. Kilian, T. Leightonz, and T. Shamoony, “A Secure, Robust Watermark for Multimedia,” Information Hiding, Lecture Notes in Computer Science, vol. 1174, pp. 183-206, 1996
[14] C. C. Chang, W. L. Tai, and C. C. Lin, “A Multipurpose Wavelet-based Image Watermarking," Proc. of 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), vol. 3, pp. 70-73, 2006
[15] M. S. Hsieh and D. C. Tseng, “Wavelet-based color image watermarking using adaptive entropy casting,” in Proc. of IEEE Int. Conf. on Multimedia & Expo(ICME), pp. 1593-1596, 2006
[16] C. M. Chou and D. C. Tseng, “Technologies for 3D model watermarking: A survey,” International Journal of Computer Science and network Security, vol.7, no.2, pp.328-334, 2007
[17] F. H. Yeh and G. C. Lee, “Toral fragile watermarking for localizing and recovering tampered Image,” Proc. of IEEE Symposium on Intelligent Signal Processing and Communication Systems, pp. 13-16, 2005
[18] F. H. Yeh and G. C. Lee, ”Content-based watermarking in image authentication allowing remedying of tampered images,” Optical Engineering, vol. 45, no. 7, pp.(077004) 1-10, 2006
[19] C. C. Chang, Y. C. Chang, and J. J. Shen, “A Heuristic Method for Extracting Enhanced Watermarks from Digital Images,” Proc. of 2006 International Conference on Intelligent Information Hiding and Multimedia, pp. 453-456, 2006
[20] G. Wang and N. N. Rao, "A Fragile Watermarking Scheme for Medical Image," Proc. of 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, pp. 3406- 3409, 2005
[21] H. R. Lee and K. H. Rhee, "Reversible Data Embedding for Tamper-Proof Watermarks," Proc. of First International Conference on Innovative Computing, Information and Control (ICICIC'06), pp. 487-490, 2006
[22] F. Ahmed and S. MY, "A Hybrid-Watermarking Scheme for Asymmetric and Symmetric Watermark Extraction," Proc. of 9th International Multitopic Conference, pp. 1-6, 2005
[23] C. Y. Su, K. C. Lee, and J. Y. Pan, “A Low-Complexity Encrypted Digital Watermark,” Proc. of 2003 Conference on Computer Vision, Graphics and Image Processing (CVGIP’ 03), pp. 794-801, 2003
[24] 葛萬成,朱春生,陳康力,”基于DCT 域直流分量的數字水印技術,” 同濟大學學報,第32 卷,第6 期,795-798 頁,2004
[25] D. J. C. MacKay, Information Theory, Inference and Learning Algorithms, CAMBRIDGE, USA, 2004
[26] 酒井善則,吉田俊之,影像壓縮技術,白執善,全華科技圖書,台北,2004
[27] 吳炳飛等編著,JPEG2000 影像壓縮技術,二版,全華科技圖書,台北,2005
[28] 楊長霖,一個植基於離散餘弦轉換的影像偽裝術,逢甲大學,碩士論文,2004
[29] Wikipedia contributors, http://zh.wikipedia.org/wiki/JPEG
[30] USC-SIPI Image Database, http://sipi.usc.edu/database
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 21. 邱淑媞(2004),「以「健康城市」發展策略推動社區體重控制計畫--臺北市「健康減重一百噸」經驗」,《國民體育季刊》,第33卷第3期,頁38-45。
2. 40. 陳秀美(2004),「社區健康營造推動內涵與策略之探討--以淡水鎮社區健康營造為案例」,《社區發展季刊》,第107期,頁253-262。
3. 53. 黃松共、吳永鐘(2003),「臺灣地區社區健康營造中心運作現況初探--以兩梯次159家社區健康營造中心為例」,《醫務管理期刊》,第4卷第1期,頁13-38。
4. 46. 陳其南(1998a),「社區總體營造的永續發展策略」,《社教資料雜誌》,第241期,頁5-7。
5. 20. 吳桂花、劉影梅、黃璉華(2004),「系統理論的應用與評價--以農村之社區健康評估為例」,《護理雜誌》,第50卷第1期,頁67-71。
6. 41. 陳靜敏(2002),「健康促進的創新策略--社區健康營造」,《新臺北護理期刊》,第4 卷第2期,頁1-7。
7. 38. 陳靜敏、楊舒琴(2006),「社區健康營造中心之永續經營策略」,《實證護理》,第2卷第3期,頁250-258。
8. 37. 陳美燕、楊瑞珍、劉影梅、廖照慧、黃璉華(2001),「社區健康營造的理論與社區護理實務的結合」,《醫護科技學刊》,頁358-364。
9. 35. 陳淑眉、胡淑貞(2005),「社區健康評估與健康社區評估的異同」,《健康城市學刊》,第3期,頁1-8。
10. 31. 莊宜佳、陳靜敏、蔡仁貞、李龍騰(2005),「影響北市社區健康營造中心志工推行健康促進活動成效探討」,《新臺北護理期刊》,第7卷第1期,頁35-44。
11. 25. 侯勝茂(2001),「社區健康營造」,《臺灣醫學》,第5卷第2期,頁182-187。
12. 45. 陳其南(1999),「社區總體營造」,《教育社會學通訊》,第13期,頁28-29。
13. 42. 陳毓璟、黃松元(2003),「臺北市社區健康營造推動的現況與困難之研究」,《衛生教育學報》,第19期,頁179-211。
14. 18. 林振豐(2005),「建構公民參予導向的社區總體營造政策」,《苗栗文獻》,第17卷第31期,頁90-97。
15. 11. 李怡娟(1999),「運用充能策略於社區衛生教育」,《榮總護理》,第16卷第4期,頁237-241。