簡易檢索 / 詳目顯示

研究生: 藍品淳
Pin-Chun Lan
論文名稱: 一種利用混合轉換之強韌型數位影像浮水印技術
A Study on Mixed Transform Technology for Robust Digital Watermark of Digital Image
指導教授: 莊謙本
Chuang, Chien-Pen
學位類別: 碩士
Master
系所名稱: 工業教育學系
Department of Industrial Education
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 80
中文關鍵詞: 尺度不變特徵技術離散小波轉換離散餘弦轉換雜訊可見函式
英文關鍵詞: scale-invariant feature transform, discrete wavelet transform, discrete cosine transform, noise visibility function
論文種類: 學術論文
相關次數: 點閱:177下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本篇論文針對數位影像設計一個具有強韌性質的數位浮水印技術,目的是為了保護數位影像的智慧財產權。一般而言,對於浮水印影像的攻擊可分成幾何攻擊與非幾何攻擊兩大類,一個良好的強韌型數位浮水印演算法要能承受上述的攻擊。然而,在大部分抵抗幾何攻擊的研究中,有著浮水印嵌入容量受到限制的問題,有鑑於此,本篇論文使用尺度特徵不變技術來抵抗幾何攻擊,並且藉由二維條碼本身的高容量和高容錯特性,提升浮水印容量。結合離散小波與離散餘弦的混合轉換,並加入雜訊可見函式的考量,可以改善浮水印影像的視覺透明度。由數個實驗結果來展示演算法的效能,測試的攻擊模式有影像壓縮、縮放、模糊、銳化、對比以及亮度等攻擊,並與另一現存的浮水印演算法做比較,可以擁有較高的影像品質與攻擊抵抗能力。本篇論文的浮水印演算法能有效地兼顧強韌度與視覺透明度,進一步達到保護數位影像的智慧財產權之目的。

    This thesis focuses on the study of robust watermarking techniques to protect the intellectual property rights for digital images. In general, watermark attacks can be divided into two classes: geometric attacks and non-geometric attacks. A robust digital watermark algorithm can resist the above attacks. Recently, most of the researches focus on resisting geometric attacks with watermarking techniques but it’s not recommended due to the restricted watermark embedding capacity. To resolve the above problem, this thesis proposes a watermark algorithm based on scale-invariant feature transform. The improvement of watermark embedding capacity depends on two-dimension barcode’s storage of high capacity of information, error-correction ability. The watermark algorithm uses a combination of the discrete wavelet transform, the discrete cosine transform and noise visibility function to improve the perceptual transparency. The experimental results demonstrate the performance of the proposed scheme. The watermark attacks uses in the experiments include image compression, resize, blurring, sharpening, contrast and brightness. Finally, the experimental results show the performance of this scheme to be superior to that of an existing one.

    中文摘要 I ABSTRACT II 謝誌 III 目錄 IV 表目錄 VI 圖目錄 VII 符號表 IX 第一章 緒論 1 1.1 研究背景及動機 1 1.2 研究目的 5 1.3 研究流程 6 1.4 論文架構 7 第二章 文獻回顧及背景知識 8 2.1 數位浮水印的介紹 8 2.2 數位浮水印的分類 10 2.2.1 可視型浮水印 10 2.2.2 不可視型浮水印 11 2.3 數位浮水印的攻擊種類 15 2.3.1 幾何攻擊 15 2.3.2 非幾何攻擊 16 2.5 不同轉換域的相關浮水印演算法 18 2.6 抵抗幾何攻擊的相關浮水印演算法 20 2.7 研究方法 24 2.7.1 尺度不變特徵轉換技術 24 2.7.2 離散小波轉換 31 2.7.3 離散餘弦轉換 34 2.7.4 二維條碼 36 第三章 浮水印演算法及其架構 39 3.1 特徵萃取 39 3.2 估測浮水印嵌入強度 40 3.3 選擇浮水印嵌入位置 43 3.4 打亂浮水印 45 3.5 浮水印嵌入 47 3.6 浮水印萃取 49 第四章 實驗結果與數據分析 52 4.1 浮水印演算法透明度測試 55 4.2 浮水印演算法強韌度測試 61 第五章 結論 76 參考文獻 77

    [1] 經濟部智慧財產局 (2011)。查禁仿冒統計。2011年6月10日,取自http://www.tipo.gov.tw/ch/index.aspx.
    [2] IEEE Xplore Digital Library (2011). Available at http://ieeexplore.ieee.org/Xplore/guesthome.jsp.
    [3] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.
    [4] C. H. Lee and Y. K. Lee, “An adaptive digital image watermarking technique for copyright protection,” IEEE Transactions on Consumer Electronics, vol. 45, issue. 4, pp. 1005–1015, Nov. 1999.
    [5] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn (1999), “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.
    [6] Y. Hu and S. Kwong, “An image fusion based visible watermarking algorithm,” Proc. of the 2003 Int. Symp. on Circuits and Systems, vol. 3, pp. 794–797, May 2003.
    [7] X. Zhang and S. Wang, “Fragile Watermarking with Error-Free Restoration Capability,” IEEE Transactions on Multimedia, vol. 10, issue. 8, pp. 1490–1499, 2008.
    [8] J. Fridric and M. Goljan, “Images With Self-correcting Capabilities,” Proceedings of IEEE International Conference on Image Processing, vol. 3, pp. 792–796, 1999.
    [9] C. Ramos, R. R. Reyes, M. N. Miyatake, and H. P. Meana, “Image Authentication Scheme Based on Self-embedding Watermarking”, Lecture Notes In Computer Science, vol. 5856, pp. 1005–1012, 2009.
    [10] 陳同孝、黃國峰、張真誠,“數位影像處理技術”,初版,旗標圖書,2003年12月。
    [11] N. Wang, Y. Wang and X. Li , “A Novel Robust Watermarking Algorithm based on DWT and DCT,” International Conference on Computational Intelligence and Security, vol. 1, pp. 437–441, 2009.
    [12] R. G. van Schyndel, A. Z. Tirkel and C. F. Osborne, “A digital watermark,” Proceedings of the International Conference on Image Processing, vol. 2, pp. 86–90, Nov. 1994.
    [13] S. P. Maity and M. K. Kundu, “Robust and Blind Spatial Watermarking In Digital Image,” Proc. 3rd Indian Conf. on Computer Vision, Graphics and Image Processing (ICVGIP '2002), pp. 388–393, Dec. 2002.
    [14] G. Voyatzis and I. Pitas, “Chaotic watermarks for embedding in the spatial digital image domain,” Proc. ICIP98, vol. 2, pp.432–436 , 1998.
    [15] C. Chan and L. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, vol. 37, issue. 3, pp. 469–474, Mar. 2004.
    [16] M. Vetterli and J. Kovačević, 1995. Wavelets and Subband Coding. Prentice Hall, USA.
    [17] W. H. Lin, Y. R. Wang, S. J. Horng, T. W. Kao and Y. Pan, “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, vol. 36, issue. 9, Nov. 2009.
    [18] R. M. Zhao, H. Lian, H. W. Pang and B. N. Hu, “A Blind Watermarking Algorithm Based on DCT,” Intelligent Information Technology Application, vol. 3, pp. 821–824, 2008.
    [19] A. H. Ali, “Combined DWT-DCT Digital Image Watermarking,” Journal of Computer Science, vol. 3, issue. 9, pp. 740–746, 2007.
    [20] E. J. Delp and R.F. Wolgang, “A watermark for Digital Images”, Proceedings of the IEEE International Conference on Image Processing, pp.219–222, Sep. 1996.
    [21] G. Gao, “A Blind Grayscale Watermark Algorithm Based on Chaos and Mixed Transform Domain,” Computer and Automation Engineering (ICCAE), vol. 1, pp. 658–662, 2010.
    [22] L. Li, X. Yuan, Z. Lu and J. S. Pan, “Rotation invariant watermark embedding based on scale-adapted characteristic regions,” Information Science, vol. 180, issue. 15, pp. 2875–2888, Aug. 2010.
    [23] H.Y. Lee, H. kim and H.K. Lee, “Robust Image Watermarking using local Invariant Features,” SPIE, Journal of Optical Engineering, vol. 45, issue. 3, 2006.
    [24] X. W. Li, B. L. Guo and L. Chen, “RST Invariant Image Watermarking based on Invariant Contents,” Genetic and Evolutionary Computing (ICGEC), pp. 675–678, 2010.
    [25] C. G. Thorat and B. D. Jadhav, “A Blind Digital Watermark Technique for Color Image Based on Integer Wavelet Transform and SIFT,” Proceedings of the International Conference and Exhibition on Biometrics Technology, vol. 2, pp. 236–241, 2010.
    [26] D. G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints,” International Journal of Computer, vol. 60, vo. 2, pp. 91–110, 2004.
    [27] SIFT Library (2011). Available at http://blogs.oregonstate.edu/hess/code/sift/.
    [28] QR Code.com (2011). Available at http://www.denso-wave.com/qrcode/aboutqr-e.html.
    [29] S. Voloshynovskiy , A. Herrigel , N. Baumgaertner and T. Pun, “A Stochastic Approach to Content Adaptive Digital Image Watermarking,” Proceedings of the Third International Workshop on Information Hiding, pp.211-236, Sep. 1999.
    [30] G. Voyatzis and I. Pitas, “Applications of Toral Automorphisms in Image Watermarking,” In Proceeding of the IEEE International Conference on Image Processing, vol. 3, pp. 219-222, 1996.
    [31] University of Southern California (2011). Available at http://sipi.usc.edu/database/database.php.
    [32] Quick Mark (2011). Available at http://www.quickmark.com.tw/cht/basic/download.asp.

    下載圖示
    QR CODE