研究生: |
吳鴻明 |
---|---|
論文名稱: |
混合網點數位浮水印輸出控制研究 A Study on Output Control of Watermarking with Blended Halftone Dots |
指導教授: | 王希俊 |
學位類別: |
碩士 Master |
系所名稱: |
圖文傳播學系 Department of Graphic Arts and Communications |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 中文 |
論文頁數: | 64 |
中文關鍵詞: | 數位半色調技術 、混合網點 、數位浮水印 、網點擴張 |
英文關鍵詞: | Digital halftoning, Hybrid halftone dots, Digital watermarking, Dot gain |
論文種類: | 學術論文 |
相關次數: | 點閱:194 下載:28 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
混合網點數位浮水印技術,應用調幅網點及調頻網點兩種不同形式的網點,將浮水印藏入半色調影像中,藉由不同形式的網點對複印或是掃描等數位複製設備的取樣差異來進行解碼。實體影像受限於輸出設備因素,只能以半色調的形式來呈現,半色調影像經由人類視覺的模糊化積分後,產生連續調影像的感覺。數位浮水印是在數位影像中藏入標記、圖案、號碼等等資訊,本研究針對混合網點數位浮水印輸出成實體浮水印,考量輸出設備特性,控制網點的大小及疏密程度,使數位浮水印輸出後,得到最佳的隱蔽性,且經由複印機等解碼設備偵測後,可以得到隱藏的資訊。
The objective of this thesis is to hide watermark with hybrid halftone dots in a printed halftone image. Two different halftone dots, Amplitude Modulation (AM) and Frequency Modulation (FM), are use to design the digital watermark. The output parameters should be carefully controlled to obtain printed image with hidden digital watermark. As the printed image is copied or scanned, the hidden watermark is shown because of the under-sampling of the FM halftone dots. The outcome of this research has many potential applications in security printing, such as ID, legal document, checks, stamps, and currency.
[1] W. Bender et al., “Techniques for data hiding”, IBM System Journal, vol 35, Nos3&4, pp 313-336, 1996.
[2] C.C. Kuo, T. Kalker, W. Zhou, ”Digital Rights Management - from the guest editors”, IEEE Signal Processing Magazine, vol. 21, Issue 2, pp11-14, March 2004.
[3] J. Abigail and R. H. R. Harper., “The Myth of the Paperless Office” , MIT Press,Cambridge, MA, 2001.
[4] H.C. Wang, C.Y. Lin, C.C. Huang, “Data Hiding in a binary image by the modified digital halftoning techniques”, proceedings, 1999 Conference on Computer Vision, Graphics and Image Processing, pp. 183-190, Taipei, Taiwan, August, 1999.
[5] D. Gruhl and W. Bender, “Information Hiding to Foil the Casual Counterfeiter”, proceedings, 2nd International Workshop on information hiding, Lecture Notes in Computer Science, 1525, pp 1-15, Portland, Oregon, April 1998.
[6] D.L. Hecht, “Embedded data Glyph technology for hardcopy digital documents”, SPIE 2171, pp. 341-352, 1995.
[7] M.S. Fu and O.C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Transaction on Image Processing , pp.477-484, 2002.
[8] H.C. Wang, “An Information Hiding Techniques for Binary Images in Consideration of Printing Process”, PCM 2002, Lecture Notes in Computer Science 2532, pp. 460-467, 2002.
[9] R.W. Floyd and L. Steinberg, “An adaptive algorithm for spatial greyscale”,proceedings of Society for Information Display, Vol 17(2), pp75-77, 1976.
[10] R. Ulichney, Digital Halftoning, MIT Press, Cambridge, MA, 1987.
[11] I. Katsavounidis and C.C. Jay Kuo, “A multiscale error diffusion technique for digital halftoning”, IEEE Transaction on Image Processing, Vol. 6,No.3,pp.483-490, March 1997.
[12] M. Mese and P.P. Vaidyanathan, “Recent advances in digital halftoning and inverse halftoning methods”, IEEE Transactions on Circuits and Systems I : Fundamental theory and applications. Vol 49, No 6, pp.790-805, June 2002.
[13] M. Miller and R. Zaucha, The color Mac second edition, Hayden Books, Indianapolis, USA, pp89-95, 1998.
[14] T. N. Pappas, J. P. Allebach, D. L. Neuhoff, “Model-Based Digital Halftoning", IEEE Signal Processing Magazine, pp.14-27, July 2003.
[15] C.L.Killeen ,”Dealing with Dot Gain”, GATFWorld , Vol.7 ,No.3,pp27-36,1995.
[16] N. Dan , "The Importance of Ink Film Thickness and its Effect on Quality, Productivity and Waste in the Offset Pressroom" GATFWord, Vol.7 No.4,pp17-26, June 2004.
[17] H. Kipphan, Hand book of Print Media, Heidelberger Druckmaschunen AG, Germany,pp503-523,2001.
[18] C.T. Hsu, J.L. Wu, “ Hidden signatures in images”, in Proceedings of 19 International Conference on Image Processing, Vol.3, pp223-226, Sep 1996.
[19] R. L. van Renesse, “Optical Document Security”, 2nd Ed., Artech House, London, 1997.
[20] I. J .Cox, J. Kilian, F. T. Leighton , and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Trans. on Image Processing, Vol.6, No. 12, pp. 1673-1687, Dec. 1997.
[21] F. Y. Shih and Y.T. S. Wu, “Combinational image watermarking In the spatial and frequency domains”, Pattern Recognition, vol.36, pp.969-975, 2003.
[22] R. B. Wolfgang, C. I. Podilchuk , E. J. Delp, “Perceptual watermarks for digital images and video”, Proceedings of the IEEE, vol. 87, No. 7, July 1999.
[23] P.C. Hsiao, Y. T. Chen, H.C. Wang, “Watermarking a Printed Binary Image with Varied Screen Rulings” 16th IPPR Conference on Computer Vision, Graphics and Image Processing, 2003.
[24] H.C. Wang , J. Sung, Y.H. Chen, “Elimination of artifacts in encrypted binary images by modified digital halftoning technique”, proceeding, Conference on Optical Security and Counterfeit Deterrence Techniques V SPIE, San Jose, vol. 5310, pp. 404-415, January 2004.
[25] K. Shimada, “Microstructural Lines Involving Luminescence”, The International Society for Optical Engineering Conference, San Jose, California, USA, vol.5310-14, January 2004.
[26] F. Koltai, B. Adam, “Enhanced optical security by using information carrier digital screening”, Conference on Optical Security and Counterfeit Deterrence Techniques V SPIE, San Jose, vol. 5310, pp. 160-169, January 2004.
[27] G. K. Phillips, “Combining Nanocharacter Printing, Digital Watermarking and UV Coded Taggents for Optimal Machine-Readable Security”, Proc. SPIE Vol. 4677, pp. 150-158, 2002.
[28] G. Sharma and S.G. Wang, “Show-through Watermarking of Duplex Printed Documents”, Conference on Optical Security and Counterfeit Deterrence Techniques V, SPIE, Vol.5306, pp.670-684, San Jose, California, January 2004.
[29] M. Kiuchi and K. Saito, “Frequency Analysis for Security Printing Lines”, SPIE proceedings, Conference on Optical Security and Counterfeit Deterrence Techniques V, Vol.4677, pp110-120, San Jose, January 2002.
[30] M. Analoui and J. P. Allebach, “Model Based Halftoning Using Direct Binary Search”, Human Vision, Visual Proceedings, and Digital Display III, Proc. SPIE, Vol.1666, pp96-108, 1992.
[31] S. J. Simske, J. S. Aronoff, J. Arnabat, “Qualification of security printing features”, Conference on Optical Security and Counterfeit Deterrence Techniques VI, SPIE Vol.6075, pp.105-116, San Jose, California, Feb. 2006.
[32]蕭佩琪、王希俊、連啟明(2004),文件底紋之混合網點數位浮水印技術,台北:第三屆數位典藏技術研討會,223-230頁。
[33]汪德美(1995),數位式半色調技術,電子月刊,第一卷第五期,126-140頁。
[34]馬立懿(1997),調幅與調頻網屏的邊際長度與其網點擴大關係之研究,中華印刷科技年報, 59-66頁。