簡易檢索 / 詳目顯示

研究生: 蕭佩琪
Pei-Chi Hsiao
論文名稱: 以網點為基礎的創新影像加密技術
A Novel Method for Security Printing
指導教授: 陳祝嵩
Chen, Chu-Song
學位類別: 碩士
Master
系所名稱: 圖文傳播學系
Department of Graphic Arts and Communications
論文出版年: 2005
畢業學年度: 93
語文別: 中文
論文頁數: 57
中文關鍵詞: 圖像防偽科技數位浮水印數位半色調技術隨機點圖樣非擬真影像部分對應幾何雜湊法機器閱讀
英文關鍵詞: Anti-counterfeiting, Watermarking, Digital Halftoning, Random Dot Pattern, Non-Photorealistic Imaging, Partial Matching, Geometric Hashing, Machine-Readable
論文種類: 學術論文
相關次數: 點閱:241下載:31
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 現今資訊科技與影像複製設備日益進步,要獲得一份高品質的印刷複製品已不再是困難的事,也使得文件安全受到考驗。過去應用於印列輸出影像之數位浮水印技術仍有諸多限制,而未能有效地實際應用。我們提出將隨機點圖樣做為加密資訊,並以其反覆的幾何變換與部份重疊來形成具有數位浮水印功能的半色調影像,同時此密碼圖樣的幾何變換也可視為一種繪圖筆刷來描繪出影像的階調與輪廓,加密後的影像具有非擬真影像的視覺效果。而密碼驗證部分,因局部影像皆有足夠的密碼資訊存在,本研究利用電腦視覺中的部分對應方法—幾何雜湊法,解決可能的幾何轉換與影像定位問題,達到機器閱讀的自動化密碼驗證之目的。本論文提出了一種創新影像加密方法,同時此方法可將灰階影像轉成半色調影像,以供印列輸出之用途,由於藏密過程中加入的隨機參數以及混合搭配代表不同鍵值的密碼圖樣,使本研究的編碼具有一定的複雜度,不易被破解;此外,對於印列輸出的加密影像透過取像重建回數位影像後,可利用部分對應的方式對局部影像作影像定位與密碼驗證,除了增加密碼驗證的效率外,更可突破先前技術在面臨裁切與旋轉等幾何攻擊上的限制。實驗結果可看出本研究適合搭配數位印刷設備製作藏有不同密碼序號的底紋影像,以達到文件控管或身份認證之功能,本研究在防制影印機、掃描器與印表機的複製行為上也有不錯的表現,並具有實際應用的可行性。

    As the developments of the information technology and duplication devices, it is easy to obtain a high quality duplication of printed document. Recently, it becomes a serious problem that the modern graphics art techniques, such as scanner or color copiers, are used to duplicate counterfeiting documents. Nowadays, security printings require more and more robust and anti-counterfeiting techniques to resist the guilty abuse. Previous works about watermarking/data hiding for printed images still lack of capability in practice. A novel method is proposed to apply on printed images to make its security features be machine-readable automatically. A random dot patterns are considered as a secret key and its geometric transformation are used to generate a halftone image. Since the partial halftone image is conducted by random dot patterns, the partial image is sufficient for authentication. After acquiring the digital image of printed document by scanner or other devices, a partial matching method, geometric hashing, is used for solving the localization problem automatically and secret key authentication.
    The proposed method is not only a watermarking method, but also a process for halftoning. Due to added random parameters and at least two combined patterns in the encoding process, it is too complex to decipher the encoded code. In addition, decoding the partial image not only increases the efficiency of authentication, but also conquers the previous limitation of cropped and geometric transformations, such as rotation and scaling. The proposed method suits for combining the digital printing devise and generating the background image with various secret keys as fingerprinting. Experimental results reveal that the proposed method can resist the duplicating manner from scanner or color copiers in certain situation and be applied on print-and-scan documents in practice.

    中文摘要/i 英文摘要/ii 致謝/iii 目錄/iv 圖目錄/v 表目錄/vi 第一章 緒論/1 1.1 前言/1 1.2 文獻探討/4 1.2.1 數位網點的種類與特性/4 1.2.2 資料隱藏/6 1.2.3 半色調影像加密研究/7 1.3 論文綱要/11 1.4 論文架構/12 第二章 隨機點底紋影像之加密與驗證/13 2.1 隨機點圖樣/14 2.2 驗證方式/18 2.2.1 特徵萃取/19 2.2.2 以部分對應解決影像定位問題/20 2.2.2.1 幾何雜湊法/21 2.2.2.2 幾何不變量座標表示法/22 2.2.2.3 辨認階段/24 2.3 訓練與測試/26 2.3.1 訓練/26 2.3.2 測試/30 第三章 以網點為基礎的創新影像加密技術/33 3.1 影像分層/35 3.2 以圖樣的縮放形成不同階調/36 3.3 加密方法/37 3.4邊界加強/41 3.5直方圖等化/42 3.6 加密流程/45 3.7 密碼驗證/47 第四章 實驗結果與討論/48 4.1裁切與旋轉的幾何轉換/48 4.2影像加密與驗證效果/49 4.3產生彩色加密影像/54 4.4抵抗複製設備的偽造方式/55 第五章 結論/56 第六章 未來工作/57 參考文獻/58

    [1] W. Bender and D. Gruhl, “Techniques for data hiding,” IBM System Journal, vol. 35, no. 3&4, 1996, pp. 313-336.
    [2] M. S. Fu and O. C. Au, “Data hiding by smart pair toggling for halftone images,” in IEEE Intl. Conf. Acoustics Speech and Signal Processing, vol. 4, 2000, pp. 2318-2321.
    [3] M. S. Fu and O.C. Au, “Data hiding watermarking for halftone images,” IEEE Trans. Image Processing, vol. 11, issue. 4, 2002, pp. 477-484.
    [4] M. S. Fu and O. C. Au, “Correlation-based watermarking for halftone images,” in Proc. Intl. Symp. Circuits and Systems (ISCAS'04), vol. 2, 2004, pp. 21-24.
    [5] W. E. L. Grimson and T. Lozano-Perez, “Localizing overlapping parts by searching the interpretation tree,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 9, no. 4, 1987, pp. 469-482.
    [6] D. Gruhl and W. Bender, “Information hiding to foil the casual counterfeiter,” in Proc. 2nd Intl. Workshop on information hiding, Lecture Notes in Computer Science, 1525, Portland, Oregon, Apr. 1998, pp. 1-15.
    [7] C. Harris and M. Stephens, “A combined corner and edge detector,” in 4th ALVEY Vision Conference, 1988, pp. 147–151.
    [8] H. Z. Hel-Or, “Watermarking and copyright labeling of printed images,” J. Elect. Imaging, vol. 10, no. 3, Jul. 2001, pp. 794–803.
    [9] C. Y. Hsu and C. S. Lu, “Geometric distortion-resilient image hashing system and its application scalability,” in Proc. ACM Multimedia and Security Workshop, Magdeburg, Germany, 2004, pp. 81-92.
    [10] D. Kacker and J. P. Allebach, “Joint halftoning and watermarking,” IEEE Trans. Signal Processing, vol. 51, no. 4, 2003, pp. 1054-1068.
    [11] F. Koltai and B. Adam, “Enhanced optical security by using information carrier digital screening,” in Prco. SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, Jan. 2004, pp.160-169.
    [12] C.C. Kuo, T. Kalker, and W. Zhou, “Digital rights management – from the guest editors,” IEEE Signal Processing Magazine, vol. 21, issue 2, Mar. 2004, pp. 11-14.
    [13] Y. Lamdan and H. J. Wolfson, “Geometric hashing: a general and efficient model-based recognition scheme,” in Proc. 2nd Intl. Conf. Computer Vision, 1988, pp. 238-249.
    [14] H. Nagashima and K. Saito, “New Security System for ID Certificates in IT Society,” in Prco. SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, Jan. 2004, pp.142-150.
    [15] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding - a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
    [16] W. K. Pratt, Digital image processing, 2nd Ed, John Wiley & Sons, Inc., 1991.
    [17] R. L. van Renesse, “Paper based document security-a review,” in European Conference on Security and Detection, 1997, pp.75 – 80.
    [18] R. L. van Renesse, Optical document security, Artech House, Boston, MA, 1998.
    [19] A. Secord, W. Heidrich, and L. Streit, “Fast primitive distribution for illustration,”in Proc. 13th Eurographics Workshop on Rendering, Eurographics Association, 2002, pp. 215–226.
    [20] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A secure data hiding scheme for binary images,” IEEE Trans. Communications, vol. 50, no. 8, Aug. 2002, pp. 1227-1231.
    [21] R. Ulichney, Digital Halftoning, MIT Press, Cambridge, MA, 1987.
    [22] S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, “Visual communications with side information via distributed printing channels: extended multimedia and security perspectives,” in Proc. SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI, Jan. 2004, pp. 428–445.
    [23] N. Vujovic and D. Brzakovic, “Evaluation of an algorithm for finding a match of a distorted texture pattern in a large image database,” ACM Trans. Information Systems (TOIS), vol. 16, issue 1, Jan. 1998, pp. 31-60.
    [24] H. C. Wang, “Data hiding techniques for printed binary images,” in Proc. Intl. Conf. Information Technology: Coding and Computing, Las Vegas, NV, USA, Apr. 2001, pp. 55-59.
    [25] H. J. Wolfson and I. Rigoutsos, “Geometric hashing: an overview,” IEEE Computational Science and Engineering, vol. 4, no. 4, 1997, pp. 10–21.
    [26] M. Wu, W. Trappe, Z. J. Wang, and R. Liu, “Collusion-resistant fingerprinting for multimedia,” IEEE Signal Processing Magazine, Mar. 2004, pp. 15-27.

    QR CODE