輔仁大學
學術資源網

記錄編號3322
狀態NC088FJU00392007
助教查核
索書號
學校名稱輔仁大學
系所名稱資訊工程學系
舊系所名稱
學號487516101
研究生(中)林志鈞
研究生(英)Lin,Jyh-Jiun
論文名稱(中)以係數平均值量化為基礎的強健性浮水印技術
論文名稱(英)Mean Quantization Based Robust Watermarking With Two Watermarks Hiding
其他題名
指導教授(中)陳良華 廖弘源
指導教授(英)Chen,Liang-Hua Liao,Hong-Yuan
校內全文開放日期不公開
校外全文開放日期不公開
全文不開放理由
電子全文送交國圖.同意
國圖全文開放日期.2005.01.01
檔案說明電子全文
電子全文01
學位類別碩士
畢業學年度88
出版年
語文別中文
關鍵字(中)數位浮水印 強健性 量子化
關鍵字(英)watermarking robust quantization blind
摘要(中)論文摘要 在強健性浮水印(robust watermarking)的技術中,以量化(Quantization)為基礎的研究非常多,利用量化可以使得在取出浮水印的過程中不需要使用到原始的影像資料,但量化也存在著許多的缺點,例如係數容易在遭受攻擊而改變後就使得浮水印發生錯誤、係數改變具有不穩定性等等。 我們所提出的方法利用係數平均值具有較小的變異數的特性來使得係數在量化後,遭到攻擊而改變的量不會太嚴重,這樣使得係數不容易跳出原來的區間。此外,我們也利用人類視覺系統(Human Visual System)的特性來加強我們浮水印的強健性與影像的透明性(Transparency)。同時,針對影像在遭受到攻擊後,影像高低頻係數所受的影響不同,我們在影像中加入兩組浮水印,使得當影像受到攻擊時,會有一組浮水印存活下來。 我們利用各種的影像處理來測試我們浮水印的強健性。實驗的結果顯示利用平均值係數做量化可以大大提升浮水印的強健性,同時,不論是對高頻係數或是低頻係數攻擊的影像處理,我們的浮水印至少有一組可以存活下來,我們的方法對影像壓縮的強健性也很好,可以抵抗JPEG compression的 quality factor到10%。 我們在這篇論文提出一種新的量化方法來增強浮水印的強健性,對智慧財產權的保護上有相當好的貢獻。
摘要(英)Abstract In the robust watermarking techniques, there are many methods based on quantization. Using quantization based watermarking, we can extract watermark without original image. This is called “blind watermarking”. But quantization based watermarking methods have some drawbacks, for examples, the coefficients will be moved to neighboring interval easily after attacking so the watermark will be destroyed. Therefore the coefficients are not stable after attacking. In this paper, we propose a mean quantization based robust watermarking for digital image protection. Our motivation is that given a set of samples, the population mean has smaller variance than individual sample and so that our watermark can have lower bit error ratio. Then, we embed two independent watermarks into the image based on the value of coefficients. We expect that at least one watermark is survived after attacking. We use many image processing and image compression as the attacks to test the robustness of our watermark. Experimental results show that our method is better than D. Kundur’s method in the robustness. Our method can allows the JPEG compression quality factor for 10%.
論文目次目錄 1 簡介 1 1.1 關於浮水印 1 1.2 論文動機 4 1.3 目的 4 1.4 論文架構 5 2 相關研究 6 2.1 一般的浮水印技巧 6 2.2 需要使用原始資料的方法 7 2.3 不需要使用原始資料的方法 8 2.4 一般量子化的作法 11 3 Mean Quantization 13 3.1 量子化的缺點 13 3.2 分析問題與解決的方法 14 3.3 嵌入浮水印的演算法 20 3.4 取出浮水印的演算法 22 3.5 Mean Quantization的侷限 24 4 實驗結果 25 4.1 加了浮水印後的影像品質 25 4.2 各種攻擊後的浮水印 29 4.3 無法把浮水印取出的攻擊 38 4.4 與其他方法的比較 41 5 結果分析與討論 45 5.1 實驗數據的分析 45 5.2 各種參數的討論 46 6 結論 50 參考文獻 51
參考文獻參考文獻: [1] F. Hartung, and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings of the IEEE, vol. 87, no. 7, July 1999 [2] G. Voyatzis, and I. Pitas, “Applications of Toral Automorphisms in Image Watermark,” in Proc. Int. Conf. Image Processing (ICIP), vol. 3, Lausanne, Switzerland, Step. 1996. pp. 237-240. [3] I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Images, Audio, and Video,” NEC Res. Inst., Princeton, NJ, Tech. Rep. 95-10, 1995. [4] G. Cooper and C. McGillem, Modern Communications and Spread Spectrum, New York: McGraw-Hill, 1996 [5] P. G. Flikkema, “Spread Spectrum techniques for wireless communications,” IEEE Signal Processing Mag., vol. 14, pp. 26-33, May 1997. [6] Po-Chyi Su, C.-C. Jay Kuo, and Houng-Jyh Mike Wang, “Blind Digital Watermarking for Cartoon and Map Images,” SPIE international Symposium Electronic Imaging,1999 [7] M. Kutter, F. Jordan, and F. Bossen, “Digital Signature of Color Images Using Amplitude Modulation,” J. Electron. Imaging. Vol. 7, no. 2, pp. 326-332. Apr. 1998. [8] M. Barni, F. Bartolini, V. Cappellini, A. Piva, “Copyright Protection of Digital Images by Embedded Unperceivable Marks,” Image and Vision Computing 16 (1998) pp. 897-906. [9] D. Kundur, and D. Hatzinakos, “Digital Watermarking Using Wavelet Decomposition,” in Proc. IEEE Int. Conf. Acoustics. Speech. And Signal Processing 1998 (ICASSP 98), vol. 5, Seattle. WA. May 1998, pp. 2969-2972. [10] Jiri Fridrich, “Combining Low-frequency and Spread Spectrum Watermarking,” 98 [11] Gwo-Jong Tu, Chun-Shien Lu, Hong-Yuan Mark Liao, and Jang-Ping Sheu, “Mean Quentization Blind Watermarking for Image Authentication,” 2000 International Conference on Image Processing, Step. 2000 [12] F. A. P. Petitcolas, R.J. Anderson, ans M. G. Fuhn, “Attacks on Copyright Marking Systems,” in Lecture Notes in Computer Science: Information Hiding. 1998, pp. 218-238 [13] Raymond B. Wolfgang, C. I. Podilchuk, and Edward J. Delp, “Perceptual Watermarking for Digital Image and Video,” Invited paper, IEEE, 1999 [14] S. Craver, N. Memon, B.-L. Yeo, and M. Yeung, “On the Invariability of Invisible Watermarking Techniques,” in Proc. IEEE Int. Conf. Image Processing 1997 (ICIP ’97), vol. 1,Oct .1997, pp. 540-543 [15] Raymond B. Wolfgang and J. Delp, “A Watermark for Digital Image”, in Proc. IEEE Int. Conf. Image Processing, vol. 3, Sept. 1996, pp.219-222 [16] Hen-Ming Chang and Li-Chun Chen, “An Invisible Watermarking Method for Color Image,” CVGIP 99 [17] Jianhao Meng and Shih-Fu Chang, “Embedding Visible Video Watermarks in the Compressed Domain,” [18] E. Koch, J. Rindfery, and J. Zhao, “Copyright Protection for Multimedia Data,” Digital Media and Electronic Publishing 1996 [19] A. Bors and I. Pitas, “Image Watermarking Using DCT Domain Constrains,” in Proc. Int. Conf. Image Processing 1996 [20] C. I. Podilchuk, “Digital Image Watermarking Using Visual Models,” in Proc. Electronic Imaging, vol. 3016, San Jose, CA, Feb. 1996 [21] Deepa Kundur, and Dimitrios Hatzihakos, “Digital Watermarking for Telltale Tamper Proofing and Authentication,” Proceedings of the IEEE, vol.87, no.7, July 1999 [22] F. Hartung, J. K. Su, and B. Girod, “Spread Spectrum Watermarking: Malicious Attacks and Counterattacks,” Proceedings of SPIE vol. 3657: Security and Watermarking of Multimedia Contents, January 1999. [23] G. Voyatzis and I. Pitas, “Chaotic Watermarks for Embedding in the Spatial Digital Image Domain,” [24] C. S. Lu, H. Y. Mark Liao, S. K. Huang, C. J. Sze, “Hightly Robust Watermarking Using Complementary Modulation,” Proc. 2nd International Information Security Workshop, Malaysia, LNCS 1729, pp.136-153, Nov. 6-7, 1999 [25] W. Zeng and B. Liu, “A Statistical Watermark Detection Technique without Using Original Image for Resolving Rightful Ownerships of Digital Images,” to appear in IEEE Trans. Image Processing, 1999 [26] J. J. K. O Ruanaidh and T. Pun, ”Rotation, Scale, and Translation Invariant Spread Spectrum Digital Image Watermarking,” Signal Processing (Special Issue on Watermarking), vol. 66, no.3, pp. 303-318, May 1998 [27] F. A. P. Petitcolas, R. J. Andreson, and M. G. Kuhn, “Information Hiding-A Survey,” in Proceedings of The IEEE, vol. 87, no. 7, July 1999 [28] B. Chen and G. W. Wornell, “An Information-theoretic Approach to the Design of Robust Digital Watermarking System,” in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing 1999 (ICASSP ‘99), Mar. 1999 [29] C. S. Lu, H. Y. Mark Liao, S. K. Huang, C. J. Sze, “Cocktail Watermarking on Images,” Proc. 3rd International Workshop on Information Hiding, Dresden, Germany, LNCS 1768, pp.331-345, Step. 29-Oct. 1, 1999. [30] N. Nikolaidis and I. Pitas, ”Digital Image Watermarking: an Overview,” [31] Min Wu and B. Liu, “Watermarking for Image Authentication,” [32] Andrew P. Bradley, “A Wavelet Visible Difference Predictor,” IEEE Transactions on Image Processing, vol. 8, no. 5, May 1999 [33] A. B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor, “Visibility of Wavelet Quantization Noise,” IEEE Trans. Image Processing, vol. 6, no. 8, pp. 1164-1175, 1997 [34] F. Mintzer and G. W. Braudaway, “If one watermark is good, are more better?,” Proc. IEEE Int. Conf. on Acoustic, Speech, and Signal Processing, pp. 2067-2070, 1999.
論文頁數54
附註
全文點閱次數
資料建置時間
轉檔日期
全文檔存取記錄
異動記錄M admin Y2008.M7.D3 23:17 61.59.161.35