博碩士論文 91523053 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:87 、訪客IP:3.135.182.13
姓名 梁凱雯(Kai-Wen Liang)  查詢紙本館藏   畢業系所 通訊工程學系
論文名稱 基於特徵值空間分解之影像認證系統
(Image Authentication System based on Eigenvalue Decomposition)
相關論文
★ 基於區域權重之衛星影像超解析技術★ 延伸曝光曲線線性特性之調適性高動態範圍影像融合演算法
★ 實現於RISC架構之H.264視訊編碼複雜度控制★ 基於卷積遞迴神經網路之構音異常評估技術
★ 具有元學習分類權重轉移網路生成遮罩於少樣本圖像分割技術★ 具有注意力機制之隱式表示於影像重建 三維人體模型
★ 使用對抗式圖形神經網路之物件偵測張榮★ 基於弱監督式學習可變形模型之三維人臉重建
★ 以非監督式表徵分離學習之邊緣運算裝置低延遲樂曲中人聲轉換架構★ 基於序列至序列模型之 FMCW雷達估計人體姿勢
★ 基於多層次注意力機制之單目相機語意場景補全技術★ 基於時序卷積網路之單FMCW雷達應用於非接觸式即時生命特徵監控
★ 視訊隨選網路上的視訊訊務描述與管理★ 基於線性預測編碼及音框基頻週期同步之高品質語音變換技術
★ 基於藉語音再取樣萃取共振峰變化之聲調調整技術★ 即時細緻可調性視訊在無線區域網路下之傳輸效率最佳化研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在本篇論文中,我們提出基於特徵值空間分解影像認證系統,為期達到對一定範圍內之失真容忍度及區域性認證,此系統以區塊為單位計算影像係數值之統計特性,將區塊內之影像信號作特徵空間之分解,擷取其特徵值作為代表各區塊之數位簽章的來源,加密後傳送,接收端將解密後的特徵值用以認證所收到之影像資訊。
我們將區塊先分成大小相同之子區塊,每一子區塊視為一隨機變數,各子區塊的大小作隨機變數之信號觀測空間以計算其期望值,進而對得到之信號空間作特徵值分解,取其最重要之一到數個特徵值作為一區塊之特徵代表。將取出之特徵代表經過量化後得到對應於各區塊之數位簽章,在認證端計算特徵之方式均與傳送端相同,唯在認證端的量化過程中在各量化區間的邊界處設一模糊區域用以容忍影像區塊之特徵值之小幅度變化。
實驗結果證明此系統以區塊為單位並以特徵值擷取作為數位簽章的方法對於經過常見之影像處理後所造成的失真能達到一定的容忍度,並對於有意義之影像竄改能有高偵測率。
摘要(英) In this thesis, we propose an image authentication system based on eigenvalue decomposition. In order to be incidental distortion tolerant and localization dominating, the feature is extracted on block based.
The feature extracted from each block is depended on the statistical characteristic inside one block. Each block is first divided into sub-blocks with the same size. Each sub-block is considered as an observation signal space of a random variable. Each block has random variables that match the number of sub-blocks. The eigenvalue decomposition operation is done within one image block. The feature is produced from the dominated eigenvalues. The feature is then quantized to generate the final signature for each block.
In the receiver end, the feature of one image block is extracted from the same process in the transmission end, but it is quantized with a neutral zone. The neutral zone can tolerate the small change of the feature caused by the incidental distortions.
The simulation results show that the proposed system works well in tolerating some kinds of image processing and achieves high detection accuracy.
關鍵字(中) ★ 浮水印
★ 影像認證
★ 數位簽章
關鍵字(英) ★ image authentication
★ digital signature
★ watermarking
論文目次 Chapter 1 Introduction 1
1.1 Motivation 1
1.2 Image Authentication Related Researches 5
1.3 Organization 7
Chapter 2 Content Authentication Overview 8
2.1 Transmission Identity and Access Legality 8
2.1.1 Transmission Identity 8
2.1.2 Access Legality 9
2.1.3 Content Authentication 10
2.2 Requirements and Applications of Content Authentication 11
2.2.1 Exact Authentication 11
2.2.2 Selective- Authentication 13
2.2.3Localized Authentication 15
Chapter 3 Image Authentication Techniques 17
3.1 Categories of Image Authentication Techniques 17
3.1.1 Digital Signature Based Approach 17
3.1.2 Watermark-Based Approach 19
3.2 Techniques in Image Authentication 21
3.2.1 Feature Point-based 22
3.2.2 Quantization-based 23
3.2.3 Relation-based 23
Chapter 4 Image Authentication System Based on Eigenvalue Decomposition 24
4.1 System Architecture 24
4.1.1 Transmission End 25
4.1.2 Authentication End 26
4.1.3 Decision of Authentication Result 27
4.2 The Signature Generation Process 29
4.2.1 Block and Subblock Composition 29
4.2.2 Autocorrelation Matrix Construction 30
4.2.3 Eigenvalue Decomposition 33
4.2.4 Feature Extraction 37
4.2.5 Quantization of Block Feature 42
4.3 The Authentication Process 43
4.3.1 Neutral Zone 43
Chapter 5 Simulations and Analysis 45
5.1 Simulation Environment 45
5.2 Incidental Tolerance 48
5.2.1 JPEG compression 48
5.2.2 JPEG 2000 compression 51
5.2.3 Low Pass Filter 53
5.2.4 Medium Filter 56
5.3 Detection Accuracy of Malicious Tampering 58
Chapter 6 Conclusions 63
Bibliography 64
參考文獻 [1] P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. International Conference, vol. 1, no. 4-7, pp. 455 - 459, Oct. 1998.
[2] M. M. Yeung, and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. International Conference, vol. 2 , no. 26-29, pp. 680 - 683, Oct. 1997.
[3] H. Matthew. and Nasir Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking scheme,” IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, Mar. 2000.
[4] M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp, “Hierarchical watermarking for secure image authentication with localization,” in Proc., IEEE Trans., vol. 11, issue: 6, pp. 585 – 595, June 2002.
[5] D. Kundur, and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” in Proc. IEEE, vol. 87, issue: 7, pp. 1167 – 1180, July 1999.
[6] C. Y. Lin and S. F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Trans. Circuits Syst. Video Technol, vol. 11, no. 2, pp. 153 – 168, Feb. 2001.
[7] C. S. Lu and H.-Y.M. Liao, “Structural digital signature for image authentication: an incidental distortion resistant scheme,” IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161 – 173, June 2003.
[8] 游國忠, “應用浮水印技術於影像之智慧財產權保護與認證,”中央大學資訊工程研究所博士論文, 2001.
[9] Bhattacharjee and M. Kutter, “Compression tolerant image authentication,” in Proc. International Conference, vol. 1, no. 4-7, pp. 435 - 439, Oct. 1998.
[10] R. B. Wolfgang and E. J. Delp, “Fragile watermarking using the VW2D watermark.,” in Proc. SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents, vol. 3657, no. 25-27, pp. 204 -213, 1999, San Jose, CA.
[11] M. U. Celik and G. S, A. M. Tekalp, “Localized lossless authentication watermark (LAW),” IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161 – 173, June 2003.
[12] S.C. Byun, I.L. Lee, T.H. Shin, and B.H. Ahn, “A public-key based watermarking for color image authentication,” in Proc. Multimedia and Expo, ICME '02., vol. 1, no. 26-29, pp. 593 - 596, Aug. 2002.
[13] I. Kostopoulos, S. Gilani, A.M. and A.N. Skodras, “Colour image authentication based on a self-embedding technique,” in Proc. Digital Signal Processing,14th International Conference on, vol. 2, no. 1-3, pp. 733 - 736, July 2002.
[14] S. Qibin, S. F. Chang, M. Kurato, and M. Suto, “A quantitative semi-fragile JPEG2000 image authentication system,” in Proc. International Conference on, vol. 2, no. 22-25, pp. II-921 - II-924, Sep. 2002.
[15] S. Bannour, Azimi-Sadjadi and M.R., “Principal component extraction using recursive least squares learning,” IEEE Trans. Neural Networks, vol. 6, no. 2, pp. 457 - 469, Mar. 1995.
指導教授 張寶基(Pao-Chi Chang) 審核日期 2004-7-19
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明