(3.238.174.50) 您好!臺灣時間:2021/04/17 03:34
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:尤靜怡
研究生(外文):Ching-I Yu
論文名稱:隨機點立體圖應用於影像資料隱藏之研究
論文名稱(外文):One Innovative Method for Data Hiding Based on Single Image Random Dot Stereogram
指導教授:陳偉銘陳偉銘引用關係
指導教授(外文):Wei-Ming Chen
口試委員:黃德成黃于飛康立威陳敦裕孫士韋
口試委員(外文):De-Cheng HuangYu-Fei HuangLi-Wei KangDun-Yu ChenShi-Wei Sun
口試日期:2013-07-23
學位類別:碩士
校院名稱:國立宜蘭大學
系所名稱:多媒體網路通訊數位學習碩士在職專班
學門:電算機學門
學類:網路學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:58
中文關鍵詞:隨機點立體圖資訊隱藏浮水印
外文關鍵詞:single image random dot stereogramSIRDSinformation hidingwatermark
相關次數:
  • 被引用被引用:0
  • 點閱點閱:152
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:26
  • 收藏至我的研究室書目清單書目收藏:0
近十幾年來,因為電腦和網路的普及,數位資料漸漸被廣泛使用,所以也產生了許多數位資料的保護問題,許多相關的研究也一再被提出、改進。另外,在提倡智慧財產權的時代,任何創作都應被十分重視,而隨著科技日新月異,數位資料更是被大量使用,例如文字、語音、影片、影像等,其中,圖像創作更是大量趨於電子化,如此一來對於智慧財產權的宣告也將變得困難。有鑑於此,本論文將使用一種新的方式,將把浮水印結合隨機點立體圖,產生不同於以往的資料隱藏方式。
實驗結果也證明,由於我們可以使用肉眼直接辨識隨機點立體圖所內藏的浮水印,所以即使圖像受到破壞,仍然可以輕易的辨識出隱藏資訊。當然,希望在將來能夠有更深一步的發展,例如達到可逆式的資料隱藏、與影像處理軟體結合等,讓這種新型態的浮水印有更大的發揮。
Over the last decade, because of the popularity of computers and networks, digital data has gradually been widely used and it also generated a lot of digital data protection issues and many related studies have also repeatedly been proposed to improve. In addition, to promote intellectual property rights era, any creation are important. We should be very serious. Following technology advances, the digital data is to be widely used. Such as text, voice, video, image, etc., in which a large number of image creation is increasingly in electronic form. Then, this way for the declaration of intellectual property rights will become difficult. Therefore, this paper will use a new approach and the watermark will combine single image random dot stereogram, producing different from the previous data hiding method.
The experimental results also proved that, because we can use the naked eye direct identification of the built-in watermark, even if the image is damaged, we can still easily identify the hidden information. Certainly, we hope to have deeper and deeper development in the future. For example to achieve reversible data hiding, combined with image processing software and so on. So this new type of watermark will have greater effect.
摘要 i
Abstract ii
目錄 iii
圖目錄 vi
第一章 緒論 1
1.1 研究動機 1
1.2 研究目的 1
1.3 研究方法 2
1.4 論文架構 2
第二章 文獻探討 3
2.1影像處理 3
2.2 資訊隱藏 3
2.3 影像隱藏 4
2.4 可逆式資訊隱藏 5
2.5 浮水印 7
2.6 資訊隱藏的技術 9
2.6.1 空間域 10
2.6.2 頻率域 10
2.7 立體視覺 11
2.7.1 產生深度感的因素 11
2.7.2 產生深度感的形式 13
2.8 單幅隨機點立體圖 14
第三章 研究方法 18
3.1取得隨機點立體圖的基圖 22
3.2 隨機點立體圖的形成 23
3.3 偽裝影像 25
3.4 解密 26
第四章 實驗結果 28
4.1 實驗環境 28
4.2 實驗流程 28
4.3 實驗結果 30
4.3.1 實驗一 31
4.3.2 實驗二 39
4.3.3 實驗三 47
第五章 結論與未來展望 56
5.1 結論 56
5.2 未來展望 56
參考文獻 57
[1] F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information hiding – a survey”, Proceedings of the IEEE, Vol. 87, pp. 1062–1078, July 1999.
[2] M. Wu and B. Liu, “Watermarking for Image Authentication”, IEEE Conference, pp. 437-441, 1998.
[3] M. D. Swanson, M. Kobayashi and A.H. Tewfik, “Multimedia data-embedding and watermarking techniques,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064-1087, June 1998.
[4] F. Hartung, M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
[5] 陳文淵與卓江南, “資訊隱藏技術之研究”, 勤益學報第21卷第一期, 2003.
[6] C. C. Chang, and W. C. Wu, “A novel data hiding scheme for keeping high stego-image quality,” Proceedings of the 12th International Conference on Multi-Media Modelling (MMM 2006), Beijing China, pp. 225-232, 2006.
[7] 吳汶涓, “可逆式資訊隱藏技術之發展趨勢”, Communications of the CCISA Vol. 18
No. 4 Oct. 2012.
[8] 劉榮政, “平面螢幕之立體影像設計”, 國立中央大學光電科學研究所碩士論文, 2001.
[9] 網址: http://digilander.libero.it/bigfaber/stereo/faq.html, Jan, 2013.
[10] 吳文和, “隨機點立體成像技術及其應用於光柵板立體印刷之研究”, 世新大學圖文傳播暨數位出版學系碩士論文, 2005.
[11] S. Walton, “Information authentication for a slippery new age,” Dr. Dobbs Journal, Vol.20, pp. 18-26, 1995.
[12] A.M. Alattar, “Reversible watermarking using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156, 2004.
[13] O.M. Al-Qershi and B.E. Khoo, “High capacity data hiding schemes for medical images based on difference expansion,” Journal of Systems and Software, Vol. 84, No. 1, pp.105-112, 2011.
[14] K.L. Chung, Y.H. Huang, W.M. Yan, and W.C. Teng, “Distortion reduction for histogram modification-based reversible data hiding,” Applied Mathematics and Computation, Vol.218, No. 9, pp. 5819-5826, 2012.
[15] M. Fallahpour, and M.H. Sedaaghi, “High capacity lossless data hiding based on
histogram modification,” IEICE Electronics Express, Vol. 4, pp. 205-210, 2007.
[16] Celik, M. U., Sharma, G., Tekalp, A. M. and Saber, E., “Reversible Data Hiding,” Proceedings of IEEE International Conference on Image Processing, Vol. 11, pp. 157-160, 2002.
[17] S. K. Yip, O. C. Au, H. M. Wong, and C. W. Ho, “Generalized Lossless Data Hiding by Multiple Predictors,” ISCAS 2006, pp.21-24,2006.
[18] H.C. Wu, C.C. Lee, C.S. Tsai, Y.P. Chu, and H.R. Chen, “A high capacity reversible data hiding scheme with edge prediction and difference expansion,” Journal of Systems and Software, Vol. 82, No. 12, pp. 1966-1973, 2009.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔