博碩士論文 78325035 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:5 、訪客IP:3.85.214.0
姓名 游國忠(Gwo-Jong Yu)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 應用數位浮水印技術於影像之智慧財產權保護與認證
(Digital Image Watermarking for Copyright Protection and Authentication)
相關論文
★ 無線行動隨建即連網路上之廣播與繞徑問題★ 熱門電影的高效能廣播演算法
★ 無線行動隨建即連網路上之媒體存取問題★ 使用功率調整來增加多節點封包無線網路
★ 在無線行動隨建即用網路下Geocast 之設計與實做經驗★ 一個適用於熱門隨選視訊服務之快速排程廣播策略
★ 在寬頻分碼多重擷取技術上分配及再分配多重正交可變展頻係數碼★ 無線行動隨建即連網路上之廣播排程協定
★ 在無線行動隨建即連網路下支援即時多媒體傳送的媒介存取協定★ 以樹狀結構為基礎的Scatternet建構協定
★ 在無線感應器網路中具有省電機制並且採用對角線路徑的方向性擴散★ 隨意型無線網路上一個具有能量保存的GRID繞徑協定
★ 在無線感應器網路中具有省電機制的傳輸協定★ 隨意型無線網路上一個具有能量保存以及平衡的繞徑協定
★ 環形藍芽網路:一個藍芽通訊網路的新拓樸及其繞徑協定★ 在多連結無線隨意行動網路上路徑的生命週期
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 近年來,數位化科技的進步與網際網路的發達使得資料存在的形式逐漸由實體化轉成數位化。數位化後的內容具有無失真快速傳播與複製的優點。然而,如刀之兩刃,數位科技也同時帶給仿冒者更多的機會剽竊原作者的創意與所有權。為了解決這個問題,在這篇論文中我們利用數位浮水印技術保護數位影像的智慧財產權以及偵測影像內涵是否遭惡意竄改。由於數位浮水印技術可分為強健式浮水印 (Robust Watermarking)、易碎式浮水印 (Fragile Watermarking) 及標題式浮水印 (Captioning Watermarking)。針對前兩類浮水印技術,我們各提出一個方法解決影像之智慧財產權保護與影像內涵認證之問題。關於第三類問題,我們將應用現有的浮水印技術解決身份證影印本認證的問題。
摘要(英) The advances of digital techniques and Internet have promoted the style of contents from physical form to digital form. Digitized contents can be distributed and duplicated rapidly without any degradation. This property is both an advantage and a drawback of digital technique. Pirate may distribute or modify digitized contents without the permission of the creator or owner. This behaviour will be of no doubt a threat to daily digital life. The objective of this dissertation is to investigate how to protect the ownership and contents of digital images using the technique of digital watermarking. According to different purposes, watermark technology can be categorized into robust, fragile, and captioning watermarking. In this dissertation, we will propose techniques to solve the problem of copyright protection, content authentication, and copied ID card authentication using robust, fragile and captioning watermarking, respectively.
In the first part of this dissertation, we will design a message-based robust watermarking system which is much more flexible than conventional noise-type and logo-type watermarking system. Usually, user can input a message-type watermark directly through a keyboard and this flexibility makes a message-based watermarking system a great copyright protection tool. The proposed system consists of a robust cocktail watermarking modulation scheme and a powerful coding mechanism which integrates Hadamard code and backpropagation neural network. Experimental results reveal that the embedded message can be reliably extracted even if the cover image is attacked by image processing.
The second part of the dissertation will focus on developing a powerful image authentication system which can detect malicious tampering while tolerating incidental modifications. Since a fragile watermark can be destroyed easily by small amount of modification, we can use this property to detect the area in which a malicious attack has been imposed. However, fragile watermark can not tolerate incidental distortion also. To detect the area which are maliciously tampered with and to tolerate the modification which is applied incidentally simultaneously, the semi-fragile watermarks can be applied to achieve the goal. For achieving this goal, we propose a semi-fragile watermarking system based on a mean-quantization based watermarking approach which increase the robustness of conventional quantization-based fragile watermarking. We derived a method to determine the most suitable amount of robustness and fragility of semi-fragile watermark such that the embedded watermark is robust to incidental distortion and fragile enough to detect the area which is tampered with. Experimental results reveal that the proposed method is effective in distinguishing an instance of malicious tampering from a incidental distortion.
In the third part of this dissertation, we try to investigate the practical applications of a watermarking system. We propose a copied ID card authentication system based on face watermarking. The proposed system authenticates an copied ID card by checking the integrity between the clear text shown in ID card and the hidden text embedded in a photo image on ID card. The proposed system adopts a morphology-based face detection technique to detect the face on an ID card. Then, the detected face image is then used as side information during the watermark embedding/extraction for achieving blind detection purpose. The copied ID card is regarded as authentic if the hidden text is consistent with the explicit one.
Otherwise, the copied ID card is treated as a fake one. Preliminary experimental results are provided to illustrate the concepts. A complete system will be implemented in the future work.
關鍵字(中) ★ 影像認證
★ 智慧財產權保護
★ 浮水印
★ 多媒體保護
關鍵字(英) ★ Image Authentic
★ Copyright Protection
★ Watermark
論文目次 Cover
Contents
1 Introduction
1.1 Statement of the Problem
1.2 Issues to be Investigated
1.3 Main Contributions
1.4 Organization of the Dissertation
2 Literature Review
2.1 Generic Watermarking Model
2.2 Basic Requirements of Digital Watermarking
2.3 Robust Watermarking
2.4 Fragile Watermarking
2.5 Captioning Watermarking
3 Message-Based Watermarking
3.1 Introduction
3.2 Review of Cocktail Watermarking
3.3 The Proposed Message-based Watermarking System
3.4 Performance Analysis
3.5 Experimental Results
3.6 Summary
4 Image Authentication by Mean Quantization
4.1 Introduction
4.2 Mean Quantization: A New Mechanism to Achieve Better Authentication
4.3 Tampered Area Estimation using Information Fusion
4.4 Experimental Results
4.5 Summary
5 Application of Face Watermarking to ID Card Authentication
5.1 Introduction
5.2 The Proposed System
5.3 Applied Techniques
5.4 Preliminary Experimental Results
5.5 Discussion
5.6 Summary
6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Wo
參考文獻 begin{thebibliography}{100}
bibitem{Alghoniemy00b}
M.~Alghoniemy and A.~H. Tewfik.
newblock Geometric distortion correction in image watermarking.
newblock In { em Proceedings of SPIE: Security and Watermarking of Multimedia
Contents II}, volume 1397, San Jose, January 2000.
bibitem{Alghoniemy00a}
M.~Alghoniemy and A.~H. Tewfik.
newblock Geometric distortion correction through image normalization.
newblock In { em Proceedings of IEEE 2000 International Conference on
Multimedia Expo}, volume~3, pages 1291--1294, August 2000.
bibitem{Alghoniemy00}
M.~Alghoniemy and A.~H. Tewfik.
newblock Image watermarking by moment invariants.
newblock In { em Proceedings of IEEE 2000 Internal Conference on Image
Processing}, volume~2, pages 73--76, Vancouver, B.C., Canada, October 2000.
bibitem{Barni1998}
M.~Barni, F.~Bartolini, B.~Cappellini, and A.~Piva.
newblock A {DCT}-domain system for robust image watermarking.
newblock { em Signal Processing}, 66:357--372, 1998.
bibitem{Baudry00}
S.~Baudry, P.~Nguyen, and H.~Ma ^{i}ta.
newblock Channel coding in video watermarking: use of soft decoding to improve
the watermark retrieval.
newblock In { em Proceedings of IEEE 2000 International Conference on Image
Processing}, volume~3, pages 25--28, Vancouver, Canada, September 2000.
bibitem{Benedens1999}
O.~Benedens.
newblock Geometry-based watermarking of 3{D} models.
newblock { em IEEE Computer Graphics and Application}, 19(1):46--55, 1999.
bibitem{Benedens1999b}
O.~Benedens.
newblock Two high capacity methods for embedding public watermarks into 3{D}
polygonal models.
newblock In { em Proceedings of the Multimedia and Security Workshop at ACM
Multimedia'99}, pages 95--99, 1999.
bibitem{Benedens1999a}
O.~Benedens.
newblock Watermarking of 3{D} polygon based models with robustness against
mesh simplification.
newblock In { em Proceedings of SPIE: Security and Watermarking of Multimedia
Contents}, volume 3657, pages 329--340, 1999.
bibitem{Benedens2000}
O.~Benedens and C.~Busch.
newblock Towards blind detection of robust watermarks in polygonal models.
newblock { em Proceedings of the EUROGRAPHICS 2000: Computer Graphics Forum},
19(3):199--208, 2000.
bibitem{Berrou93}
C.~Berrou, A.~Glavieux, and P.~Thitimajshaima.
newblock Near shannon limit error-correcting coding: turbo codes.
newblock In { em Proceeding of IEEE 1993 International Conference on
Communications}, volume~4, pages 1064--1070, May 1993.
bibitem{Bhattacharjee98}
S.~Bhattacharjee and M.~Kutter.
newblock Compression tolerant image authentication.
newblock In { em Proceedings of IEEE 1998 International Conference on Image
Processing}, volume~1, pages 4--7, Chicago, USA, October 1998.
bibitem{Kutter1998a}
S.~Bhattacharjee and M.~Kutter.
newblock Compression tolerant image authentication.
newblock In { em Proceedings of IEEE 1998 International Conference on Image
Processing (ICIP'98)}, volume~1, pages 435--439, Chicago, USA, October 1998.
bibitem{Bloom1999}
J.~A. Bloom, I.~J. Cox, T.~Kalker, J.-P. M.~G. Linnartz, M.~L. Miller, and
C.~B.~S. Traw.
newblock Copy protection for dvd video.
newblock { em Proceedings of the IEEE}, 87(7):1267--1276, July 1999.
bibitem{Brassil1999}
J.~T. Brassil, S.~Low, and N.~F. Maxemchuk.
newblock Copyright protection for the electronic distribution of text
documents.
newblock { em Proceedings of the IEEE}, 87(7):1181--1196, July 1999.
bibitem{Chen2000}
B.~Chen.
newblock { em Design and Analysis of Digital Watermarking, Information
Embedding, and Data Hiding System}.
newblock PhD thesis, Massachusetts Institute of Technology, 2000.
bibitem{Cohen92}
A.~Cohen, I.~Daubechies, and J.~C. Feauveau.
newblock Biorthogonal bases of compactly supported wavelets.
newblock { em Communications on Pure and Applied Mathematics}, 45:485--560,
1992.
bibitem{Cover91}
T.~M. Cover and J.~A. Thomas.
newblock { em Elements of Information Theory}.
newblock John Wiley { &} Sons, Inc, 1991.
bibitem{Cox97}
I.~J. Cox, J.~Kilian, F.~T. Leighton, and T.~Shamoon.
newblock Secure spread spectrum watermarking for multimedia.
newblock { em IEEE Transactions on Image Processing}, 6(12):1673--1686,
December 1997.
bibitem{Cox1999}
I.~J. Cox, M.~L. Miller, and A.~L. Mckellips.
newblock Watermarking as communication with side information.
newblock { em Proceedings of the IEEE}, 87(7), July 1999.
bibitem{Craver1998}
S.~Craver, N.~Memon, B.-L. Yeo, and M.~M. Yeung.
newblock Resolving rightful ownerships with invisible watermarking technique:
limitations, attacks, and implications.
newblock { em IEEE Journal on Selected Areas in Communications},
16(4):573--586, May 1998.
bibitem{Csurka99}
G.~Csurka, F.~Deguillaume, and J.~J.~O. Ruanaidh.
newblock A {B}ayesian approach to affine transformation resistant image and
video.
newblock In { em Proceedings of Information Hiding Workshop}, LNCS 1768, pages
270--285, 1999.
bibitem{Delaigle1998}
J.~Delaigle, C.~D. Vleeschouwer, and B.~Macq.
newblock Watermarking algorithm based on a human visual model.
newblock { em Signal Processing}, 66:319--335, 1998.
bibitem{Dittmann99}
J.~Dittmann, A.~Steinmetz, and R.~Steinmetz.
newblock Content-based digital signature for motion pictures authentication
and content-fragile watermarking.
newblock In { em Proceedings of International Conference on Multimedia
Computing and Systems}, volume~II, pages 209--213, Italy, 1999.
bibitem{Dugelay2000}
J.-L. Dugelay and F.~A.~P. Petitcolas.
newblock Image watermarking: possible counter-attacks against random geometric
distortion.
newblock In { em Proceedings of SPIE: Security and Watermarking of Multimedia
Contents II}, volume 3971, San Jose, California, USA, January 2000.
bibitem{Fridrich98}
J.~Fridrich.
newblock Image watermarking for tamper detection.
newblock In { em Proceedings of IEEE 1998 International Conference on Image
Processing}, volume~2, pages 404--408, Chicago, USA, 1998.
bibitem{Friedman93}
G.~L. Friedman.
newblock The trustworthy digital camera: Restoring credibility to the
photographic image.
newblock { em IEEE Transactions on Consumer Electronics}, 39:905--910, October
1993.
bibitem{Gray1998}
R.~M. Gray and D.~L. Neuhoff.
newblock Quantization.
newblock { em IEEE Transactions on Information Theory}, 44(6):1--63, October
1998.
bibitem{Han2000}
C.-C. Han, H.-Y.~M. Liao, G.-J. Yu, and L.~H. Chen.
newblock Fast face detection via morphology-based pre-processing.
newblock { em Pattern Recognition}, 33:1701--1712, 2000.
bibitem{Hartung1998}
F.~Hartung and B.~Girod.
newblock Watermarking of uncompressed and compressed video.
newblock { em Signal Processing}, 66(3):283--301, May 1998.
bibitem{Hartung1999}
F.~Hartung and M.~Kutter.
newblock Multimedia watermarking techniques.
newblock { em Proceedings of the IEEE}, 87(7):1079--1107, July 1999.
bibitem{Hartung2000}
F.~Hartung and F.~Ramme.
newblock Digital rights management and watermarking of multimedia content for
m-commerce application.
newblock { em IEEE Communications Magazine}, 38(11):78--84, November 2000.
bibitem{Hartung1999a}
F.~Hartung, J.~K. Su, and B.~Girod.
newblock Spread spectrum watermarking: malicious attacks and counterattacks.
newblock In { em Proceedings of SPIE: Security and Watermarking of Multimedia
Contents}, volume 3657, pages 147--158, San Jose, CA, January 1999.
bibitem{Hernandez00}
J.~R. Hern '{a}ndez, M.~Amado, and F.~P '{e}rez-Gonz '{a}lez.
newblock {DCT}-domain watermarking techniques for still image: detector
performance analysis and a new structure.
newblock { em IEEE Transactions on Image Processing}, 9(1):55--68, January
2000.
bibitem{Hogg95}
R.~V. Hogg and A.~T. Craig.
newblock { em Introduction of Mathematical Statistics}.
newblock Prentice Hall, 1995.
bibitem{Jain95}
R.~Jain, R.~Kasturi, and B.~G. Schunck.
newblock { em Machine Vision}.
newblock MacGraw-Hill, Inc., 1995.
bibitem{Sung1998}
K.K.Sung and T.~Poggio.
newblock Example-based learning for view-based human face detection.
newblock { em IEEE Transactions on Pattern Analysis and Machine Intelligence},
20(1):39--51, Jaunary 1998.
bibitem{Kundur1999}
D.~Kundur.
newblock { em Multiresolution Digital Watermarking: Algorithms and
Implications for Multimedia Signals}.
newblock PhD thesis, University of Toronto, 1999.
bibitem{Kundur00a}
D.~Kundur.
newblock Energy allocation for high-capacity watermarking in the presence of
compression.
newblock In { em Proceedings of IEEE 2000 International Conference on Image
Processing}, volume~1, pages 423--426, Vancouver, Canada, September 2000.
bibitem{Kundur98}
D.~Kundur and D.~Hatzinakos.
newblock Towards a telltale watermarking technique for tamper-proofing.
newblock In { em Proceedings of IEEE 1998 International Conference on Image
Processing}, volume~2, pages 409--413, Chicago, USA, October 1998.
bibitem{Kundur99}
D.~Kundur and D.~Hatzinakos.
newblock Digital watermarking for telltale tamper proofing and authentication.
newblock { em Proceedings of the IEEE}, 87(7):1167--1180, July 1999.
bibitem{Kutter1998}
M.~Kutter.
newblock Watermarking resisting to translation, rotation and scaling.
newblock In { em Proceedings of SPIE: Multimedia Systems and Applications},
volume 3528, pages 423--431, Boston, USA, November 1998.
bibitem{Kutter1999}
M.~Kutter.
newblock { em Digital Image Watermarking: Hiding information in Images}.
newblock PhD thesis, University of Rhode Island, Kingston, USA, 1999.
bibitem{Kutter99}
M.~Kutter.
newblock Performance improvement of spread spectrum based image watermarking
schemes through {M}-ary modulation.
newblock In { em Proceedings of Information Hiding Workshop}, LNCS 1768, pages
237--252, Dresden, Germany, September 1999.
bibitem{Kutter00}
M.~Kutter.
newblock Digital watermarking: a new concept for the digital age-slice, 2000.
bibitem{Kutter}
M.~Kutter, S.~K. Bhattacharjee, and T.~Ebrahimi.
newblock Toward second generation watermarking scheme.
newblock In { em Proceedings of IEEE 1999 International Conference on Image
Processing}, volume~1, pages 320--323, Kobe, Japan, October 1999.
bibitem{Kutter1998b}
M.~Kutter, F.~Jordan, and F.~Bossen.
newblock Digital signature of color images using amplitude modulation.
newblock { em Journal of Electronic Imaging}, 7(2):326--332, April 1998.
bibitem{Langelaar1998}
G.~Langelaar, R.~Lagendijk, and J.~Biemond.
newblock Removing spatial spread spectrum watermarks by non-linear filtering.
newblock In { em Proceedings of European Signal Processing Conference (EUSIPCO
98)}, pages 2281--2284, Rhodes, Greece, September 8-11 1998.
bibitem{Lin2000}
C.-Y. Lin.
newblock { em Watermarking and Digital Signature Techniques for Multimedia
Authentication and Copyright Protection}.
newblock PhD thesis, Columbia University, 2000.
bibitem{Lin98a}
C.-Y. Lin and S.-F. Chang.
newblock Generating robust digital signature for image/video authentication.
newblock In { em Proceedings of Multimedia and Security Workshop at ACM
Multimedia 98}, Bristol, UK, September 1998.
bibitem{Lin98}
C.-Y. Lin and S.-F. Chang.
newblock A robust image authentication method surviving {JPEG} lossy
compression.
newblock In { em Proceedings of SPIE: International Conference on Storage and
Retrieval of Image/Video Database}, volume 3312, San Jose, USA, January 1998.
newblock EI'98.
bibitem{Lin99}
C.-Y. Lin and S.-F. Chang.
newblock Issues and solutions for authenticating {MPEG} video.
newblock In { em Proceedings of SPIE International Conference on Security and
Watermarking of Multimedia Contents}, volume 3657, San Jose, USA, January
1999.
newblock EI'99.
bibitem{Lin2001}
C.-Y. Lin, M.~Wu, J.~A. Bloom, M.~L. Miller, and I.~J. Cox.
newblock Rotation, scale and translation resilient public watermarking for
images.
newblock { em IEEE Transactions on Image Processing}, 10(5):767--782, May
2001.
bibitem{Looney97}
C.~G. Looney.
newblock { em Pattern Recognition Using Neural Networks: Theory and Algorithm
for Engineers and Scientists}.
newblock Oxford University Press, 1997.
bibitem{Lu00b}
C.~S. Lu, S.~K. Huang, C.~J. Sze, and H.~Y.~M. Liao.
newblock Cocktail watermarking for digital image protection.
newblock { em IEEE Transactions on Multimedia}, 2(4):209--224, December 2000.
bibitem{Lu00a}
C.~S. Lu and H.~Y.~M. Liao.
newblock Oblivious cocktail watermarking by sparse code shrinkage: A regional-
and global-based scheme.
newblock In { em Proceedings of IEEE 2000 International Conference on Image
Processing}, volume~3, pages 13--16, Vancouver, Canada, October 2000.
bibitem{Lu2001}
C.-S. Lu and H.-Y.~M. Liao.
newblock An oblivious and robust watermarking scheme using
communications-with-side-information mechanism.
newblock In { em Proceeding of $2^{nd}$ IEEE International Conference on
Information Technology: Coding and Computing (Special Section on Multimedia
Security and Watermarking Applications)}, pages 103--107, Las Vegas, Nevada,
USA, 2001.
newblock (invited paper).
bibitem{Macwilliams96}
F.~J. Macwilliams and N.~J.~A. Sloane.
newblock { em The Theory of Error-Correcting Codes}.
newblock North-Holland, 1996.
bibitem{Moulin00}
P.~Moulin, M.~K. Mih c{c}ak, and G.-I.~A. Lin.
newblock An information-theoretic model for image watermarking and data
hiding.
newblock In { em Proceedings of IEEE 2000 International Conference on Image
Processing}, volume~3, pages 667--670, Vancouver, Canada, September 2000.
bibitem{Mukherjee00}
D.~Mukherjee, J.~J. Chae, S.~K. Mitra, and B.~S. Manjunath.
newblock A source and channel-coding framework for vector based data hiding in
video.
newblock { em IEEE Transactions on Circuits and Systems for Video Technology},
10(4):630--645, June 2000.
bibitem{Nikolaidis00}
A.~Nikolaidis and I.~Pitas.
newblock Robust watermarking of facial image based on salient geometric
pattern matching.
newblock { em IEEE Transactions on Multimedia}, 2(3):172--184, December 2000.
bibitem{Nikolaidis2000}
A.~Nikolaidis and I.~Pitas.
newblock Robust watermarking of facial images based on salient geometric
pattern matching.
newblock { em IEEE Transactions on Multimedia}, 2(3):172--184, September 2000.
bibitem{Nikolaidis1998}
N.~Nikolaidis and I.~Pitas.
newblock Robust image watermarking in the spatial domain.
newblock { em Signal Processing}, 66(3):385--403, May 1998.
bibitem{Pei1995}
S.-C. Pei and C.-N. Lin.
newblock Image normalization for pattern recognition.
newblock { em Image and Vision Computing}, 13(10):711--723, December 1995.
bibitem{Pereira00}
S.~Pereira and T.~Pun.
newblock Robust template matching for affine resistant image watermarking.
newblock { em IEEE Transactions on Image Processing}, 9(6):1123--1129, June
2000.
bibitem{Peterson95}
R.~L. Peterson, R.~E. Ziemer, and D.~E. Borth.
newblock { em Introduction to Spread Spectrum Communications}.
newblock Prentice Hall, 1995.
bibitem{Petitcolas00}
F.~A. Petitcolas.
newblock Watermarking schemes evaluation.
newblock { em IEEE Signal Processing Magazine}, 17(5):58--64, September 2000.
bibitem{Petitcolas1999a}
F.~A.~P. Petitcolas and R.~J. Anderson.
newblock Evaluation of copyright marking systems.
newblock In { em Proceedings of IEEE International Conference on Multimedia
System (ICMCS'99)}, volume~1, pages 574--579, Florence, Italy, June 1999.
bibitem{Petitcolas1998}
F.~A.~P. Petitcolas, R.~J. Anderson, and M.~G. Kuhn.
newblock Attacks on copyright marking systems.
newblock In D.~Aucsmith, editor, { em Proceedings of Second International
Workshop on Information Hiding, IH'98}, volume LNCS 1525, pages 219--239,
Portland, Oregon, USA, April 1998. Springer-Verlang.
bibitem{Petitcolas1999}
F.~A.~P. Petitcolas, R.~J. Anderson, and M.~G. Kuhn.
newblock Information hiding-{A} survey.
newblock { em Proceedings of the IEEE}, 87(7):1062--1078, July 1999.
bibitem{Poli92}
A.~Poli and L.~C. Huguet.
newblock { em Error Correcting Codes: Theory and Applications}.
newblock Prentice Hall, 1992.
bibitem{Queluz99}
M.~P. Queluz.
newblock Content based integrity protection of digital images.
newblock In { em Proceedings of SPIE: International Conference on Security and
Watermarking of Multimedia Contents}, volume 3657, pages 85--93, San Jose,
USA, January 1999.
newblock EI'99.
bibitem{Ramkumar2000}
M.~Ramkumar.
newblock { em Data Hiding in Multimedia-Theory and Applications}.
newblock PhD thesis, New Jersey Institute of Technology, 2000.
bibitem{Rowley1998}
H.~A. Rowley, S.~Baluja, and T.~Kanade.
newblock Neural network-based face detection.
newblock { em IEEE Transactions on Pattern Analysis and Machine Intelligence},
20(1):23--28, January 1998.
bibitem{Ruanaidh98}
J.~J.~{ 'O}. Ruanaidh and J.~Pun.
newblock Rotation, scale and translation invariant spread spectrum digital
image watermarking.
newblock { em Signal Processing}, 66(3):303--317, May 1998.
bibitem{Schneider96}
M.~Schneider and S.-F. Chang.
newblock A robust content based digital signature for image authentication.
newblock In { em Proceedings of IEEE 1996 International Conference on Image
Processing}, Laussane, Switzerland, October 1996.
bibitem{Sklar1997}
B.~Sklar.
newblock A primer on turbo code concepts.
newblock { em IEEE Communication Magazine}, 35(12):94--102, December 1997.
bibitem{Stone1996}
H.~Stone.
newblock Analysis of attacks on image watermarks with randomized coefficients.
newblock Technical report, NEC Research Institute, May 1996.
bibitem{JKSu1999}
J.~K. Su and B.~Girod.
newblock On the robustness and imperceptibility of digital fingerprints.
newblock In { em Proceedings of IEEE 1999 International Conference on
Multimedia Computing and Systems (ICMCS'99)}, volume~2, pages 530--535,
Florence, Italy, June 1999.
bibitem{Su1999}
P.-C. Su, H.~Wang, and C.-C.~J. Kuo.
newblock Digital image watermarking in region of interest.
newblock In { em IS &T's Image Processing, Image Quality, Image Capture
Systems (PICS) Conference}, Savannah, Georgia, April 1999.
bibitem{Swanson1998}
M.~D. Swanson, B.~Zhu, A.~H. Tewfik, and L.~Boney.
newblock Robust audio watermarking using perceptual masking.
newblock { em Signal Processing}, 66(3):337--355, May 1998.
bibitem{Takeshita2000}
O.~Y. Takeshita and D.~J. Costello.
newblock New deterministic interleaver designs for turbo codes.
newblock { em IEEE Transactions on Information Theory}, 46(6):1988--2006,
September 2000.
bibitem{Tirkel1998}
A.~Tirkel, C.~Osborne, and T.~Hall.
newblock Image and watermark registration.
newblock { em Signal Processing}, 66(3):373--383, May 1998.
bibitem{VanTrees1968}
H.~L.~V. Trees.
newblock { em Detection, Estimation, and Modulation Theory}.
newblock John Wiley & Sons, 1968.
bibitem{Voloshyovskiy01}
S.~Voloshyovskiy, F.~Deguillanme, S.~Pereira, and T.~Pun.
newblock Optimal adaptive diversity watermarking with channel state
estimation.
newblock In { em Proceedings of SPIE: Photonics West, Electronic Imaging 2001,
Security and Watermarking of Multimedia Contents III}, San Jose, CA, ISA,
January 2001.
newblock paper 4314-74.
bibitem{Wang1998}
H.-J.~M. Wagner, P.-C. Su, and C.-C.~J. Kuo.
newblock Wavelet-based digital image watermarking.
newblock { em Optics Express}, 3(12):491--496, December 1998.
bibitem{Wagner2000}
M.~G. Wagner.
newblock Robust watermarking of polygonal meshes.
newblock In { em Proceedings of Geometric Modeling and Processing 2000: Theory
and Applications}, pages 201--208, 10-12 April 2000.
bibitem{Walton95}
S.~Walton.
newblock Image authentication for a slippery new age.
newblock { em Dr. Dobb's Journal}, pages 18--26, April 1995.
bibitem{Watson97}
A.~B. Watson, G.~Y. Yang, J.~A. Solomon, and J.~Villasenor.
newblock Visibility of wavelet quantization noise.
newblock { em IEEE Transactions on Image Processing}, 6(8):1164--1175, August
1997.
bibitem{Wolfgang99}
R.~B. Wolfgang and E.~J. Delp.
newblock Fragile watermarking using the {VM2D} watermark.
newblock In { em Proceedings of SPIE International Conference on Security and
Watermarking of Multimedia Contents}, pages 204--213, San Jose, CA, January
1999.
newblock paper 3657-22, EI'99.
bibitem{Wolfgang1999a}
R.~B. Wolfgang, C.~I. Podilchuk, and E.~J. Delp.
newblock Perceptual watermarks for digital images and video.
newblock { em Proceedings of the IEEE}, 87(7):1108--1126, July 1999.
bibitem{Wong98}
P.~W. Wong.
newblock A public key watermark for image verification and authentication.
newblock In { em Proceedings of IEEE 1998 International Conference on Image
Processing}, volume~1, pages 455--459, Chicago, USA, October 1998.
bibitem{Wu99}
C.~W. Wu, D.~Coppersmith, F.~Mintzer, C.~P. Tresser, and M.~Yeung.
newblock Fragile imperceptible digital watermark with privacy control.
newblock In { em Proceedings of SPIE International Conference on Security and
Watermarking of Multimedia Contents}, San Jose, USA, January 1999.
newblock paper 3657-22, EI'99.
bibitem{Wu2001}
M.~Wu.
newblock { em Multimedia Data Hiding}.
newblock PhD thesis, Princeton University, 2001.
bibitem{Wu98}
M.~Wu and B.~Liu.
newblock Watermarking for image authentication.
newblock In { em Proceedings of IEEE 1998 International Conference on Image
Processing}, volume~2, pages 437--441, Chicago, USA, October 1998.
bibitem{Xie98}
L.~Xie and G.~R. Arce.
newblock A blind wavelet based digital signature for image authentication.
newblock In { em Proceedings of the EUSIPCO 98}, Island of Phodes, Greece,
September 1998.
bibitem{Xie98a}
L.~Xie and G.~R. Arce.
newblock Joint wavelet compression and authentication watermarking.
newblock In { em Proceedings of IEEE 1998 International Conference on Image
Processing}, volume~2, pages 427--431, Chicago, USA, 1998.
bibitem{Yeung97}
M.~Yeung and F.~Mintzer.
newblock An invisible watermarking technique for image verification.
newblock In { em Proceedings of IEEE 1997 International Conference on Image
Processing}, Santa Barbara, USA, October 1997.
bibitem{Yu2000}
G.-J. Yu, C.-S. Lu, and H.-Y.~M. Liao.
newblock Mean quantization blind watermarking for image authentication.
newblock In { em Proceedings of IEEE 2000 International Conference on Image
Processing}, volume~3, pages 706--709, Vancouver, B.C., Canada, October 2000.
bibitem{Yu2001}
G.-J. Yu, C.-S. Lu, and H.-Y.~M. Liao.
newblock A message-based cocktail watermarking system.
newblock In { em Proceedings of IEEE 2001 International Conference on Image
Processing}, Thessaloniki, Greece, 2001.
newblock to appear.
bibitem{Zhu96}
B.~Zhu, M.~D. Swanson, and A.~H. Tewfik.
newblock Transparent robust authentication and distortion measurement
technique for images.
newblock In { em Proceedings of the 7th IEEE Digital Signal Processing
Workshop}, pages 45--48, September 1996.
end{thebibliography}
指導教授 許健平(Jang-Ping Sheu) 審核日期 2001-7-16
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明