中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/8634
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 80990/80990 (100%)
Visitors : 41662547      Online Users : 2001
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8634


    Title: 利用離散餘弦轉換與錯誤控制方法作數位浮水印;Digital Watermarking using DCT and Error Control Scheme
    Authors: 吳皇欣;Huang-Hsin Wu
    Contributors: 資訊工程研究所
    Keywords: 理德-索羅門碼;錯誤控制;離散餘弦轉換;資料隱藏;數位浮水印;Reed-Solomon Code;Error Control;Discrete Cosine Transform;Data Hiding;Digital Watermark
    Date: 2002-06-28
    Issue Date: 2009-09-22 11:32:07 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 隨著通訊網路的快速發展,多媒體的檔案能夠輕鬆地被大眾廣為流傳、散播。由於數位產品相當容易遭到複製,所以未被授權的複製品和電子文件將會是真正的挑戰。為了防止非法剽竊的行為且保障合法認證不被侵犯,數位浮水印技術是相當迫切需要的。 我們提出了一個結合兩個方法的系統,一方面是將二值化後的浮水印影像,利用修改經過量化後的中頻係數來作隱藏,另一方面是使用錯誤更正方法,也就是Reed-Solomon codes,來增加對於非法的攻擊之強韌性。前者的方法具有能夠在經過破壞性的壓縮後仍能倖存的能力,其中的破壞性壓縮如:JPEG或JPEG2000;而後者則能夠抵抗突發性或連續性的雜訊,像是影像處理中的裁切,且還可能對於前面提到的對破壞性壓縮的抵抗力有所助益。實驗的結果證實了我們提出數位浮水印方法的可行性與可靠性。 The rapid growth of communication networks allows the widespread distribution of multimedia data in various ways. Since the digital productions are easy to be duplicated, the discouraging unauthorized clone and the illegal distributing of electronic documents are the issues that have to be resolved. For the purpose of protection against the pirate, digital watermarking techniques are emerged to defend the authentication to be infringed. In this thesis, we present a combined approach that embeds a binary watermark by selectively modifying the quantized middle-frequency coefficients and use an error control scheme, namely Reed-Solomon codes, to increase the robustness of prevention of illegal attacks. The former is capable of surviving in the lossy compression, such as JPEG or JPEG2000, and the latter owns the ability of resisting burst noise, such as image cropping while increasing the affection of the former. Experimental results demonstrate that our proposed digital watermarking approach is feasible and effectiveness.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File SizeFormat


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明