研究生: |
董名蘂 Dong, Ming-Ruei |
---|---|
論文名稱: |
多層浮水印演算法及相關硬體架構之研究 A Multi-Layer Watermarking Algorithm and Hardware Architecture |
指導教授: | 黃文吉 |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2018 |
畢業學年度: | 106 |
語文別: | 中文 |
論文頁數: | 60 |
中文關鍵詞: | 多層浮水印 、資料隱藏 、脆弱式浮水印 、資料竄改 |
DOI URL: | http://doi.org/10.6345/THE.NTNU.DCSIE.035.2018.B02 |
論文種類: | 學術論文 |
相關次數: | 點閱:100 下載:15 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
現今使用者大多會將較為機密和私人的資料儲存到雲端,然而在儲存資料的過程中必須經由網路做資料的傳輸,但是透過網路傳遞資料勢必得承受資料遭受竄改之風險,這將導致資料有安全性及正確性上的疑慮。
為了確保資料的正確性及安全性,本研究將資料進行加密,再將更為機密的資料以多層浮水印的形式嵌入其中,最後才透過網路進行資料的傳輸,使得資料及機密資料無法輕易的被破解,大幅度提高了資料的可信度。
本研究使用Hadamard法則進行浮水印的嵌入,且本法則可在資料中嵌入多層浮水印,大量提高了浮水印的資料量,而且本法則的浮水印具有高度的脆弱性,縱使資料只遭受過些許的更動,都會對浮水印造成劇烈的變化。另外本研究也有設計相關的硬體架構,透過Pipeline的架構大幅度提升了電路的時脈。
本法則的多層浮水印架構使得浮水印具有頗為可觀的嵌入資料量,同時浮水印還具備高度的脆弱性,透過檢查浮水印能夠驗證資料是否無誤;在雲端資料的存取過程中,透過運用本法則能夠使資料更為可靠。
[1] Cheng, C. J., Hwang, W. J., Zeng, H. Y., & Lin, Y.C. "A fragile watermarking algorithm for hologram authentication," IEEE Journal of Display Technology, 10, pp.263-271, 2014.
[2] 許紘境,《適用於加密後資料處理的可分離及可回復的浮水印演算法則之硬體架構實現研究》,國立臺灣師範大學資訊工程研究所,2017。
[3] H. Karimi, S. M. Hosseini, M. V. Jahan, "On the combination of self-organized systems to generate pseudo-random numbers," Inform. Sci., vol 221, pp.371-388, 2013.
[4] W. J. Hwang, and H. C. Hsu, "A Novel Separable and Reversible Watermarking Algorithm for Encrypted Data," Submitted to IEEE Trans. Information Forensics and Security, 2017.
[5] S. Yi and Y. Zhou, "An improved reversible data hiding in encrypted images," in Proc. IEEE China Summit and Int. Conf. Sig. and Inform. Process., pp.225-229, 2015.
[6] Z. Qian and X. Zhang, "Reversible data hiding in encrypted images with distributed source encoding," IEEE Trans. Circuits and Syst. For Video Tech., vol. 26, pp. 636-646, 2016.
[7] X. Zhang, "Separable reversible data hiding in encrypted image," IEEE Trans. Inform. Forensics and Security, vol. 7, pp. 826-832, 2012.
[8] R. Jose and G. Abraham, "A separable reversible data hiding in encrypted image with improved performance," in Proc. IEEE Int. Conf. Microelectron., Commun. and Renewable Energy, 2013.
[9] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inform. Forensics and Security, vol. 5, pp. 187-193, 2010.
[10] I.-C. Dragoi and D. Coltuc, "On local prediction based reversible watermarking ," IEEE Trans. Image Process., vol. 24, pp. 1244-1246, 2015.
[11] W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.
[12] F. Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, 2nd ed., CRC Press, 2017.