中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/9461
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 41664982      線上人數 : 1617
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/9461


    題名: 以視覺特徵擷取為基礎之影像視訊內容認證技術;Robust Visual Feature Extraction for Image/Video Content Authentication
    作者: 張鴻閔;Hong-min Chang
    貢獻者: 資訊工程研究所
    關鍵詞: 特徵擷取;內容認證;視訊;影像;authentication;feature extraction
    日期: 2007-07-11
    上傳時間: 2009-09-22 11:48:15 (UTC+8)
    出版者: 國立中央大學圖書館
    摘要: 數位多媒體壓縮技術純熟與網路的快速發展使得數位化的影像、視訊等多媒體資料兼顧高品質與體積小,並且對於多媒體的發佈變也便的容易許多。由於數位多媒體資料易於編輯與複製的特性,使得數位化的資料易受竄改,使得多媒體資料的真實性(autnetity)與完整性(intergrity)受到質疑。多媒體的驗證主要目的為了確保數位多媒體資料的完整性與真實性避免受到竄改。在本篇論文中,提出一個以數位簽章為基礎的強健的影像/視訊驗證系統。主要透過量化編碼的方式取得區塊內容特徵的擷取形成驗證碼,再經由壓縮加密隨著影像/視訊傳送或儲存。對於惡意的竄改發出警告,其利用畫面資訊的區域性標示出竄改區塊;而對於影像/視訊的有損壓縮,像是JPEG、H.264/AVC等類型的合法操作,均能夠通過我們的驗證系統。更提出在H.264/AVC的監視系統下的改良方法,使我們系統產生的驗證碼長度小與提升驗證的效率,且不會影響驗證的準確率。 The creation and distribution of digital contents have become increasingly convenient these days thanks to the rapid growth of digital signal processing techniques and broadband networking infrastructure. Editing digital images/videos, which was thought to be only achievable by professionals, can now be done with inexpensive and widely available software and hardware. A content authentication scheme for digital images and videos is proposed in this research. In order to avoid the content from being unnoticeably tampered by using digital editing facilities, reliable visual features are extracted as the authentication code and transmitted along with the images and videos. The integrity of content in a picture or a frame can thus be guaranteed by comparing the similarity between the transmitted authentication code and the extracted feature. The features are sensitive to malicious modification of data but are resilient to allowed lossy compression. The receiver can calculate the similarity between the transmitted digest and the extracted one to determine if the content has been tampered. The tampered region can even be located to help identify the motivation of the attacker. Experimental results show the feasibility of the proposed algorithm.
    顯示於類別:[資訊工程研究所] 博碩士論文

    文件中的檔案:

    檔案 大小格式瀏覽次數


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明