簡易檢索 / 詳目顯示

研究生: 黃意婷
Huang, Yi-Ting
論文名稱: 應用Toral Automorphism並結合機率理論之易碎型浮水印研究
Probably and Toral Automorphism based Fragile Watermarking
指導教授: 李忠謀
Lee, Chung-Mou
口試委員: 李忠謀
Lee, Chung-Mou
柯佳玲
Koh, Jia-Ling
劉寧漢
Liu, Ning-Han
江政杰
Chiang, Cheng-chieh
口試日期: 2023/07/31
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2023
畢業學年度: 111
語文別: 中文
論文頁數: 39
中文關鍵詞: 易碎浮水印最低有效位元置換法
英文關鍵詞: Toral Automorphism, fragile watermark, Least Significant Bit
DOI URL: http://doi.org/10.6345/NTNU202301010
論文種類: 學術論文
相關次數: 點閱:44下載:10
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 科技發展讓影像數位化成為可能,但也伴隨著版權侵犯等問題的出現。本研究專注於用於版權保護的數位浮水印,目標是改善視覺系統難以察覺的影像修改與偽造問題,加以抵抗各種攻擊,如:大範圍攻擊、雜點攻擊。本研究使用易碎浮水印認證技術,搭配Toral Automorphism之應用,透過最低有效位元置換法(LSB)將版權資訊嵌入影像。然而,LSB面臨著資訊量與影像破壞、偵測錯誤率之間的平衡問題。本研究核心在於尋找這個平衡,以及建立影像區塊之間的連結。實驗結果表明,本論文的方法在抵抗攻擊及正確標示率有些微提升。

    The development of technology has made digitalization of images possible, but it has also brought about issues such as copyright infringement. The goal is to im-prove the issues of imperceptible image modification and forgery in the visual system and to resist various attacks, such as large-scale attacks and random noise attacks. This research utilizes fragile watermark authentication technology, combined with the application of Toral Automorphism, embedding copyright information into images using the Least Significant Bit (LSB) substitution method. However, LSB faces a trade-off between the amount of information and issues like image degradation and detection error rates. The core of our research lies in finding this balance and establishing connections between image blocks. Experimental results demonstrate that our approach performs remarkably well in resisting attacks and providing accurate labeling.

    第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究目的 1 第三節 論文架構 2 第二章 文獻探討 3 第一節 浮水印技術 3 第二節 其他相關浮水印技術之文獻探討 5 第三章 方法與步驟 11 第一節 驗證資訊 11 第二節 偵測流程 15 第四章 實驗與討論 18 第一節 驗證評估指標 18 第二節 嵌入浮水印之影像 19 第三節 各種影像攻擊 23 第四節 影像偵測結果 32 第五節 其他測試 33 第五章 結論與未來展望 36 第一節 結論 36 第二節 未來展望 36 參考資料 37

    Agreste, S. & Andaloro, G. (2008). A new approach to pre-processing digital image for wavelet-based watermark. Journal of Computational and Applied Mathematics,221(2), 274-283
    Chamlawi, R., Khan, A., & Usman, I.(2010). Authentication and recovery of images using multiple watermarks. Computers & Electrical Engineering, 36(3), 578-584.
    F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn Information hiding—a survey Proc. IEEE, 87 (7) (1999), pp. 1062-1078
    F. Hartung, M. Kutter Multimedia watermarking techniques Proc. IEEE, 87 (7) (1999), pp. 1079-1107
    G. Voyatzis and I. Pitas, "Applications of Toral Automorphisms in Image Watermarking", Proceedings of the International Conference on Image Processing, vol. 2, no. 1996, pp. 237-240.
    Kamel, I. & Albluwi, Q. (2009). A robust software watermarking for copyright protection. Computers & Security, 28(6), 395-409.
    Lin, P., Hsieh, C., & Huang, P. (2005). A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition, 38(12),
    2519-2529.
    P. Murali, and V. Sankaradass, “An efficient ROI based copyright protection scheme for digital images with SVD and orthogonal polynomials transformation,” Optik, vol. 170, pp. 242–264, 2018.
    S.A. Parah, J.A. Sheikh, A.M. Hafiz, G.M. Bhat, A secure and robust information hiding technique for covert communication,International Journal of Electronics. (2014) 1253-1266.
    Shieh CS, Huang HC, Wang FH, Pan JS. Genetic watermarking based on transformdomain techniques. Pattern Recogn 2004;37:555.
    Thi Hoang Ngan Le, Kim Hung Nguyen, Hoai Bac Le, “Literature Survey on Image Watermarking Tools, Watermark Attacks, and Benchmarking Tools”, Second IEEE International Conferences on Advances in Multimedia, 2010, pp.67-73
    Wang, S. & Tsai, S. (2008). Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognition, 41(2),701-712.
    Xi, YH., and Zhang, M.R. (2007). Fragile watermarking based on smoothness for document image. Anti-counterfeiting Security, Identification, 2007 IEEE International Workshop, 249-253.
    Zhang, X. & Wang, S. (2009). Fragile watermarking scheme using a hierarchical mechanism. Signal Processing, 89(4), 675-679.
    王尹良,《結合機率理論的影像竄改偵測方法之研究》,碩士論文,私立銘傳大學資訊管理所,2009 年。
    邱金鴻、韓文舜、許慶昇,《基於區塊關聯的影像驗證與復原方法》,ICIM,2011年。
    徐百輝、陳志丞,《以特徵點為基礎的航測影像浮水印》,航測及遙測學刊,第十七卷,第 4 期,第 251-266 頁,2013年。

    下載圖示
    QR CODE