跳到主要內容

臺灣博碩士論文加值系統

(18.204.48.64) 您好!臺灣時間:2021/08/03 13:26
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鄭至煒
研究生(外文):Cheng, Zhiwei
論文名稱:具備援概念影像有效竄改回復機制之研究
論文名稱(外文):Image Authentication and Recovery Scheme with Multiple Recovery Message Shares
指導教授:杜淑芬杜淑芬引用關係
指導教授(外文):Tu, Shufen
口試委員:謝文恭李惠明許慶昇
口試委員(外文):Shieh, WengongLee, HueymingHsu, Chingching
口試日期:2012-06-21
學位類別:碩士
校院名稱:中國文化大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:35
中文關鍵詞:易碎型浮水印竄改偵測影像回復秘密分享
外文關鍵詞:fragile digital watermarkingtamper detectionimage recoverysecret sharing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:112
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
易碎型浮水印是一種用於偵測影像竄改的技術,為了能還原遭受竄改的部份,有許多學者在竄改偵測的機制上,進一步加上修復竄改部位的方法。本研究應用秘密分享的概念,提出一套竄改影像復原機制,本研究將影像區塊的回復訊息分解成四份,分散地嵌入在不同的影像區塊中,若要回復遭受竄改的影像區塊,便取回此區塊回復訊息的期中三份,便可復原影像區塊。至於影像竄改偵測的部份,本研究引用Hsu and Tu 學者所提出的以機率理論為基礎的方法,該方法的偵測錯誤率較低,有利於回復效果的提升。
Fragile watermarking is a technique used to detect the image tampering. In order to fix the tamperd image, many researchers have added the image recovery in the detection function. This study applies the secret sharing scheme to split recovery message and suggests a series of image recovery control. It separates the recovery message into four shares. In order to recover tampered image, retrieve any three shares and then the tampered area can be fixed.
As to the image detection, this study employs the Hsu and Tu's method, which has a very law error rate and enhances the effect of the recovery.

中文摘要 ................... iii
英文摘要 ................... iv
誌謝辭 ....................v
內容目錄 ................... vi
表目錄 ....................viii
圖目錄 ....................xii
第一章 緒論..................1
第一節研究背影................2
第二節研究動機與目的.............2
第三節研究的限制...............3
第四節論文架構................3
第二章 文獻探討................5
第一節Shamir秘密分享機制 ...........5
第二節Lee和Lin學者方法............5
第三節Hsu與Tu 學者方法............12
第四節Wang 等學者的研究...........17
第三章 本研究方法 ..............19
第一節回復與驗證訊息的隱藏..........19
第二節竄改偵測與回復方式...........23
第四章 研究與實驗比較 ............28
第五章 結論..................35
參考文獻 ...................36

Chang, C., & Hwang, R. J. (1998). A simple picture hiding scheme. Computer processing of oriental languages, 12(2), 237-247.
Chang, C. C., Hu, Y. S., & Lu, T. C. (2006). A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters, 27(5), 439-446.
Chang, C. C., Fan, Y. H., Tai, W. L. (2008) For-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition , 41(2),654-661.
Chang, C. C., Lin, P. Y., & Yeh, J. S. (2009). Preserving robustness and removability for digital watermarks using subsampling and difference correlation. Information Sciences, 173(13), 2283-2293.
Goodrich, M. T., & Tamassia, R. (2006). Data structures and algorithms in JAVA, 4th ed., John Wiley and Sons Inc, NJ, 568.
Hsu, C. S., & Tu, S. F. (2010). Probability-based tampering detection scheme for digital images. Optics Communications, 283(3), 1737-1743.
Lin, P. L., Huang, P. W., & Peng, A. W. (2004). A fragile watermarking scheme for image authentication with localization and recovery, in: Ieee sixth international symposium on multimedia software engineering. Conference Publications, 13-15, 146-153.
Lin, P. L., Hsieh, C. K., & Huang, P. W. (2005). A hierarchiacal digital watermarking method for image tamper detection and recovery. Pattern Recognition, 38(12), 2519-2529.
Lee, T., & Lin, S. (2008). Dual watermark for image tamper detection and recovery. Pattern Recognition, 41(11), 3497-3506.
Qi, X., & Xin, X. (2011). A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image R, 22(2),187-200.
Shamir, A. (1979). How to share a secret. Communication of the ACM, 22, 612-613.
Wang, M. S., & Chen, W. C. (2007). A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces, 29(5), 561-570.
Wang, D. S., Li, J. P., & Wen, X. Y. (2008). Biometric image integrity authentication based on SVD and fragile watermarking. Congress on Image & Signal Processing, 5, 679-682.
Zhang, X., & Wang, S. (2009). Fragile watermarking scheme using a hierarchical mechanism. Signal Processing, 89(4), 675-679.
Zhang, X., Wang, S., Qian, Z., & Feng, G. (2010). Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Processing , 90(12), 3026-3036.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top