簡易檢索 / 詳目顯示

研究生: 曾瀚逸
論文名稱: 適用於數位全像顯微鏡系統影像認證之浮水印法則開發之研究
A Watermarking Algorithm for Holographic Microscopy System Authentication
指導教授: 黃文吉
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 中文
論文頁數: 57
中文關鍵詞: 數位全像顯微鏡系統認證浮水印
英文關鍵詞: Holographic Microscopy System, Authentication, Watermarking
論文種類: 學術論文
相關次數: 點閱:125下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文提出一個適用於數位全像顯微鏡系統(Digital Holographic Microscopy,
    DHM)影像認證的脆弱型浮水印法則,同時提供針對傳送錯誤或是惡意篡改擁有
    高敏感度,並且能有效的偵測出來。本法則的浮水印嵌入於離散餘弦轉換
    (Discrete Cosine Transform,DCT)域後並沒有做量化。藉由有效的增強全像圖的儲存精度,我們能夠控制因嵌入浮水印而造成的破壞。最後實驗結果也呈現本法
    則的浮水印在重建後可以用於過濾破壞的資料或對惡意篡改的偵測。

    關鍵字:數位全像顯微鏡系統、認證、浮水印

    A fragile watermarking algorithm for hologram authentication is presented in this paper. While providing high perceptual transparency, the proposed algorithm attains high performance detection to delivery errors and malicious tampering. In the proposed algorithm, the watermark is embedded in the discrete cosine transform (DCT) domain of a hologram without quantization. The distortion produced by the watermark can be controlled. It can be effectively lowered by enhancing the precision for storing the watermarked hologram pixels. Experimental results reveal that the proposed algorithm can be used as a filter for blocking polluted or tampered holograms from reconstruction.

    中文摘要 ............................................................................................................... i Abstract ............................................................................................................... ii 誌謝 .................................................................................................................... iii 目錄 .................................................................................................................... iv 附表目錄 ............................................................................................................. vi 附圖目錄 ............................................................................................................ vii 第一章 緒論 .........................................................................................................1 1.1 研究背景與動機目的 ...................................................................................1 1.2 全文架構 .....................................................................................................4 第二章 浮水印法則介紹 .......................................................................................5 2.1 簡介 .............................................................................................................5 2.2 浮水印嵌入法則 ..........................................................................................6 2.3 浮水印擷取法則 ........................................................................................ 15 2.4 浮水印法則數學分析 ................................................................................. 17 第三章 實驗成果跟數據探討 ............................................................................. 22 3.1 開發平台與測試對象 ................................................................................. 22 目錄 v 3.2 實驗數據的呈現與討論 ............................................................................. 25 3.2.1 JPG 格式對於重建品質之影響 .............................. 26 3.2.2 浮水印控制參數的討論 .................................... 28 3.2.3 模擬情境一 .............................................. 43 3.2.4 模擬情境二 .............................................. 48 第四章 結論...................................................................................................... 55 參考著作 ............................................................................................................. 56

    [1] G. Sivathanu, C. P. Wright, and E. Zadok, Ensuring Data Integrity in Storage: Techniques and Applications, Proc. International Workshop on Storage Security and Survivabil-ity, pp.26-36, 2005.

    [2] A. Perrig, B. Przydatek, and D. Song, SIA: Secure Information Aggregation in Sensor Networks. J. Comput. Secur. pp. 69-102, 2007.

    [3] M. Wu and B. Liu, Watermarking for image authentication, in Proc. IEEE Int. Conf. Image Processing, pp. 437441, 1998.

    [4] H. T. Chang and C. L. Tsan, Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain, Applied Optics, pp.6211-6219, 2005.

    [5] J. Li, Robust image watermarking scheme against geometric attacks using a computer-generated hologram, Applied Optics, pp.6302-6312, 2010.

    [6] N. K. Nishchal, T. Pitkaaho, and T.J., Naughton, Digital Fresnel Hologram Watermarking, Proc. Euro-American Workshop on Information Optics, 2010.

    [7] C. I. Podilchuk and E. J. Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, pp.33-46, 2001.

    [8] C.H. Huang, J.S. Pan, and H.M. Hang, Watermarking Based on Spatial Domain, Chapter 5 of the Book Intelligent Watermarking Techniques, Editors, J.S. Pan, H.C. Huang and L.C.Jain, pp.135-146, World Scientific Publishing, Singapore, 2004.

    [9] I. Kamel and H. Juma, A Lightweight Data Integrity Scheme for Sensor Networks, Sensors, pp.4118-4136, 2011.

    [10] M. Chen, Y. He, and R. L. Lagendijk, A Fragile Watermark Error Detection Scheme for Wireless Video Communications, IEEE Trans. Multimedia, Vol. 7, pp.201-211, 2005.

    [11] C. J. Cheng, L. C. Lin and W. T. Dai, Construction and detection of digital holographic watermarks, Optics Communications, Vol. 248, pp.105-116, 2005.

    下載圖示
    QR CODE