跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.171) 您好!臺灣時間:2024/12/02 04:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳佶鴻
研究生(外文):Ji-HongChen
論文名稱:基於浮水印特性之竄改影像檢測與復原
論文名稱(外文):Tampered Image Detection and Recovery Based on Watermarking
指導教授:陳進興陳進興引用關係
指導教授(外文):Chin-Hsing Chen
學位類別:博士
校院名稱:國立成功大學
系所名稱:電腦與通信工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:英文
論文頁數:100
中文關鍵詞:浮水印竄改影像檢測復原
外文關鍵詞:WatermarkingTampered imageDetectionRecovery
相關次數:
  • 被引用被引用:1
  • 點閱點閱:248
  • 評分評分:
  • 下載下載:9
  • 收藏至我的研究室書目清單書目收藏:1
近年隨著網路的蓬勃發展及電腦科技的進步,數位版權也日益重要。當遭到外力破壞,脆弱式浮水印即刻消失,而強健式浮水印則仍可取出可辨識的浮水印。本論文結合脆弱式浮水印及強健式浮水印的特點,提出三個竄改影像的檢測與復原的方法。
第一個方法將原始影像做離散小波轉換(Discrete Wavelet Transformation)後得到的低頻部分去除最低位元(LSB),再將之轉換為QR Code。QR Code具有25%的錯誤糾正能力,因此可以提高資訊的安全性。最後利用toral automorphism方法攪亂QR Code並將之藏入原始影像的頻域。此一作為大幅增加了藏匿資料的安全性。實驗結果證明,當浮水印影像遭到外力溫和破壞時本方法可檢測到被破壞的區域,而破壞嚴重時本方法則檢測出浮水印失效。實驗證明,Lena、Natural、Road、Mountain及Waterfall藏入檢測資料後,PSNR值分別為39.24 dB、39.36 dB、39.01 dB、39.36 dB及39.41 dB.
第二個方法,利用SPIHT(Set Partitioning in Hierarchical Tree)小波壓縮法壓縮影像的重要區域(Region of Importance)後,以toral automorphism方法將之藏入影像的剩餘不重要區域。此一作為大幅增加藏匿資料的安全性。實驗結果證明本方法可以還原被溫和竄改的重要區域,而在大幅破壞下,則檢測出不可信任影像。實驗證明,犯罪現場、蒙娜麗莎、F-16及藝術品藏入浮水印後,PSNR值分別為39.72 dB、40.03 dB、39.00 dB及39.13 dB。上述影像被竄改後,將其還原,PSNR值分別為37.91 dB、38.17 dB、38.34 dB及38.78 dB。使用Lee方法與本論文提出方法還原被竄改影像,PSNR值分別為36.39 dB與38.58 dB。
第三個方法將浮水印方法應用於身分識別,將影像重要資訊轉為QR Code後,將之印於影像右下角做為一可見式浮水印,以方便使用者利用手持裝置讀取之。另外,利用MCDMA(Modulation of the Code Division Multiple Access)與DSSS(Direct Sequence Spread Spectrum)法將同一QR Code轉化為位元流後隨機藏匿於影像中作為一不可見浮水印。如此作為大幅增加藏匿資料的安全性與強健性。實驗結果證明,利用手持設備或光學讀取器便可輕易讀取影像資訊,而當條碼受到外力破壞,利用此一方法便可將原始條碼恢復。實驗證明,經JPEG壓縮破壞後,本論文所提方法仍可以取出QR code並正確辨識出隱藏文字的訊息。Huang方法與我們所提方法得到的浮水印影像,其PSNR值分別為22.81 dB與39.91 dB。
本論文的浮水印技術,不單藏匿重要資訊,更利用其作破壞檢測與復原。本論文提出的方法可應用於犯罪現場證物保存(實驗一、實驗二)及醫學影像或藝術品資訊儲存(實驗三)。
In the recent years, as the internet flourishes and computer techniques progress, the digital copyright is increasingly important. A fragile watermark suffers slight attack, but a robust watermark can endure heavy damage. This thesis proposed three methods by combining fragile and robust watermarking features. In the first approach, the host image is first transformed by the use of the discrete wavelet transform (DWT). After discarding two least significant bits (LSB) the lower frequency part is transformed into a Quick Response code (QR code) with 25% error correction capacity. Finally, the QR code is embedded into the host image in the frequency domain by using toral automorphism to hash the discrete cosine transform (DCT) block. The experimental results show that if the attack is mild the tampered area of the watermarked image can be detected. But when serious damage occurs the watermarked image becomes invalid. The peak signal-to-noise ratios (PSNRs) of the Lena, Natural, Road, Mountain and Waterfall after watermarking are 39.24 dB, 39.36 dB, 39.01 dB, 39.36 dB and 39.41 dB, respectively.
In the second approach, the region of importance (ROI) of the host image is compressed by the use of set partitioning the in hierarchical tree (SPIHT) wavelet compression method. Then it is embedded into the remaining area of the host image in the frequency domain by troal automorphism. This way, the security of the watermarked image is increased. The experimental results show that the proposed method can detect and recover mild damages in the ROI area. But when serious damage occurs the watermarked image becomes invalid. The PSNRs of Crime scene, Mona Lisa, F-16 and Patting after watermarking are 39.72 dB, 40.03 dB, 39.00 dB and 39.13 dB, respectively. And the PSNRs of the images recovered from the tampered above-mentioned images are 37.91 dB, 38.17 dB, 38.34 dB and 38.78 dB, respectively. The PSNRs of the image recovered from the tampered images by using the Lee’s method and our proposed method are 36.39 dB and 38.58 dB, respectively.
In the third approach, we applied watermarking to identification recognition. The image's information is first transformed to a QR code and then visibly embedded in the corner of the host image so that, it can be easily extracted by mobile devices. Simultaneously, a same but invisible watermark is embedded in the host image by using code division multiple access and direct sequence spread spectrum techniques. Experimental results show that if the barcode has external damage the invisible watermark can be extracted and used to recover the damaged barcode. The simulation result proved the QR code extracted from JPEG attacked host images can still identify the text label. The PSNRs of the watermarked images using the Huang’s method and our proposed are 22.81 dB and 39.91 dB, respectively.
In this thesis, the watermark technique is not only used to hide secret information but also applied to tampered area detection and recovery. The three methods proposed in the thesis can be applied to anticounterfeiting for archives, digital right management and protection of crime scene photos, etc.
Abstract I
摘要 IV
誌謝 VI
Contents VII
List of Tables X
List of Figures XI
Chapter 1 Introduction 1
1.1. Motivation 1
1.2. Related Research 2
1.3. An Overview of the Thesis 4
1.4. Organization of the Thesis 5
Chapter 2 Technique and Applications of Image Processing 6
2.1. Introduction 6
2.2. Spatial Domain 8
2.3. Frequency Domain 8
2.3.1. Discrete Cosine Transformation 9
2.3.2. Discrete Wavelet Transformation 11
Chapter 3 Image Tamper Detection Scheme Using QR Code 15
3.1. Introduction 15
3.2. QR Code 16
3.2.1. Architecture of QR Code 16
3.2.2. QR Code Encoding 17
3.3. Embedding Algorithm 18
3.3.1. DWT and Thumbnail Selection 19
3.3.2. Removing of the QR Code’s Regular Area 20
3.3.3. Dimension Reduction of QR Code 21
3.3.4. Toral Automorphism and Block Selection 22
3.3.5. Coefficient Selection 23
3.3.6. Secret Bit Embedding 24
3.4. Tamper Detection Algorithm 25
3.4.1. Bitstream Extraction and Dimension Recovery 26
3.4.2. Inverse Toral Automorphism 27
3.4.3. Regular Area Padding of the QR code 27
3.4.4. Tamper Detection 28
3.5. Experimental Results 29
3.6. Summary 36
Chapter 4 Image Tamper Detection and Recovery Using SPIHT method 37
4.1. Introduction 37
4.2. Embedding Algorithm 38
4.2.1. Set Partitioning in Hierarchical Tree Compression 39
4.2.2. Region of Importance 42
4.2.3. Toral Automorphism 43
4.2.4. Block Selection of DCT 44
4.2.5. Secret Bits Embedding 45
4.3. Detection and Recovery Algorithm 46
4.3.1. Extracting the Bitstream 47
4.3.2. Set Partitioning in Hierarchical Tree Decompression 48
4.3.3. Inverse Toral Automorphism 48
4.3.4. Tamper Self-Detection and Self-Recovery 48
4.4. Experimental Results 51
4.5. Summary 59
Chapter 5 An Identification Recovery Scheme Using the QR Code 60
5.1. Introduction 60
5.2. Secret Data Embedding 61
5.2.1. Removing Regular Area of the QR Code 62
5.2.2. Direct Sequence Spread Spectrum 63
5.2.3. Modulation of the Modified Code Division Multiple Access 64
5.2.4. DCT and Block Selection 65
5.3. Detection and Recovery Process 67
5.3.1. Demodulation of the Modified Code Division Multiple Access 68
5.3.2. Inverse Direct Sequence Spread Spectrum 71
5.3.3. Regular Area Padding of the QR Code 71
5.3.4. Watermark Verification Process 72
5.4. Experimental Results 73
5.5. Summary 83
Chapter 6 Conclusion 84
References 86
List of Publications 99
[1]N. U. Ahmed, T. Natarajan and R. Kamisetty, “Discrete Cosine Transform, IEEE Trans. on Computers, Vol. C-23, No. 1, pp. 90-93, 1974.
[2]R. S. Alomari and A. Al-Jaber, “A Fragile Watermarking Algorithm for Content Authentication, International Journal of Computing & Information Sciences, Vol. 2, No. 1, pp. 27-37, 2005.
[3]Z. An and H. Liu, “Research on Digital Watermark Technology Based on LSB Algorithm, IEEE Conf. on Computational and Information Sciences, pp. 207-210, 2012.
[4]M. Antonin, M. Barlaud and I. Daubechies, “Image Coding Using Wavelet Transform, IEEE Trans. on Image Processing, Vol. 1, No. 2, pp. 205-220, 1992.
[5]M. Bahoura and J. Rouat, “Wavelet Speech Enhancement Based on Time–Scale Adaptation, Speech Communication, Vol. 48, No. 12, pp. 1620-1637, 2005.
[6]M. Bahoura and J. Rouat, “Wavelet Speech Enhancement Using the Teager Energy Operator, IEEE Signal Processing Letters, Vol. 8, No. 1, pp. 10-12, 2001.
[7]S. Benchikh and M. Corinthios, “Efficiency Evaluation of Different Wavelets for Image Compression, IEEE Conf. on Information Science, Signal Processing and their Applications, pp. 1420-1421, 2012.
[8]G. Bhatnagar, B. Raman and K. Swaminathan, “DWT-SVD Based Dual Watermark Scheme, IEEE Conf. on Applications of Digital Information and Web Technologies, pp. 526-531, 2008.
[9]A. Chammem, M. Mitrea and F. Prȇteux, “DWT-Based Stereoscopic Image Watermarking, Stereoscopic Displays and Applications, Vol. 7863, 786326-1-10, 2011.
[10]L. Chang, W. G. Yan and W. D. Wang, “Research on Robust Image Perceptual Hashing Technology Based on Discrete Cosine Transform, Business, Economics, Financial Sciences, and Management, Vol. 143, pp. 799-809, 2012.
[11]C. Charistopulos, A. Skodras and T. Ebrahimi, “The JPEG 2000 Still Image Coding System: An Overview, IEEE Trans. Consumer Electronics, Vol. 46, pp. 1103-1127, 2000.
[12]W. Y. Chen, “Color Image Steganography Scheme Using Set Partitioning In Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation, Applied Mathematics and Computation, Vol. 185, pp. 432-448, 2007.
[13]W. Y. Chen and C. H. Chen, “A Robust Watermarking Scheme Using Phase Shift Keying With the Combination of Amplitude Boost and Low Amplitude Block Selection, Pattern Recognition, Vol. 38, pp. 587-598, 2005.
[14]J. H. Chen and C. H. Chen, “A Watermarking Scheme Using Code Division Multiple Access and DWT, International Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 13-16, 2009.
[15]W. Y. Chen and C. H. Chen, “Robust Watermarking Scheme for Still Images Using Frequency Shift Keying High-Variance Block Selection, Optical Engineering, Vol. 42(6), pp. 1826-1835, 2003.
[16]J. H. Chen, C. H. Chen and W. Y. Chen, “A Steganography Technique Using Adaptive Phase Modulation, The 3rd Intelligent Living Technology Conference, pp. 783-790, 2008.
[17]J. H. Chen, C. H. Chen and W. Y. Chen, “A Watermarking Method for Still Images Using Modified Code Division Multiple Access, International Conf. on Intelligent Systems Design and Applications, pp. 352-357, 2008.
[18]W. Y. Chen, J. H. Chen and C. C. Liu, “Concealing Color Image Using Discrete Fourier Transform and Phase Modulation Technique, Artificial Intelligence and Application, 2005.
[19]W. Y. Chen, J. H. Chen and C. C. Liu, “Steganography Scheme for Color Image Using DWT and Set Partitioning in Hierarchical Trees Coding, Symposium on Application of Information, Management and Communication Technology, pp. 1-7, 2005.
[20]W. Y. Chen, J. H. Chen and C. C. Liu, “Watermarking Scheme for Still Image Using Modified Code Division Multiple Access Technique, Conf. on Computer Vision Graphic and Image Processing, pp. 1048-1056, 2005.
[21]S. Chen and H. Leung, “Chaotic Watermarking for Video Authentication in Surveillance Applications, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 18, No. 5, pp. 704-709, 2008.
[22]G. X. Chen, B. L. Tang, Q. F. Chen and J. L. Tai, “Research into Digital Watermark Algorithm Based on Wavelet Domain, Advanced Engineering Forum, Vol. 6-7, pp. 525-529, 2012.
[23]W. Y. Chen and J. W. Wang, “Nested Image Steganography Scheme Using QR-barcode Technique, Optical Engineering, Vol.48(5), pp. 057004-1-10, 2009.
[24]Z. Chen, Y. Zhang, C. Sun and W. Yang, “Fusing Discrete Cosine Transform and Multi-level Center-Symmetric Local Binary Pattern Features for Particular Recognition, Intelligent Science and Intelligent Data Engineering, Vol. 7751, pp. 810-816, 2013.
[25]M. Y. Cheng and J. C. Chen, “Integrating Barcode and GIS for Monitoring Construction Progress, Automation in Construction, Vol. 11, pp. 23-33, Jan., 2002.
[26]H. Chung, W. Y. Chen and C. M. Tu, “Image hidden technique using QR-barcode, IEEE Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 522-525, Sep., 2009.
[27]G. Coatrieux, L. Lecornu, C. Roux and B. Sankur, “A Review of Image Watermarking Application in Healthcare, Conf. on Engineering in Medicine and Biology, pp. 4691-4694, 2006.
[28]A. Collins, A. Zomorodian, G. Carlsson and L. J. Guibas, “A Barcode Shape Descriptor for Curve Point Cloud Data, Computer and Graphics, Vol. 28, pp. 881-894, 2004.
[29]M. U. Çelik, G. Sharma, E. Saber and A. M. Tekalp, “Hierarchal Watermarking for Secure Image Authentication with Localization, IEEE Trans. on Image Processing, Vol. 11, No. 6, pp. 585-595, 2002.
[30]I. Daubechies, “The Wavelet Transform, Time-Frequency Localization and Signal Analysis, IEEE Trans. on Information Theory, Vol. 36, pp. 961-1005, 1990.
[31]K. Deb, M. D. Al-Seraj, M. M. S. Kowsar and I. H. Strategic, “A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication, IEEE Proceedings International Forum on Strategic Technology, pp. 1-5, 2012.
[32]H. Demirel and G. Anbarjafari, “Image Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition, IEEE Trans. on Image Processing, Vol. 20, No. 5, pp. 1458-1460, 2011.
[33]H. Deng, L. Chen, J. Zhang and R. Wang, “A 3D Model Watermarking Algorithm Resistant to Affine Transformation, IEEE Conf. on Multimedia Information Networking and Security, pp. 549-551, 2012.
[34]S. Dogan, T. Tuncer, E. Avci and A. Gulten, “A New Watermarking System Based on Discrete Cosine Transform (DCT) in Color Biometric Images, Journal of Medical System, Vol. 36, No. 4, pp. 2379-2385, 2012.
[35]V. G. Efimov, J. N. Lozhkova and N. Mikhail, “The Program Complex Wavelet Processing of the Results Ultrasonic and Microwave Research of Power Plants, IEEE Conf. Micro/Nanotechnologies and Electron Devices, pp. 90-93, 2012.
[36]W. H. Fang, N. C. Hu and S. K. Shih, “Recursive Fast Computation of the Two-Dimensional Discrete Cosine Transform, IEEE Proc. on Vision, Image and Signal Processing, Vol. 146, No. 1, pp. 25-33, 1999.
[37]C. Fei, R. H. Kwong and D. Kundur, “A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication, IEEE Trans. on Information Forensics and Security, Vol. 4, No. 2, pp. 179-192, 2009.
[38]M. Fierro, H. Ha and Y. Ha, “Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage, IEEE Trans. on Image Processing, Vol. PP, No. 99, pp. 2-15, 2013.
[39]D. E. Gilsinn, G. S. Cheok and D. P. O’Leary, “Reconstructing Images of Bar Code for Construction Site Object Recognition, Automation in Construction, Vol. 13, pp. 21-35, 2004.
[40]J. H. Guo, “Wavelet Bookmark, Department of Mathematic National Central University.
[41]P. Hill, A. Achim and D. Bull, “The Undecimated Dual Tree Complex Wavelet Transform and Its Application to Bivariate Image Denoising Using A Cauchy Model, IEEE Conf. on Image Processing, pp. 1205-1208, 2012.
[42]G. Hospodar, I. Verbauwhede and J. G. R. C. Gomes, “Algorithms for Digital Image Steganography Via Statistical Restoration, IEEE Conf. on Symposium on Information Theory and Signal Processing in the Benelux, 2012.
[43]S. L. Hsieh, C.P. Yeh and I. J. Tsai, “An Image Copyright Protection Scheme with Tamper Detection Capability, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 342-349, 2009.
[44]W. C. Hu, W. H. Chen and C. Y. Yang, “Robust Image Watermarking Based on Discrete Wavelet Transform-Discrete Cosine Transform-Singular Value Decomposition, Journal of Electronic Imaging, Vol. 21, No. 3, pp. 033005-1-7, 2012.
[45]H. C. Huang, F. C. Chang and W. C. Fang, “Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications, IEEE Trans. on Consumer Electronics, Vol. 57, No. 2, pp. 779-787, 2011.
[46]X. Huang and B. Zhang, “Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks, IEEE Trans. on Information Forensics and Security, Vol. 2, pp. 1-13, 2007.
[47]J. In, S. Hsiarani and F. Kossentini, “On RD Optimized Progressive Image Coding Using JPEG, IEEE Trans. on Image Processing, Vol. 8, No. 11, pp. 1630-1638, 1999.
[48]V. Jeengar, S. N. Omkar, A. Singh, M. K. Yadav and S. Keshri, “A Review Comparison of Wavelet and Cosine Image Transforms, International Journal of Image, Graphics and Signal Processing, Vol. 4, No. 11, pp. 16-25, 2012.
[49]M. V. Joshi, B. Vaibhav and M. S. Raval, “Multilevel Semi-Fragile Watermarking Technique for Improving Biometric Fingerprint System Security, Intelligent Interactive Technologies and Multimedia, Vol. 276, pp. 272-283, 2013.
[50]T. W. Kan, C. H. Teng and W. S. Chou, “Applying QR Code in Augmented Reality Applications, Conf. on Virtual Reality Continuum and Application in Industry, pp. 253-257, 2009.
[51]X. Kang, R. Yang and J. W. Huang, “Geometric Invariant Audio Watermarking Based on an LCM Feature, IEEE Trans. on Multimedia, Vol. 13, No. 2, pp. 181-190, 2011.
[52]K. Khaldi and A. Boudraa, “Audio Watermarking Via EMD, IEEE Trans. on Audio, Speech, and Language, Vol. 21, No. 3, 2013.
[53]L. T. Ko, J. E. Chen, Y. S. Shieh and T. Y. Yun, “A Novel Fractional Discrete Cosine Transform Based Reversible Watermarking for Biomedical Image Applications, IEEE Conf. on Computer, Consumer and Control, pp. 36-39, 2012.
[54]S. Kornsing and J. Srinonchat, “Exploring Dynamic Time Warping Technique to Wavelet Speech Compression, IEEE Conf. on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pp. 1-4, 2012.
[55]D. Kunder and D. Hatzinakos, “Digital Watermarking for Tileable Tamper Proofing and Authentication, Journals & Magazines, Vol. 87, pp. 1167-1180, 1999.
[56]N. V. Lalitha, G. Suresh and P. Telagarapu, “Audio Authentication Using Arnold and Discrete Cosine Transform, IEEE Conf. on Computing, Electronics and Electrical Technologies, pp. 530-532, 2012.
[57]M. Lang, H. Guo, J. E. Odegard, C. S. Burrus and R.O. Wells, Nonlinear Processing of A Shift Invariant DWT for Noise Reduction, SPIE Conf. on Wavelet Applications, Vol. 2491, pp. 640-651, 1995.
[58]T. Y. Lee and S. D. Lin, “Dual Watermark for Image Tamper Detection and Recovery, Pattern Recognition, Vol. 41, pp. 3497-3506, 2008.
[59]Y. Lee, J. Nah and J. Kim, “Digital Image Watermarking Using Bidimensional Empirical Mode Decomposition in Wavelet Domain, International Symposium on Multimedia, pp. 583-588, 2009.
[60]C. Li, B. Ma, Y. Wang, D. Huang and Z. Zhang, “A Secure Semi-Fragile Self-Recoverable Watermarking Algorithm Using Group-Based Wavelet Quantization, Advances in Multimedia, Vol. 7674, pp. 327-336, 2012.
[61]P. L. Lin, C. K. Hsieh and P. W. Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery, Pattern Recognition, Vol. 38, pp. 2519-2529, 2005.
[62]S. D. Lin and Y. H. Huang, “An Integrated Watermarking Technique with Tamper Detection and Recovery, International Journal of Innovative Computer, Information and Control, Vol. 5, No. 11(B), pp. 4309-4316, 2009.
[63]S. D. Lin, Y. Kuo and M. Yao, “An Image Watermarking Scheme with Tamper Detection and Recovery, International Journal of Innovative Computer, Information and Control, Vol. 13, No. 6(A), pp. 1379-1387, 2007.
[64]S. D. Lin, J. H. Lin and C. Y. Chen, “A ROI-Base Semi-Fragile Watermarking for Image Tamper Detection and Recovery, International Journal of Innovative Computer, Information and Control, Vol. 7, No. 12, pp. 6875-6888, 2011.
[65]T. Y. Liu, T. H. Tan and Y. L. Chu, “2D Barcode and Augmented Reality Supported English Learning System, IEEE Conf. on Computer and Information Science, Vol. 6, pp. 5-10, 2007.
[66]N. S. Liu, G. H. Yang, D. H. Guo and L. L. Cheng, “A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences, IEEE Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 994-998, 2008.
[67]S. Liu, H. Yao and W. Gao, “Steganalysis of Data Hiding Techniques in Wavelet Domain, Conf. on Information Technology: Coding and Computing, pp. 1-4, 2004.
[68]K. Maeno, Q. Sun, S. F. Chang and M. Suto, “New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Nonuniform Quantization, IEEE Trans. on Multimedia, Vol. 8, pp. 32-45, 2006.
[69]D. Munoz-Mejias, I. Gonzalez-Diaz and F. Diaz-de-Maria, “A Low-Complexity Pre-Processing System for Restoring Low-Quality QR Code Images, IEEE Trans. On Consumer Electronics, Vol. 57, pp. 1320-1328, 2011.
[70]N. T. Noore and M. M. Houck, “Embedding Biometric Identifiers in 2D Barcode for Improved Security, Computer and Security, Vol. 23, pp. 679-686, 2004.
[71]K. Pal, G. Ghosh and M. Bhattacharya, “A Comparative Study between LSB and Modified Bit Replacement (MBR) Watermarking Technique in Spatial Domain for Biomedical Security, International Journal of Computer Applications Technology Research, Vol. 1, No. 1, pp. 30-39, 2012.
[72]S. Palmer, J. Zhang and X. Wang, “New Methods For Objective Evaluation of Fabric Pilling by Frequency Domain Image Processing, Research Journal of Textile and Apparel, Vol. 13, No. 1, pp. 11-23, 2009.
[73]B. Patra and J. C. Patra, “CRT-Based Fragile Self-Recovery Watermarking Scheme for Image Authentication and Recovery, IEEE Conf. on Intelligent Signal Processing and Communication System, pp. 430-435, 2012.
[74]L. Pesquer, X. Pons, A. Cortés and I. Serral, “Spatial Pattern Alterations from JPEG2000 Lossy Compression of Remote Sensing Images: Massive Variogram Analysis In High Performance Computing, Journal of Applied Remote Sensing, Vol. 7, No. 1, pp. 073595-1-19, 2012.
[75]QR-Codes, “Information Technology. Automatic Identification and Data Capture Techniques. QR Code 2005 Bar Code Symbology Specification, ISO/IEC 18004:2006, ISBN 978-0-580-67368-9, Apr., 2007.
[76]S. Qiang and Z. Hongbin, “Image Tamper Detection and Recovery Using Dual Watermark, Conf. on Wireless Communications Networking and Mobile Computing, pp. 1-4, 2010.
[77]S. Qiao, M. Torkamani-Azar and K. Yoshida, “Stationary Wavelet Transform and Higher Order Statistical Analyses of Intrafascicular Nerve Recordings, Journal of Neural Engineering, Vol. 9, No. 5, pp. 056014-1-11, 2012.
[78]A. Rani, B. Raman and S. Kumar, “A Fragile Watermarking Scheme Exploiting Neural Tree for Image Tamper Detection, Conf. on Soft Computing for Problem Solving, Vol. 2, pp. 547-554, 2012.
[79]A. Sad and W. A. Pearlman, “A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees, IEEE Trans. on Circuit and Systems for video Technology, Vol. 6, No. 3, pp.243-250, 1996.
[80]I. W. Selesnick, R. G. Baraniuk and N. G. Kingsbury, “The Dual-Tree Complex Wavelet Transform, IEEE Trans. on Signal Processing Magazine, Vol. 22, No.6, pp. 123-151, 2005.
[81]F. Sepehrband, M. Mortazavi and S. Ghorshi, “An Efficient Lossless Medical Image Transformation Method By Improving Prediction Model, IEEE Conf. on Signal Processing, pp. 728-731, 2010.
[82]S. Shanmugasundaram, D. Chidambaram and B. E. Park, “Face Recognition Using Dual Tree Complex Wavelet Transform, Conf. on Informatics and Applications, pp. 58-70, 2012.
[83]J. W. Shen, F. Pan and Y. Guo, “Digital Audio Watermark Sharing Based on the Chinese Remainder Theorem, IEEE Conf. on Image and Signal Processing, pp. 572-576, 2012.
[84]A. V. Subramanyam, S. Emmanuel and M. S. Kankanhalli, “Robust Watermarking of Compressed and Encrypted JPEG2000 Images, IEEE Trans. on Multimedia, Vol. 14, No. 3, pp. 703-716, 2012.
[85]S. C. Tamane and R. R. Deshmukh, “Blind 3D Model Watermarking Based on Multi-Resolution Representation and Fuzzy Logic, International Journal of Computer Science & Information Technology, Vol. 4, No. 1, 2012.
[86]C. H. Teng, “Developing QR Code Based Augmented Reality Using SIFT Features, Conf. on This paper appears in: Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing, pp. 985-990, 2012.
[87]N. Terzija and W. Geisselhardt, “Digital Image Watermarking Using Complex Wavelet Transform, Conf. on Multimedia and Security, pp. 193-198, 2004.
[88]C. C. C. Tseng and S. C. Cheng, “Digital Color Image Sharpening Using Fractional Differentiation and Discrete Cosine Transform, IEEE Conf. on Communications and Information Technologies, pp. 181-186, 2012.
[89]A. Turlikov, M. Gilmutdinov and A. Veselov, “Detecting Artifacts in Quantization Noise in Images Compresses Using Discrete Cosine Transforms, United States Patent Application, No.US20120236932, 2012.
[90]B. Vasic, “Increasing 3D Mesh Watermark Robustness to Affine Transformations Using Barycenter as Spherical Coordinate Origin, ETRAN, TE1.3-1-4, 2012.
[91]G. Voyatzis and I. Pitas, “Application of Toral Automorphism in Image Watermarking, IEEE Conf. on Image Processing, Vol. 3, pp. 237-240, 1996.
[92]X. Wang and B. Hao, “Applying Blocking and Frame Grouping to Design a Robust Imperceptible Video Watermark, Intelligent Computing Theories and Applications, Vol. 7390, pp. 593-600, 2012.
[93]H. J. Wang and C. C. J. Huo, “A Multi-Threshold Wavelet Coder (MTWC) for High Fidelity Image Compression, IEEE Conf. on Image Processing, Vol. 1, pp. 652-655, 1997.
[94]Y. Wang and M. Vilermo, “The Modify Discrete Cosine Transform: Its Implication for Audio Coding and Error Concealment, Journal of Audio Engineering Society, Vol. 51, No. 1, pp. 52-61, 2003.
[95]C. W. Wu, D. Coppersmith, F. C. Mintzer, C. P. Tresser and M. M. Yeung, “Fragile Imperceptible Digital Watermark with Privacy Control, SPIE Security Watermarking Multimedia Contents, Vol. 3657, pp. 79-84, 1999.
[96]Y. Xiang, I. Natgunanathan, D. Peng and W. Zhou, “A Dual-Channel Time-Spread Echo Method for Audio Watermarking, IEEE Trans. on Information Forensics and Security, Vol. 7, No. 2, pp. 383-392, 2012.
[97]H. Y. Yang, D. W. Bao, X. Y. Wang and P. P. Niu, “A Robust Content Based Audio Watermarking Using UDWT And Invariant Histogram, Multimedia Tools and Applications, Vol. 57, No. 3, pp. 453-476, 2012.
[98]C. Z. Yang, L. F. Liao, X. S. Zheng, Y. L. Zhao and G. Q. Liu, “A New Video Watermark Algorithm Based on Property of the Video, Advanced Materials Research, Vol. 532-533, pp. 1399-1402, 2012.
[99]H. Yang and A. C. C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication by Connectivity, IEEE Trans. on Multimedia, Vol. 9, No. 3, pp. 475-486, 2007.
[100]G. J. Yu, C. S. Lu and H. Y. M. Liao, “Mean Quantization-Based Fragile Watermarking for Image Authentication, Optical Engineering, Vol. 40(7), pp. 1396-1408, 2001.
[101]O. Yun, X. Min, Y. Li and L. Xunting, “Advances in Printing and Packaging Technologies, Applied Mechanics and Materials, Vol. 262, pp. 181-185, 2012.
[102]X. Zhang, Z. Qian, Y. Ren and G. Feng, “Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on Information Forensics and Security, Vol. 6, No. 4, pp. 1223-1232, 2011.
[103]T. Zhao, T. Chen, J. Xu, T. Wang and W. Shi, “Multiple Blind Watermark Algorithm Based on Wavelet Packet Transform and Two-dimensional Chaos Scramble, Advanced Materials Research, Vol. 532-533, pp. 1846-1850, 2012.
[104]J. M. Zhong, C. H. Leung and Y. Y. Tang, “Wavelet Image Coding Based on Significance Extraction Using Morphological Operation, IEEE Trans. on Image and Signal Processing, Vol. 146, No. 4, pp. 206-210, 1999.
[105]A. Zigomitros and C. Patsakis, “Cross Format Embedding of Metadata in Images Using QR Codes, Conf. on Intelligent Interactive Multimedia Systems and Services, pp. 113-121, 2011.
[106]D. Zou, Y. Q. Shi, Z. Ni and W. Su, “A Semi-Fragile Lossless Digital Watermarking Scheme Based Integer Wavelet Transform, IEEE Trans. on Circuits and system for Video Technology, Vol. 16, pp. 1294-1300, 2006.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top