跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.85) 您好!臺灣時間:2025/01/21 15:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林志昌
研究生(外文):Chih-Chang Lin
論文名稱:基於公開金鑰密碼學的高彈性影像
論文名稱(外文):Highly Flexible Block-wise Image Authentication System
指導教授:王智弘王智弘引用關係
指導教授(外文):Chih-Hung Wang
學位類別:碩士
校院名稱:國立嘉義大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:71
中文關鍵詞:數位影像認證數位浮水印公開金鑰密碼學數位簽章
外文關鍵詞:Digital Image AuthenticationDigital WatermarkingPublic-Key CryptographyDigital Signature
相關次數:
  • 被引用被引用:0
  • 點閱點閱:154
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
多數的數位影像認證系統都使用數位浮水印的技術來實現之,一般來說我們將數位浮水印技術分成:空間域浮水印及頻率域浮水印。空間域浮水印是相當脆弱的,容易受到非惡意人為破壞所影響,如常見之JPEG影像壓縮。所以越來越多的數位浮水印技術都轉移至頻率域浮水印,相較於空間域浮水印,無論是浮水印的彈性及強健度,頻率域浮水印都佔有相當之優勢,它可以避免浮水印過於脆弱而被一些合理的影像失真縮破壞,但是卻又能偵測出惡意的人為破壞行為。
本論文提出了一個新的影像認證系統,保障了影像內容及影像所有權,我們的影像認證系統使用了頻率域浮水印技術並結合了公開金鑰密碼學。我們使用頻率域離散餘弦轉換(DCT)之低頻係數作為我們的影像認證特徵,由此計算出影像不變量再利用DSA的簽章技術產生數位簽章,視之為數位浮水印後再使用了量化的技術嵌入至頻率域DCT中頻係數,達到任意第三人可以驗證影像但卻無法偽冒產生認證用浮水印的效果。在驗證影像的過程中我們不需要原始的影像來輔助,任意人都可以取的影像擁有者的公開金鑰進行驗證,從我們的實驗結果可以證實,我們的數位影像認證系統具備抵抗JPEG壓縮破壞的能力,且對於其他合理的影像失真如影像銳利化、模糊化等都有相當不錯之效果。同時可以透過認證的結果指出影像何處遭受到惡意的人為竄改。

Many digital image authentication techniques can be achieved by using digital watermarking scheme. Digital watermarking scheme is generally categorized into spatial domain and frequency domain bases. Spatial domain watermarking scheme is fragile and is hard to resist incidental distortion such as JPEG compression. Frequency domain watermarking scheme has better robustness than spatial domain watermarking scheme;it can stand reasonable distortion and detect illegal distortion through malicious tampering.
In this thesis, we proposed a new image authentication system which can preserve the integrity of image content and claim image ownership. Our proposed system is a frequency domain watermarking scheme with public-key cryptography. We compute feature value from invariable data in low-band DCT coefficients and provide an additional property of public verification by producing a DSA signature on the image feature we have found. We use quantization technique to embed our signature in the middle-band DCT coefficients. In verification steps, we do not need original image since we can retrieve the embedded watermark from received image. Everyone can authenticate the image but can not forge the owner’s signature. The experimental results show that, our image authentication system can adequately resist the incidental distortion like JPEG compression and resist the reasonable image distortion such as sharpening and blurring. Our system also can indicate the malicious tampering area when the image suffers from an illegal modification.

中文摘要 i
ABSTRACT ii
誌謝 iii
第一章 導論 1
1.1. 研究動機 1
1.2. 研究目的 2
1.3. 文獻回顧 3
1.4. 論文架構 5
第二章 數位影像認證技術 7
2.1. 公開金鑰密碼學與數位簽章 7
2.2. DSA數位簽章演算法 8
2.3. 數位浮水印技術 11
2.3.1. 數位浮水印之分類 11
2.4. 以數位浮水印為基礎的數位影像認證需求 14
2.5. 數位浮水印影像認證演算法 15
2.5.1. 數位浮水印產生方式 15
2.5.2. 浮水印嵌入方式及萃取方式 17
2.5.3. 安全上的挑戰 21
第三章 離散餘弦轉換與JPEG影像壓縮技術簡介 23
3.1. 離散餘弦轉換 23
3.1.1. DCT係數在頻率上的意義 24
3.1.2. DCT公式釋義 25
3.2. JPEG影像壓縮技術簡介 26
3.2.1. JPEG壓縮模式 27
3.2.2. JPEG壓縮基本流程 28
第四章 基於公開金鑰密碼學的高彈性影像認證系統 33
4.1. 脆弱的公開金鑰影像認證系統 33
4.2. 基於公開金鑰密碼學的高彈性影像認證系統 37
4.2.1. 方法概述 37
4.2.2. 擷取影像特徵值 39
4.2.3. 嵌入浮水印-使用量化技巧 42
4.2.4. 影像驗證 45
第五章 實驗結果與分析 48
5.1. 實作環境 48
5.2. 定義特徵量化表及嵌入量化表 49
5.2.1. 特徵量化表 49
5.2.2. 嵌入量化表 52
5.3. 影像失真評估工具 56
5.4. 浮水印影像PSNR評估 57
5.5. 抵抗JPEG壓縮能力測試 59
5.6. 惡意竄改測試 60
5.7. 影像失真測試 62
5.8. 實驗結果討論 63
5.9. 系統安全性討論 66
第六章 結論與未來展望 68
參考文獻 69

[1] N.K. Abdulaziz and K.K. Pang, ”Robust Data Hiding for Images,” Proceedings of the International Conference on Communication Technology 2000 (WCC - ICCT 2000), vol. 1 , 2000.
[2] P. Barreto, H.Y. Kim and V. Rijmen, ”Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking,” IEE Proceedings of the Vision, Image and Signal Processing, vol. 149, no. 2, pp. 57-62, April 2002.
[3] G. Garg, P.K. Sharma and S. Chaudhury, ”Image Based Authentication Using DCT,” Pattern Recognition Letters, vol.22, pp. 725-729.
[4] M. Hong, F. Kossentini and M.J.T Smith, “A Family of Efficient and Channel Error Resilient Wavelet / Subband Image Coders,” IEEE Transactions On Circuits and System for Video Technology, vol.9, no.1, pp.95-108, February 1999.
[5] M. Holliman and N. Memon, “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” IEEE Transactions On Image Processing, vol.3, pp.432-441, March 1997.
[6] C. T. Hsu and J. L. Wu, “Hidden Signature in Images,” Proceedings of the International Conference on Image Processing, vol.03, pp.223-226, September 1996.
[7] Y. Jang, I. Kim, H.I. Kang, K.I. Kim, and S.S. Han, “Blind Watermarking Algorithm Using Complex Block Selection Method,” IEEE Pacific Rim Conference on Multimedia 2001, pp. 996-1001.
[8] M. Kutter, F. A. P. Petitcolas, ”A Fair Benchmark for Image Watermarking System,” Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol.3657, pp.240-250, January 1999.
[9] T. Liu and Z. D. Qiu, “The Survey of Digital Watermarking-based Image Authentication Techniques,” Signal Processing 2002, vol. 2, pp. 1556-1559, August 2002.
[10] J. Lee and C.S. Won, “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction,” IEEE Transactions on Consumer Electronics, vol. 46, no. 2, pp. 313-317 , May 2000.
[11] C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L. Miller and Y.M. Lui, “Rotation , Scale and Translation resilient watermarking for images,“ IEEE Transactions on Image Processing, vol. 10, no.5, May 2001.
[12] S. Pereira, S.Voloshynoskiy, and T. Pun, “Optimal Transform Domain Watermark Embedding Via Linear Programming,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2003, vol. 5, pp. 672-675.
[13] M. Schneider and S. F. Chang, “A Robust Content Based Digital Signature for Image Authentication,” Proceedings of the International conference on Image Processing, 1996., vol.03, pp.227-230, September 1996.
[14] Q. Sun, S.F. Chang, M. Kurato and M. Suto, “A Quantitative Semi-fragile JPEG2000 Image Authentication System,“ Proceedings of the International Conference on Image Processing 2002, vol. 2, pp. 22-25, September 2002.
[15] William Stallings, Cryptography and Network Security, Prentice Hall, New Jersey, 1999.
[16] W. W. Peterson and E. J Weldon, Jr. , Error-Correcting Codes, 2nd edition, MIT Press, Cambridge, 1972.
[17] S. Suthaharan, S.W. Kim, H.K. Lee, ”Perceptually Tuned Robust Watermarking Scheme for Digital Images,” Pattern Recognition Letters, vol.21, p145-149
[18] F. Y. Shih and S.S.T. Wu, ”Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition Letters, vol.36, no.4 , pp.969-975.
[19] Y. C. Tseng, Y. Y Chen and H.K. Pan, ”A Source Data Hiding Scheme for Binary Images,” IEEE Transactions on Communication, vol. 50, no.8, August 2002.
[20] M. Wu and B. Liu, “Watermarking for Image Authentication,” Proceedings of the ICIP Chicago IL, October 1998.
[21] P. W. Wong, ”A Public Key Watermark for Image Verification and Authentication,“ Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 455-459, 1998.
[22] P. W. Wong and N. Memom, “Secret and Public Key Image Watermarking schemes for Image Authentication and Ownership verification,” IEEE Transaction on Image Processing, vol. 10, no. 10, October 2001.
[23] C.W Wu, “On the Design of Content-Based Multimedia Authentication System,” IEEE Transaction on Multimedia, vol.4, no. 3, September 2002.
[24] G.J Yu, C.S Lu, H.Y.M Liao and J.P Sheu, ”Mean Quantization Blind Watermarking for Image Authentication,” Proceedings of the IEEE 2000 International Conference on Image Processing, vol. 2, pp. 706-709.
[25] D. Zou, C.W. Wu, G. Xuan, Y.Q. Shi, ”A Content-Based Authentication System with Lossless Data Hiding,” Proceedings of the 2003 International Conference on Multimedia and Expo (2003 ICME '03), vol. 2, pp. 6-9, July 2003.
[26] 陳同孝、張真誠、黃國峰, 數位影像處理技術, 松崗電腦圖書資料股份有限公司, 2001.
[27] 戴顯權, 陳政一, JPEG2000, 紳藍出版社, 2002.
[28] USC-SIPI image database, http://sipi.usc.edu/services/database/Database.html

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top