跳到主要內容

臺灣博碩士論文加值系統

(3.95.131.146) 您好!臺灣時間:2021/07/25 13:12
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李奕煌
研究生(外文):Yi-Huang Lee
論文名稱:基於離散小波轉換與模數運算的數位影像著作權保護方法之研究
論文名稱(外文):Study of Copyright Protection Schemes for Digital Images Based on Discrete Wavelet Transform and Modulus Operation
指導教授:許慶昇許慶昇引用關係
指導教授(外文):Ching-Sheng Hsu
學位類別:碩士
校院名稱:銘傳大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:84
中文關鍵詞:買賣雙方協定數位浮水印離散小波轉換著作權保護
外文關鍵詞:buyer-seller protocolcopyright protectiondiscrete wavelet transformdigital watermarking
相關次數:
  • 被引用被引用:0
  • 點閱點閱:159
  • 評分評分:
  • 下載下載:45
  • 收藏至我的研究室書目清單書目收藏:1
隨著網際網路之技術與應用的蓬勃發展,數位影像交易的方式漸漸以網路為主要的傳輸媒介,然而,此種交易方式卻往往會引發影像傳輸的安全性、買賣雙方身份驗證等相關問題,而在買賣雙方完成交易後,該如何確保買賣雙方對於交易影像中各自擁有的權利也將是另一個必須解決的課題。此外,由於數位影像相當容易複製與散佈,因此也衍生出數位影像智慧財產權保護技術的迫切需求。為了解決數位影像在交易過程中所面臨的問題,本論文提出一個基於數位浮水印機制的買賣雙方協定,藉由該協定能夠確保買賣雙方在交易過程中的安全性與公平性,並保護買賣雙方對於該交易影像所各自擁有的權利。數位浮水印機制是保護影像智慧財產權的重要技術,其作法是在影像中藏入一組足以代表所有權或著作權的浮水印,以達到驗證所有權或著作權的目的,因此,浮水印的強韌性是數位浮水印機制的重要考量因素。在本文論中,我們提出九種以離散小波轉換與模數運算為基礎的數位浮水印機制,由實驗結果顯示,本論文所提出的方法不僅能將對原始影像的破壞程度控制在人眼所無法辨識的程度之下,同時,在面對一些常見的影像處理,例如調整亮度、加雜點、Jitter Attack、剪裁等攻擊時,取出的浮水印依然具備相當程度的辨識能力。實驗結果亦顯示,本論文所提出的方法比其他類似的方法更具強韌性。
With the growth of Internet technologies and applications, more and more digital images are exchanged via Internet for business purposes. However, it may lead to the problems about the security of transmission, the authentication of buyers and sellers, and the protection of rightful ownership or copyright for digital images. Moreover, it is very easy to duplicate or distribute digital images in an unauthorized manner on Internet. Thus, the protection of intellectual property rights of digital images has become a rising demand. To deal with these problems, we propose a buyer-seller protocol based on watermarking in this thesis. By this protocol, it can not only ensure the security and fairness of a trade, but also protect the rights of buyers and sellers for digital images. Watermarking is an important technology which embeds a watermark into the host image to protect the intellectual property rights of digital images. An effective watermarking scheme should provide good robustness of the hidden watermarks. That is, the hidden watermarks should survive different kinds of malicious attacks. In this thesis, we propose nine watermarking schemes based on discrete wavelet transform (DWT) and modulus operation. Experimental results show that our schemes can resist many common attacks, such as brightening, noise-addition, Jitter, and cropping attacks. Besides, they also show that the proposed schemes are quite robust in comparison with other similar methods.
圖目錄 v
表目錄 vi
第壹章 緒論 1
第一節 研究背景與動機 1
第二節 研究問題 2
第三節 研究目的 3
第四節 研究限制 4
第貳章 文獻探討 5
第一節 買賣雙方協定 5
第二節 數位浮水印機制 7
第三節 離散小波轉換 11
第參章 研究方法 13
第一節 買賣雙方協定 13
第二節 既有之數位浮水印機制 16
第三節 數位浮水印機制 17
第四節 灰階影像之數位浮水印機制藏入與偵測流程 19
第五節 灰階影像之數位浮水印機制隱藏與偵測的方法 21
第六節 彩色影像之數位浮水印機制 32
第肆章 實驗與討論 34
第一節 灰階影像之數位浮水印機制 34
第二節 彩色影像之數位浮水印機制 54
第三節 實驗結論 66
第伍章 結論 68
參考文獻 71
著作 74
1.Chen, T.-H. and Tsai, D.-S., “Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol.” Pattern Recognition, Vol. 39, No. 8, 2006, pp. 1530-1541.
2.Cox, I.J., Kilian, J., Leighton, F.T., and Shamoon, T., “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, 1997, pp. 1673-1687.
3.Das, T.-K. and Maitra, S., “Analysis of the Wavelet Tree Quantization watermarking strategy and a modified robust scheme,” Multimedia Systems, Vol. 12, No. 2, 2006, pp. 151-163.
4.Dong, B., Lin, X., and Xu, F., “Algorithm of digital watermark in wavelet domain based on human visual system,” Jisuanji-Gongcheng/Computer Engineering, Vol. 32, No, 24, 2006, pp. 138-140.
5.He, X.-P. and Zhu, Q.-S., A robust wavelet-domain watermarking algorithm for color image,” Institute of Electrical and Electronics Engineers Computer Society, Piscataway, Vol. 2006, 2006, pp. 3940-3943.
6.Hou, Y.-C., Chen, P.-M., and Chiao, Y.-F., “Steganography: An Efficient Data Hiding Method,” in Proc. of CVPRIP’98, Vol. 4, Durham, Oct. 1998, pp. 211-214.
7.Hsu, C.T., “Digital Watermarking for Images and Videos,” Ph.D. Dissertation, Dept. of CSIE, National Taiwan University, 1997.
8.Huang, F., Guan, Z., and Wu, X., “Blind watermarking algorithm based on DCT,” Journal of Huazhong University of Science and Technology, Vol. 34, No. 2, 2006, pp. 17-19.
9.Joo, S., Suh, Y., Shin, J., and Kikuchi, H., “A New Robust Watermark Embedding into Wavelet DC Components,” ETRI Journal, Vol. 24, No. 5, 2000, pp. 401-404.
10.Kino, M. and Wada, S., “Wavelet-based perceptual watermarking with bit data embedded in still color images,” Electronics and Communications in Japan, Part III: Fundamental Electronic Science, Vol. 87, NO. 1, 2004, pp. 1-9.
11.Kutter, M. and Petitcolas, F.A.P., “Fair benchmark for image watermarking systems,” Proceedings of SPIE - The International Society for Optical Engineering, Vol. 3657, 1999, pp. 226-239.
12.Lee, C.-H. and Lee, H.-K., “Geometric attack resistant watermarking in wavelet transform domain,” Optics Express, Vol. 13, No. 4, 2005, pp. 1307-1321.
13.Lei, C.-L., Yu, P.-L., Tsai, P.-L., and Chan, M.-H., “An efficient and anonymous buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, Vol. 13, No. 12, 2004, pp. 1618-1626.
14.Liu, J.-L., Lou, D.-C., Chang, M.-C., and Tso, H.-K., “A robust watermarking scheme using self-reference image,” Computer Standards and Interfaces, Vol. 28, No. 3, 2006, pp. 356-367.
15.Lou, D.-C. and Liu, J.-L., “A robust watermarking scheme based on the just-noticeable-distortion,” Chung Cheng Ling Hsueh Pao/Journal of Chung Cheng Institute of Technology, Vol. 31, No. 2, 2003, pp. 11-22.
16.Lou, D.-C., Shieh, J.-M., and Tso, H.-K., “A robust buyer-seller watermarking scheme based on DWT,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 20, No. 1, 2006, pp. 79-90.
17.Lu, C.-S. and Liao, H.-Y.-M., “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, Vol. 10, No. 10, 2001, pp.1579-1592.
18.Lu, C.-S., Huang, S.-K., Sze, C.-J., and Liao, H.-Y.-M., “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, Vol.2, No. 4, 2000, pp. 209-224.
19.Memon, N. and Ping Wah, W., “A buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, Vol. 10, No. 4, 2001, pp. 643-649.
20.Nafornita, C., Isar, C., and Borda, M., “Image watermarking based on the discrete wavelet transform statistical characteristics,” Institute of Electrical and Electronics Engineers Computer Society, Piscataway, Vol. 2, 2005, pp. 943-946.
21.Nikolaidis, N. and Pitas, I., “Robust image watermarking in the spatial domain,” Signal Processing, Vol. 66, No.3, 1998, pp. 285-403.
22.Qiao,L. and Nahrstedt, K., “Watermarking schemes and protocols for protecting rightful ownership and customer’srights,” Journal of Visual Communication and Image Representation, Vol. 9, No. 3, 1998, pp. 194-210.
23.Potdar, V.M., Han, S., and Chang, E., “A survey of digital image watermarking techniques,” IEEE International Conference on Industrial Informatics, 2005, pp. 709-716.
24.Safabakhsh, R., Zaboli, S., and Tabibiazar, A., “Digital Watermarking on Still Images Using Wavelet Transform,” Institute of Electrical and Electronics Engineers Computer Society, Vol. 1, 2004, pp. 671-675.
25.Sun, G. and Yu, Y., “DWT based watermarking algorithm of color images,” Proc. of IEEE Conference on Industrial Electronics and Applications 2007, pp: 1823-1826.
26.Tsai, M.-J. and Hung H.-Y., “DCT and DWT-based image watermarking by using subsampling”, Institute of Electrical and Electronics Engineers Inc., Piscataway, United States 24, 2004, pp. 184-189.
27.Tsai, M.-J. and Hung, H.-Y., “Wavelet transform based digital watermarking for image authentication,” Fourth Annual ACIS International Conference on Computer and Information Science, 2005, pp. 408-411.
28.Tsai, M.-J., Yu, K.-Y., and Chen, Y.-Z., “Joint wavelet and spatial trans- formation for digital watermarking,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, 2000, pp. 241-245.
29.Voyatzis, G. and Pitas, I., “Applications of toral automorphisms in image watermarking,” International Conference on Image Processing, Vol. 2, 1996, pp 237-240.
30.Wang, H.-J., and Jay Kuo, C.-C., Image protection via watermarking on perceptually signification wavelet coefficients,” IEEE Second Workshop on Multimedia Signal Processing, 1998, pp. 279-284.
31.Wang, Y.-L. and Pearmain, A., “Blind image data hiding based on self reference,” Pattern Recognition Letters, Vol. 25, No. 15, 2004, pp. 1681-1689.
32.Wang, Z., Shi, B., and Wang, N. “Robust watermarking algorithm using wavelet transform and HVS,” Journal of Huazhong University of Science and Technology, Vol. 35, No.1, 2007, pp.26-28.
33.Wu, G.-D. and Huang, P.-H., “Image Watermarking Using Structure Based Wavelet Tree Quantization,” IEEE/ ACIS International Conference on Computer and Information Science, 2007, pp. 315-319.
34.Zhang, F. and Zhang, H., “Image Digital Watermarking Capacity and Reliability Analysis in Wavelet Domain,” Institute of Electrical and Electronics Engineers Inc., Piscataway, NJ 08855-1331, United States 3, 2004, pp. 101-104.
35.Zhang, J., Kou, W., and Fan K., “Secure buyer-seller watermarking protocol,” IEE Proceedings: Information Security, Vol. 153, No.1, 2006, pp. 15-18.
36.Zhang, J. and Cui, L., “New robust digital watermark technique based on wavelet transform,” Journal of Information and Computational Science, Vol. 3, No. 1, 2006, pp. 137-142.
37.Zhou, C.-H., Kou, J.-S., and Li, M.-Q., “Digital image watermark detector design based on a distribution in DCT domain,” Guangdianzi Jiguang/Journal of Optoelectronics Laser, Vol. 18, No. 7, 2007, pp. 838-841.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊