以作者查詢圖書館館藏 、以作者查詢臺灣博碩士 、以作者查詢全國書目 、勘誤回報 、線上人數:33 、訪客IP:3.145.68.167
姓名 吳皇欣(Huang-Hsin Wu) 查詢紙本館藏 畢業系所 資訊工程學系 論文名稱 利用離散餘弦轉換與錯誤控制方法作數位浮水印
(Digital Watermarking using DCT and Error Control Scheme)相關論文 檔案 [Endnote RIS 格式] [Bibtex 格式] [相關文章] [文章引用] [完整記錄] [館藏目錄] [檢視] [下載]
- 本電子論文使用權限為同意立即開放。
- 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
- 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
摘要(中) 隨著通訊網路的快速發展,多媒體的檔案能夠輕鬆地被大眾廣為流傳、散播。由於數位產品相當容易遭到複製,所以未被授權的複製品和電子文件將會是真正的挑戰。為了防止非法剽竊的行為且保障合法認證不被侵犯,數位浮水印技術是相當迫切需要的。
我們提出了一個結合兩個方法的系統,一方面是將二值化後的浮水印影像,利用修改經過量化後的中頻係數來作隱藏,另一方面是使用錯誤更正方法,也就是Reed-Solomon codes,來增加對於非法的攻擊之強韌性。前者的方法具有能夠在經過破壞性的壓縮後仍能倖存的能力,其中的破壞性壓縮如:JPEG或JPEG2000;而後者則能夠抵抗突發性或連續性的雜訊,像是影像處理中的裁切,且還可能對於前面提到的對破壞性壓縮的抵抗力有所助益。實驗的結果證實了我們提出數位浮水印方法的可行性與可靠性。摘要(英) The rapid growth of communication networks allows the widespread distribution of multimedia data in various ways. Since the digital productions are easy to be duplicated, the discouraging unauthorized clone and the illegal distributing of electronic documents are the issues that have to be resolved. For the purpose of protection against the pirate, digital watermarking techniques are emerged to defend the authentication to be infringed.
In this thesis, we present a combined approach that embeds a binary watermark by selectively modifying the quantized middle-frequency coefficients and use an error control scheme, namely Reed-Solomon codes, to increase the robustness of prevention of illegal attacks. The former is capable of surviving in the lossy compression, such as JPEG or JPEG2000, and the latter owns the ability of resisting burst noise, such as image cropping while increasing the affection of the former.
Experimental results demonstrate that our proposed digital watermarking approach is feasible and effectiveness.關鍵字(中) ★ 理德-索羅門碼
★ 錯誤控制
★ 離散餘弦轉換
★ 資料隱藏
★ 數位浮水印關鍵字(英) ★ Reed-Solomon Code
★ Error Control
★ Discrete Cosine Transform
★ Data Hiding
★ Digital Watermark論文目次 Chapter 1 Introduction 4
1.1 Motivation 4
1.2 Basic watermarking principles 5
1.3 System overview 7
1.4 Organization of thesis 10
Chapter 2 Related Works 12
2.1 Related survey of watermark 12
2.2 Related survey of error control schemes 14
Chapter 3 Proposed Watermarking Algorithm 17
3.1 Embedding Method 17
3.1.1 Discrete Cosine Transform 17
3.1.2 Quantization 19
3.1.3 Reed-Solomon Codes 21
3.1.4 Shuffling 31
3.1.5 Embedding Process 31
3.1.6 Inverse DCT 34
3.2 Extracting Method 35
Chapter 4 Experimental Results 36
4.1 Experimental environment 40
4.2 Experimental result 1 42
4.2.1 Image cropping operation 42
4.2.2 Image blurring operation 44
4.2.3 JPEG 47
4.2.4 JPEG 2000 49
4.3 Experimental result 2 52
4.3.1 Image cropping operation 53
4.3.2 Image blurring operation 54
4.3.3 JPEG 55
4.3.4 JPEG2000 57
4.4 Experimental result 3 59
4.4.1 Image cropping operation 60
4.4.2 Image blurring operation 61
4.4.3 JPEG 62
4.4.4 JPEG2000 64
Chapter 5 Conclusions and Future works 66
5.1 Conclusions 66
5.2 Future works 67
References 68參考文獻 [1] Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. “Information Hiding—A survey”, Proceedings of the IEEE , Volume: 87 Issue: 7 , July 1999 Page(s): 1062 -1078
[2] Decker, S. “Engineering Considerations in Commercial Watermarking”, IEEE Communications Magazine , Volume: 39 Issue: 8 , Aug. 2001 Page(s): 128 -133
[3] Van Schyndel, R.G.; Tirkel, A.Z.; Osborne, C.F. “A digital watermark”, Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference, Volume:2 , 1994 Page(s): 86 -90 vol.2
[4] Cox, I.J.; Kilian, J.; Leighton, T.; Shamoon, T. “Secure spread spectrum watermarking for images, audio and video”, Image Processing, 1996. Proceedings., International Conference on , Volume: 3 , 1996
Page(s): 243 -246 vol.3
[5] Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. “Secure spread spectrum watermarking for multimedia”, Image Processing, IEEE Transactions on , Volume: 6 Issue: 12 , Dec. 1997 Page(s): 1673 -1687
[6] De Vleeschouwer, C.; Delaigle, J.-F.; Macq, B. “Invisibility and Application Functionalities in Perceptual Watermarking—An Overview”, Proceedings of the IEEE , Volume: 90 Issue: 1 , Jan. 2002 Page(s): 64 -77
[7] Hernandez, J.R.; Amado, M.; Perez-Gonzalez, F. “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure”, Image Processing, IEEE Transactions on , Volume: 9 Issue: 1 , Jan. 2000
Page(s): 55 -68
[8] Langelaar, G.C.; Lagendijk, R.L. “Optimal differential energy watermarking of DCT encoded images and video”, Image Processing, IEEE Transactions on , Volume: 10 Issue: 1 , Jan. 2001 Page(s): 148 -158
[9] Shapiro, J.M. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients”, Signal Processing, IEEE Transactions on , Volume: 41 Issue: 12 , Dec. 1993 Page(s): 3445 -3462
[10] Alturki, F.; Mersereau, R. “Secure blind image steganographic technique using discrete Fourier transformation”, Image Processing, 2001. Proceedings. 2001 International Conference on , Volume: 2 , 2001 Page(s): 542 -545 vol.2
[11] H. Liu, H. Ma, M. El Zarki, and S. Gupta, “Error control schemes for networks: An overview,” ACM Mobile Networking and applications (MONET), vol. 2, no. 2, pp. 167-182, 1997.
[12] Andrew S. Tanenbaum, “Computer Networks”, Prentice Hall 1996.
[13] Sklar, B., “Digital Communications: Fundamentals and Applications” Second Edition (Upper Saddle River, NJ: Prentice-Hall, 2001).
[14] Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L. “Watermarking digital image and video data. A state-of-the-art overview” IEEE Signal Processing Magazine , Volume: 17 Issue: 5 , Sept. 2000 Page(s): 20 -46指導教授 范國清(Kuo-Chin Fan) 審核日期 2002-7-8 推文 facebook plurk twitter funp google live udn HD myshare reddit netvibes friend youpush delicious baidu 網路書籤 Google bookmarks del.icio.us hemidemi myshare