跳到主要內容

臺灣博碩士論文加值系統

(44.200.82.149) 您好!臺灣時間:2023/06/05 12:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:白國宏
研究生(外文):Kuo-Hong Pai
論文名稱:使用量化索引調變之JPEG影像的半易碎浮水印機制
論文名稱(外文):A Semi-Fragile Watermarking Scheme for JPEG Images Using Quantization Index Modulation
指導教授:謝尚琳謝尚琳引用關係
指導教授(外文):Shang-Lin Hsieh
口試委員:謝尚琳
口試委員(外文):Shang-Lin Hsieh
口試日期:2014-07-31
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:105
中文關鍵詞:量化索引調變JPEG壓縮半易碎型浮水印竄改偵測
外文關鍵詞:Quantization Index ModulationJPEG CompressionSemi-fragile WatermarkingTamper Detection
相關次數:
  • 被引用被引用:0
  • 點閱點閱:192
  • 評分評分:
  • 下載下載:13
  • 收藏至我的研究室書目清單書目收藏:0
現今的影像透過網路傳送時,如果被有心人士截取,並透過影像處理修改,則不易透過肉眼察覺。另外,為了讓傳送更加快速,通常會將影像先經過壓縮處理以減少傳輸資訊,如:JPEG壓縮。本論文提出一個影像竄改偵測的半易碎浮水印機制,即使經過JPEG壓縮也可以找出影像遭竄改的位置。
本機制包含兩個階段,分別為浮水印嵌入階段及影像完整性驗證階段。嵌入浮水印階段是使用一個改良型的量化索引調變,用相對值的方式修改量化索引的值,有別於傳統是以絕對值的方式修改。相對值的修改方式可以增加浮水印的強度,因此能抵抗JPEG壓縮所造成的破壞,而取出的浮水印幾乎沒有雜訊。在影像完整性驗證階段,先前被嵌入的浮水印與原來的浮水印兩者會被比較以找出差異,此即被竄改的區域。由於未竄改影像的雜訊分布較為分散,而遭竄改影像較為集中,因此會針對不同性質的比對結果做不一樣的雜訊處理以提升竄改偵測的驗證率及準確率。
實驗結果證明,相較於其他人的方法,本論文提出的方法所取出的浮水印完整性較高,再次JPEG壓縮的偵測結果其平均誤判率較低,竄改偵測結果的驗證率和準確率也較高。
Digital images being transferred over the Internet can be intercepted and modified without any noticeable difference. Moreover, in order to transfer images faster on the network, people usually compress images in JPEG formats to reduce the image sizes before transmission. This thesis presents a semi-fragile watermarking scheme that can locate the tampered areas on JPEG compressed images.
The proposed scheme includes two phases, one is watermarked image generation phase and the other is integrity verification phase. In the watermarked image generation phase, the scheme embeds the watermark by modifying the relative value with the Quantization Index Modulation. The difference between the relative value modification and the traditional modification is that the former can increase the robustness to resist the JPEG compression and reduce noise. In the integrity verification phase, the previously embedded watermark and the original watermark are compared, and the differences, which indicate the tampered areas, are obtained. Because the non-tampered image has lower noise density than tampered image, the recall rate and precision rate of the tamper detection can be increased with different noise processing.
The experimental results show that, as compared to other methods, the proposed scheme can retrieve the watermarks with high integrity, process the JPEG compressed images with low misjudgment, and detect the tampered areas with high recall rates and precision rates.
誌謝 i
摘要 ii
ABSTRACT iii
目錄 iv
圖目錄 vii
表目錄 ix
附表目錄 x
第一章 介紹 1
1.1 背景 1
1.2 動機 3
1.3 目標 5
1.4 論文架構 6
第二章 相關背景 8
2.1 離散餘弦轉換(DCT) 8
2.2 量化索引調變(Quantization Index Modulation, QIM) 9
2.3 中值濾波器(Median Filter) 9
2.4 侵蝕(Erosion) 10
2.5 膨脹(Dilation) 10
第三章 JPEG影像竄改偵測機制的架構與設計 11
3.1 影像浮水印嵌入階段 12
3.1.1 影像浮水印嵌入演算法 21
3.2 影像完整性驗證階段 21
3.2.1 影像完整性驗證演算法 23
第四章 實驗結果分析與討論 25
4.1 JPEG影像的竄改偵測結果 26
4.1.1 分析實驗數據 26
4.1.2 竄改偵測結果 27
4.2 再次JPEG壓縮的竄改偵測結果 27
4.2.1 分析實驗數據 28
4.2.2 竄改偵測結果 28
4.3 JPEG影像遭竄改的竄改偵測結果 29
4.3.1 分析實驗數據 30
4.3.2 竄改偵測結果 30
4.4 嵌入浮水印的影像品質 33
4.5 探討浮水印失真原因 35
4.5.1 影像性質 35
4.5.2 JPEG壓縮順序 35
4.5.3 量化値 36
第五章 結論與未來方向 38
5.1 結論 38
5.2 未來方向 38
參考文獻 40
附錄 一 44
附錄 二 56
附錄 三 68
附錄 四 80
[1] P. Mitra and R. Gunjan, “A Statistical Property Based Image Watermarking Using Permutation and CT-QR,” International Conference on Computer Communication and Informatics (ICCCI), pp. 1-6, 2013.
[2] N. Dey, P. Maji, P. Das, S. Biswas, A. Das, and S. S. Chaudhui, “An Edge Based Blind Watermarking Technique of Medical Images Without Devalorizing Diagnostic Parameters,” International Conference on Advances in Technology and Engineering (ICATE), pp. 1-5, 2013.
[3] M. K. Dutta, A. Singh, and T. A. Zia, “An Efficient and Secure Digital Image Watermarking Using Features From Iris Image,” International Conference on Control Communication and Computing (ICCC), pp. 451-456, 2013.
[4] Y. Wang, X. Bai, and S. Yan, “Digital Image Watermarking Based on Texture Block and Edge Detection in the Discrete Wavelet Domain,” International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS), pp. 170-174, 2013.
[5] V. C. Prasad and S. Maheswari, “Robust Watermarking of AES Encrypted Images for DRM Systems,” International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), pp. 189-193, 2013.
[6] J. J. Shen and K. T. Liu, “A Novel Approach by Applying Image Authentication Technique on a Digital Document,” International Symposium on Computer, Consumer and Control (IS3C), pp. 119-122, 2014..
[7] C. H. Chen, Y. L. Tang, and W. S. Hsieh, “Color Image Authentication and Recovery via Adaptive Encoding,” International Symposium on Computer, Consumer and Control (IS3C), pp. 272-275, 2014.
[8] C. M. Wu, “Multi-level Tamper Detection and Recovery with Tamper Type Identification,” The 20th IEEE International Conference on Image Processing (ICIP), pp. 4512-4516, 2013.
[9] T. Jassim, R. Abd-Alhameed, and H. Al-Ahmad, “A New Robust and Fragile Watermarking Scheme for Images Captured by Mobile Phone Cameras,” The 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 1-5, 2013.
[10] X. Qi, and Y. Liu, “Cloud Model Based Zero-watermarking Algorithm for Authentication of Text Document,” The 9th International Conference on Computational Intelligence and Security (CIS), pp. 712-715, 2013.
[11] Y. Huo, H. He, and F. Chen, “Semi-fragile Watermarking Scheme with Discriminating General Tampering from Collage Attack,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), pp. 1-6, 2013.
[12] N. V. Dharwadkar and B. B. Amberker, “An Adaptive Gray-Scale Image Watermarking Scheme Using Smooth and Edge Areas of an Image,” International Conference on Intelligent Systems and Signal Processing (ISSP), pp. 66-71, 2013.
[13] D. A. Zende and M. K. Chavan, “Binary Image Authentication Using Zig-zag Ordering of Watermark,” International Conference on Advances in Technology and Engineering (ICATE), pp. 1-5, 2013.
[14] C. Li and Z. Qin, “A Blind Digital Image Watermarking Algorithm Based on DCT,” IET International Conference on Smart and Sustainable City 2013 (ICSSC 2013), pp. 446-448, 2013.
[15] R. Ohura and T. Minamoto, “A Recoverable Visible Digital Image Watermarking Based on the Dyadic Lifting Scheme,” The 11th International Conference on Information Technology: New Generations (ITNG), pp. 447-452, 2014.
[16] M. Alkhathami, F. Han, and R. V. Schyndel, “Fingerprint Image Protection Using Two Watermarks Without Corrupting Minutiae,” The 8th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1151-1155, 2013.
[17] P. C. Su, Y. C. Chang, and C. Y. Wu, “Geometrically Resilient Digital Image Watermarking by Using Interest Point Extraction and Extended Pilot Signals,” IEEE Transactions on Information Forensics and Security, pp. 1897-1908, 2013.
[18] X. Li, and J. Li, “Research on Image Digital Watermarking Based on Wavelet Transform and Grey Relational Analysis,” The 10th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 162-166, 2013.
[19] R. Zhang and Y. Wang, “Scrambling Image Watermark Algorithm Based on DCT and HVS,” International Conference on Information Technology and Applications (ITA), pp. 54-57, 2013.
[20] M. K. Dutta, A. Singh, K. M. Soni, R. Burget, and K. Riha, “Watermark Generation from Fingerprint Features for Digital Right Management Control,” The 36th International Conference on Telecommunications and Signal Processing (TSP), pp. 717-721, 2013.
[21] S. A. Khayam, “The Discrete Cosine Transform (DCT): Theory and Application,” Technical Report WAVES-TR-ECE802.602, Michigan State University, 2003.
[22] 吳秉澤,「JPEG影像的竄改偵測機制」,大同大學資訊工程學系碩士班碩士論文,2010年。
[23] R. C. Gonzalez and R. E. Woods, “Digital Image Processing,” 3rd Edition, August 2007.
[24] B. Chen and G. W. Wornell, “Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Transaction on information Theory, Vol. 47, No. 4, pp. 1423-1443, May 2011.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top