研究生: |
曾瀚逸 |
---|---|
論文名稱: |
適用於數位全像顯微鏡系統影像認證之浮水印法則開發之研究 A Watermarking Algorithm for Holographic Microscopy System Authentication |
指導教授: | 黃文吉 |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2013 |
畢業學年度: | 101 |
語文別: | 中文 |
論文頁數: | 57 |
中文關鍵詞: | 數位全像顯微鏡系統 、認證 、浮水印 |
英文關鍵詞: | Holographic Microscopy System, Authentication, Watermarking |
論文種類: | 學術論文 |
相關次數: | 點閱:125 下載:2 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文提出一個適用於數位全像顯微鏡系統(Digital Holographic Microscopy,
DHM)影像認證的脆弱型浮水印法則,同時提供針對傳送錯誤或是惡意篡改擁有
高敏感度,並且能有效的偵測出來。本法則的浮水印嵌入於離散餘弦轉換
(Discrete Cosine Transform,DCT)域後並沒有做量化。藉由有效的增強全像圖的儲存精度,我們能夠控制因嵌入浮水印而造成的破壞。最後實驗結果也呈現本法
則的浮水印在重建後可以用於過濾破壞的資料或對惡意篡改的偵測。
關鍵字:數位全像顯微鏡系統、認證、浮水印
A fragile watermarking algorithm for hologram authentication is presented in this paper. While providing high perceptual transparency, the proposed algorithm attains high performance detection to delivery errors and malicious tampering. In the proposed algorithm, the watermark is embedded in the discrete cosine transform (DCT) domain of a hologram without quantization. The distortion produced by the watermark can be controlled. It can be effectively lowered by enhancing the precision for storing the watermarked hologram pixels. Experimental results reveal that the proposed algorithm can be used as a filter for blocking polluted or tampered holograms from reconstruction.
[1] G. Sivathanu, C. P. Wright, and E. Zadok, Ensuring Data Integrity in Storage: Techniques and Applications, Proc. International Workshop on Storage Security and Survivabil-ity, pp.26-36, 2005.
[2] A. Perrig, B. Przydatek, and D. Song, SIA: Secure Information Aggregation in Sensor Networks. J. Comput. Secur. pp. 69-102, 2007.
[3] M. Wu and B. Liu, Watermarking for image authentication, in Proc. IEEE Int. Conf. Image Processing, pp. 437441, 1998.
[4] H. T. Chang and C. L. Tsan, Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain, Applied Optics, pp.6211-6219, 2005.
[5] J. Li, Robust image watermarking scheme against geometric attacks using a computer-generated hologram, Applied Optics, pp.6302-6312, 2010.
[6] N. K. Nishchal, T. Pitkaaho, and T.J., Naughton, Digital Fresnel Hologram Watermarking, Proc. Euro-American Workshop on Information Optics, 2010.
[7] C. I. Podilchuk and E. J. Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, pp.33-46, 2001.
[8] C.H. Huang, J.S. Pan, and H.M. Hang, Watermarking Based on Spatial Domain, Chapter 5 of the Book Intelligent Watermarking Techniques, Editors, J.S. Pan, H.C. Huang and L.C.Jain, pp.135-146, World Scientific Publishing, Singapore, 2004.
[9] I. Kamel and H. Juma, A Lightweight Data Integrity Scheme for Sensor Networks, Sensors, pp.4118-4136, 2011.
[10] M. Chen, Y. He, and R. L. Lagendijk, A Fragile Watermark Error Detection Scheme for Wireless Video Communications, IEEE Trans. Multimedia, Vol. 7, pp.201-211, 2005.
[11] C. J. Cheng, L. C. Lin and W. T. Dai, Construction and detection of digital holographic watermarks, Optics Communications, Vol. 248, pp.105-116, 2005.