博碩士論文 89522060 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:33 、訪客IP:3.145.68.167
姓名 吳皇欣(Huang-Hsin Wu)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 利用離散餘弦轉換與錯誤控制方法作數位浮水印
(Digital Watermarking using DCT and Error Control Scheme)
相關論文
★ 使用視位與語音生物特徵作即時線上身分辨識★ 以影像為基礎之SMD包裝料帶對位系統
★ 手持式行動裝置內容偽變造偵測暨刪除內容資料復原的研究★ 基於SIFT演算法進行車牌認證
★ 基於動態線性決策函數之區域圖樣特徵於人臉辨識應用★ 基於GPU的SAR資料庫模擬器:SAR回波訊號與影像資料庫平行化架構 (PASSED)
★ 利用掌紋作個人身份之確認★ 利用色彩統計與鏡頭運鏡方式作視訊索引
★ 利用欄位群聚特徵和四個方向相鄰樹作表格文件分類★ 筆劃特徵用於離線中文字的辨認
★ 利用可調式區塊比對並結合多圖像資訊之影像運動向量估測★ 彩色影像分析及其應用於色彩量化影像搜尋及人臉偵測
★ 中英文名片商標的擷取及辨識★ 利用虛筆資訊特徵作中文簽名確認
★ 基於三角幾何學及顏色特徵作人臉偵測、人臉角度分類與人臉辨識★ 一個以膚色為基礎之互補人臉偵測策略
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著通訊網路的快速發展,多媒體的檔案能夠輕鬆地被大眾廣為流傳、散播。由於數位產品相當容易遭到複製,所以未被授權的複製品和電子文件將會是真正的挑戰。為了防止非法剽竊的行為且保障合法認證不被侵犯,數位浮水印技術是相當迫切需要的。
我們提出了一個結合兩個方法的系統,一方面是將二值化後的浮水印影像,利用修改經過量化後的中頻係數來作隱藏,另一方面是使用錯誤更正方法,也就是Reed-Solomon codes,來增加對於非法的攻擊之強韌性。前者的方法具有能夠在經過破壞性的壓縮後仍能倖存的能力,其中的破壞性壓縮如:JPEG或JPEG2000;而後者則能夠抵抗突發性或連續性的雜訊,像是影像處理中的裁切,且還可能對於前面提到的對破壞性壓縮的抵抗力有所助益。實驗的結果證實了我們提出數位浮水印方法的可行性與可靠性。
摘要(英) The rapid growth of communication networks allows the widespread distribution of multimedia data in various ways. Since the digital productions are easy to be duplicated, the discouraging unauthorized clone and the illegal distributing of electronic documents are the issues that have to be resolved. For the purpose of protection against the pirate, digital watermarking techniques are emerged to defend the authentication to be infringed.
In this thesis, we present a combined approach that embeds a binary watermark by selectively modifying the quantized middle-frequency coefficients and use an error control scheme, namely Reed-Solomon codes, to increase the robustness of prevention of illegal attacks. The former is capable of surviving in the lossy compression, such as JPEG or JPEG2000, and the latter owns the ability of resisting burst noise, such as image cropping while increasing the affection of the former.
Experimental results demonstrate that our proposed digital watermarking approach is feasible and effectiveness.
關鍵字(中) ★ 理德-索羅門碼
★ 錯誤控制
★ 離散餘弦轉換
★ 資料隱藏
★ 數位浮水印
關鍵字(英) ★ Reed-Solomon Code
★ Error Control
★ Discrete Cosine Transform
★ Data Hiding
★ Digital Watermark
論文目次 Chapter 1 Introduction 4
1.1 Motivation 4
1.2 Basic watermarking principles 5
1.3 System overview 7
1.4 Organization of thesis 10
Chapter 2 Related Works 12
2.1 Related survey of watermark 12
2.2 Related survey of error control schemes 14
Chapter 3 Proposed Watermarking Algorithm 17
3.1 Embedding Method 17
3.1.1 Discrete Cosine Transform 17
3.1.2 Quantization 19
3.1.3 Reed-Solomon Codes 21
3.1.4 Shuffling 31
3.1.5 Embedding Process 31
3.1.6 Inverse DCT 34
3.2 Extracting Method 35
Chapter 4 Experimental Results 36
4.1 Experimental environment 40
4.2 Experimental result 1 42
4.2.1 Image cropping operation 42
4.2.2 Image blurring operation 44
4.2.3 JPEG 47
4.2.4 JPEG 2000 49
4.3 Experimental result 2 52
4.3.1 Image cropping operation 53
4.3.2 Image blurring operation 54
4.3.3 JPEG 55
4.3.4 JPEG2000 57
4.4 Experimental result 3 59
4.4.1 Image cropping operation 60
4.4.2 Image blurring operation 61
4.4.3 JPEG 62
4.4.4 JPEG2000 64
Chapter 5 Conclusions and Future works 66
5.1 Conclusions 66
5.2 Future works 67
References 68
參考文獻 [1] Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. “Information Hiding—A survey”, Proceedings of the IEEE , Volume: 87 Issue: 7 , July 1999 Page(s): 1062 -1078
[2] Decker, S. “Engineering Considerations in Commercial Watermarking”, IEEE Communications Magazine , Volume: 39 Issue: 8 , Aug. 2001 Page(s): 128 -133
[3] Van Schyndel, R.G.; Tirkel, A.Z.; Osborne, C.F. “A digital watermark”, Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference, Volume:2 , 1994 Page(s): 86 -90 vol.2
[4] Cox, I.J.; Kilian, J.; Leighton, T.; Shamoon, T. “Secure spread spectrum watermarking for images, audio and video”, Image Processing, 1996. Proceedings., International Conference on , Volume: 3 , 1996
Page(s): 243 -246 vol.3
[5] Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. “Secure spread spectrum watermarking for multimedia”, Image Processing, IEEE Transactions on , Volume: 6 Issue: 12 , Dec. 1997 Page(s): 1673 -1687
[6] De Vleeschouwer, C.; Delaigle, J.-F.; Macq, B. “Invisibility and Application Functionalities in Perceptual Watermarking—An Overview”, Proceedings of the IEEE , Volume: 90 Issue: 1 , Jan. 2002 Page(s): 64 -77
[7] Hernandez, J.R.; Amado, M.; Perez-Gonzalez, F. “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure”, Image Processing, IEEE Transactions on , Volume: 9 Issue: 1 , Jan. 2000
Page(s): 55 -68
[8] Langelaar, G.C.; Lagendijk, R.L. “Optimal differential energy watermarking of DCT encoded images and video”, Image Processing, IEEE Transactions on , Volume: 10 Issue: 1 , Jan. 2001 Page(s): 148 -158
[9] Shapiro, J.M. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients”, Signal Processing, IEEE Transactions on , Volume: 41 Issue: 12 , Dec. 1993 Page(s): 3445 -3462
[10] Alturki, F.; Mersereau, R. “Secure blind image steganographic technique using discrete Fourier transformation”, Image Processing, 2001. Proceedings. 2001 International Conference on , Volume: 2 , 2001 Page(s): 542 -545 vol.2
[11] H. Liu, H. Ma, M. El Zarki, and S. Gupta, “Error control schemes for networks: An overview,” ACM Mobile Networking and applications (MONET), vol. 2, no. 2, pp. 167-182, 1997.
[12] Andrew S. Tanenbaum, “Computer Networks”, Prentice Hall 1996.
[13] Sklar, B., “Digital Communications: Fundamentals and Applications” Second Edition (Upper Saddle River, NJ: Prentice-Hall, 2001).
[14] Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L. “Watermarking digital image and video data. A state-of-the-art overview” IEEE Signal Processing Magazine , Volume: 17 Issue: 5 , Sept. 2000 Page(s): 20 -46
指導教授 范國清(Kuo-Chin Fan) 審核日期 2002-7-8
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明