跳到主要內容

臺灣博碩士論文加值系統

(3.236.110.106) 您好!臺灣時間:2021/07/29 16:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳奕穎
研究生(外文):Chen,IYing
論文名稱:針對半色調影像之脆弱式浮水印
論文名稱(外文):Fragile Watermarking on Halftone Image
指導教授:連國珍連國珍引用關係
指導教授(外文):Lien,KuoJen
口試委員:郭斯彥許威烈連國珍
口試委員(外文):Kuo,SyYenHsu,WeiLiehLien,KuoJen
口試日期:2012-07-23
學位類別:碩士
校院名稱:輔仁大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:58
中文關鍵詞:半色調脆弱式浮水印影像驗證竄改偵測竄改定位
外文關鍵詞:HalftoneFragile watermarkingImage authenticationTamper detectionTamper location
相關次數:
  • 被引用被引用:0
  • 點閱點閱:164
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本篇論文將會提出一種針對半色調影像的脆弱式浮水印應用,用於驗證半色調影像是否遭受竄改,更進一步可以定位出被竄改的群組位置。
論文中首先將會比較Data Hiding by Smart Pair Toggling - Connection Selection (DHSPT-CS)以及Data Hiding Look Forward Search(DHLFS)兩種浮水印嵌入方法。接著將會使用DHLFS來當作浮水印嵌入的基礎,並設計出新的分群分組方法。
藉著分組完後的群組,把前一個群組搭配秘密金鑰進行雜湊編碼後產生浮水印,接著將浮水印嵌入至下一個群組之中,直到所有區塊皆被嵌入完畢即完成嵌入動作。
然而在驗證的部份,是將所有群組中的區塊利用奇偶對判斷,取出嵌入的浮水印資訊,接著在計算出所有群組的雜湊編碼。最後比較雜湊碼以及浮水印即可得知影像是否遭受到竄改,並且可以提供改定位的功能。

This thesis proposes a fragile watermarking on halftone image to verify if the halftone image was tampered or not, and to locate the tampered positions.
First, we compare two data hiding methods, Data Hiding by Smart Pair Toggling - Connection Selection (DHSPT-CS) and Data Hiding Look Forward Search (DHLFS). DHLFS shows a better performance than DHSPT-CS. Therefore, we design a new fragile watermarking method using DHLFS.
In this fragile watermarking method, we first partition the image into groups with secret key, and then embed the hashing code of a group into the next group as watermarking. The process will finish till all of the groups are embedded.
In the validation section, we extract the embedded watermark by even-odd parity on the blocks in all groups and calculate the hash code of all the groups. Finally, we compare the hash code and the watermark to verify whether an image was tampered or not, and provide the information of tempered locations.

附表目錄 LIST OF TABLE v
附圖目錄 LIST OF FIGURES vii
第一章 簡介Introduction 1
第二章 相關研究探討 Related Works Review 4
第一節 資料隱藏技術 4
第二節 脆弱式浮水印 8
第三章 前置作業Preliminary Work 10
第一節 浮水印嵌入技術簡介 10
第一項 連結度積分 10
第二項 DHSPT-CS 12
第四章 研究方法Proposed Method 16
第一節 Data Hiding Look Forward Search 16
第一項 浮水印嵌入 16
第二項 浮水印萃取 22
第三項 DHSPT-CS與 DHLFS比較 23
第二節 Fragile Watermarking Using DHLFS 28
第一項 影像分群分組 28
第二項 浮水印嵌入 29
第三項 萃取浮水印演算法步驟及流程 31
第四項 竄改點偵測及定位 32
第五章 實驗結果Experimental Results 34
第六章 結論Conclusion 40
參考文獻 References 42
附錄Ⅰ AppendixⅠ 45
附錄Ⅱ Appendix Ⅱ 53

[1]T. S. Chen, J. Chen and Y. M. Pan, "A new detection method of halftone images based on crisscross checking technique," in Multimedia Software Engineering, 2003. Proceedings. Fifth International Symposium on, 2003, pp. 94-101.
[2]I. Cox, M. Miller, J. Bloom and C. Honsinger, "Digital watermarking," Journal of Electronic Imaging, vol. 11, pp. 414, 2002.
[3]M. S. Fu and O. C. Au, "Data hiding watermarking for halftone images," Image Processing, IEEE Transactions on, vol. 11, pp. 477-484, 2002.
[4]M. S. Fu and O. C. Au, "Halftone image data hiding with intensity selection and connection selection," Signal Process Image Communication, vol. 16, pp. 909-930, 2001.
[5]J. M. Guo, S. C. Pei and H. Lee, "Watermarking in halftone images with parity-matched error diffusion," Signal Process, vol. 91, pp. 126-135, 2011.
[6]H. Kim and R. de Queiroz, "Alteration-locating authentication watermarking for binary images," Digital Watermarking, pp. 125-136, 2005.
[7]H. Y. Kim, "A new public-key authentication watermarking for binary document images resistant to parity attacks," in Image Processing, 2005. ICIP 2005. IEEE International Conference on, 2005, pp. II-1074-7.
[8]H. Y. Kim, S. V. G. Pamboukian and S. S. L. M. Barreto,“Authentication Watermarking for Binary Images,” in Multimedia Forensics and Security, C.-T. Li, Editor, IGI Global. April 2008.
[9]W. C. Ku, T. C. Chou, H. L. Wu and J. C. Chang, "A fragile watermarking scheme for image authentication with tamper detection and localization," in Genetic and Evolutionary Computing (ICGEC), 2010 Fourth International Conference on, 2010, pp. 638-641.
[10]T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, pp. 3497-3506, 2008.
[11]B. K. Lien, "Robust data hiding by hilbert curve decomposition," in Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth International Conference on, 2009, pp. 937-940.
[12]N. Maxemchuk and S. Low, "Marking text documents," in Proceedings of the 1997 International Conference on Image Processing (ICIP'97), 1997, pp. 13.
[13]B. Moon, H. V. Jagadish, C. Faloutsos and J. H. Saltz, "Analysis of the clustering properties of the Hilbert space-filling curve," Knowledge and Data Engineering, IEEE Transactions on, vol. 13, pp. 124-141, 2001.
[14]J. S. Pan, H. Luo and Z. M. Lu, "A lossless watermarking scheme for halftone image authentication," International Journal of Computer Science and Network Security, vol. 6, pp. 147-151, 2006.
[15]S. C. Pei, J. M. Guo and H. Lee, "Novel robust watermarking technique in dithering halftone images," Signal Processing Letters, IEEE, vol. 12, pp. 333-336, 2005.
[16]F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, vol. 87, pp. 1062-1078, 1999.
[17]A. Rani, B. Raman and S. Kumar, "A fragile watermarking scheme exploiting neural tree for image tamper detection," in Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2012, pp. 547-554.
[18]C. Sharma and D. Prashar, "Visible and Invisible Watermarking Methods for Quality loss of data," International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), vol. 1, pp. pp: 57-63, 2012.
[19]M. A. Soni, S. P. Metkar and P. U. Lande, "Blind and invisible watermarking techniquies for color images," Thinkquest~ 2010, pp. 227-233, 2011.
[20]Y. C. Tseng, Y. Y. Chen and H. K. Pan, "A secure data hiding scheme for binary images," Communications, IEEE Transactions on, vol. 50, pp. 1227-1231, 2002.
[21]P. W. Wong and N. D. Memon, "Image processing for halftones," Signal Processing Magazine, IEEE, vol. 20, pp. 59-70, 2003.
[22]M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," Multimedia, IEEE Transactions on, vol. 6, pp. 528-538, 2004.
[23]M. Wu, E. Tang and B. Lin, "Data hiding in digital binary image," in Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on, 2000, pp. 393-396 vol. 1.
[24]H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier," Signal Processing Letters, IEEE, vol. 13, pp. 741-744, 2006.
[25]M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Image Processing, 1997. Proceedings., International Conference on, 1997, pp. 680-683 vol. 2.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top