簡易檢索 / 詳目顯示

研究生: 葉富豪
Fu-Hao Yeh
論文名稱: 以影像內容調整權重之忘卻性數位浮水印模組
a content base watermarking model
指導教授: 李忠謀
Lee, Chung-Mou
學位類別: 博士
Doctor
系所名稱: 資訊教育研究所
Graduate Institute of Information and Computer Education
論文出版年: 2000
畢業學年度: 88
語文別: 中文
論文頁數: 58
中文關鍵詞: 浮水印,材質
英文關鍵詞: watermark , texture
論文種類: 學術論文
相關次數: 點閱:206下載:7
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

摘要
以影像內容調整權重之忘卻性數位浮水印模組
葉富豪
電腦網路和資訊數位化帶來了易散佈和易修改的便利性,使得多媒體資料之取得十分容易。如何確認多媒體資料使用之合法性,以確保創作者之著作權,便顯得十分重要。近來所發展之數位浮水印技術,正可有效解決多媒體資料著作權歸屬問題。
本研究主要之目的,是發展忘卻性(Oblivious)數位影像浮水印技術,即在不需原始影像之輔助下,便可確認浮水印的存在與否,進而協助鑑定著作權之歸屬。而採用之方法,主要是將影像分為數個長寬相等的子區塊,並利用子區塊的材質與亮度之分析,判斷子區塊插入浮水印後,是否容易造成子區塊內影像失真,並給予每個子區塊適當權重,以插入不同能量之浮水印資料。最後並以影像修正函數,校正插入浮水印後之影像邊緣失真,以維護影像之視覺品質。
實驗結果顯示,研究所提之方法能有效防禦諸多影像處理技術對於浮水印的破壞,包括:影像切割(切除95%)、有損失壓縮(壓縮比為12)、影像增強及同時插入多個浮水印等破壞方式。

ABSTRACT
A Content Based Oblivious Watermarking Model
By
Fu-Hao Ya
Computer network and digitized information, which bring the convenience of spreading and modifying, make it much easier to acquire multimedia data. Therefore, it becomes more and more important to affirm the legal use of multimedia data to protect the intellectual property of the creators. And Digital Watermarking, developed recently, has been proposed as an efficient way to protect copyright.
The principal purpose of this research lies in the development of Oblivious watermarking, which can ensure the existence of watermarking independently without the assistance of original images, and thus can authenticate the authority of copyright. The main method we adopted is to divide the whole image into several equivalent sub-blocks, and to determine if the embedment of the watermark would cause the distortion of the image by analyzing the texture and brightness of each sub-block. Then, each sub-block is given its proper weight, by which we embed the watermark of different energy in it, and, lastly, we amend the edge of the whole image after the embedment of the watermark with a function to retrieve the distortion.
The result of this experiment reveals that the method we took, as mentioned above, is able to effectively defend the attacks which other image processing techniques would cause, such as image cropping (95% cropped), lossy compression (rate of compression=12), image enhancement, multiple watermarks, etc.

目錄 圖目錄…………………………………………………………………………….. III 表目錄…………………………………………………………………………….. IV 第一章 緒論………………………………………………………………..…….. 1 1.1 研究背景………………………………………………………….……...1 1.2 研究目的與概念……………………………………………….….……... 2 1.3 問題闡述………………………………………………………..………... 3 1.4 研究範圍與限制……………………………………………………..…... 6 1.5 論文組織架構….……………………………………………………….... 6 第二章 文獻探討…………………………………………………………………... 7 2.1 浮水印之分類………………………………………………………….… 7 2.2 破壞性影像處理技術之分類…………………………………….………... 8 2.3 浮水印技術之探討………………………………………………………...10 2.4 結論……………………………………………………………….…..……18 第三章 嵌入流程………………….…………………………………….……….20 3.1 浮水印之嵌入流程……………………………………………….……..20 3.2 浮水印序列之組成……………………………………………….……..23 3.3 加密區…….……………………………………………………….……..23 3.3.1 單一浮水印加密區……………………………………………….23 3.3.1 多重浮水印加密區….…………………………………………….23 3.4 感測模組…….……………………………………………………………..25 3.4.1影像特徵…………………………………………………………..25 3.4.2感測模組之演算法…….…………………………………………..26 3.5 邊緣修正函數……………………………………………………………..29 第四章 萃取流程……………………………………………………………….31 4.1 萃取流程………………………………………………………………..31 4.2 相似函數………………………………………………………………..33 4.2.1相似函數公式..…………………………………………………..33 4.2.2臨界值之決定………..…………………………………………..33 第五章 實驗結果與討論……………………………………………………….38 5.1 實驗結果…………………………………………………………..……..35 5.2 實驗結果與討論…………………………………………………..……..45 第六章 結論……………………………………………………………….…….46 6.1 結論………………………………………………………………..……..46 6.2 未來發展方向……………………………………………………..……..46 附錄A DCT(Discrete Cosine Transform)..…………………………………….48 附錄B 邊緣偵測演算法……………………………………………………….50 參考資料………………………………………………………………………….53 圖目錄 圖 1.1浮水印示意圖..…………………………..…………………………….. 1 圖 1.2浮水印研究之概念圖………………………..……………………………2 圖 1.3浮水印嵌入技術流程圖………………………..……………………………5 圖 3.1感測能量流程圖…………………………………..……………………….. 22 圖 3.2單一浮水印之加密區………………………..………………………………24 圖 3.3選取四個浮水印加密區之範例…………..……………….………………25 圖 3.4感測能量流程圖………………………..………………………………29 圖 3.5邊緣修飾實驗結果………………………..………………………………30 圖 4.1萃取之流程圖…………..………………..………………………………32 圖 5.1萃取之流程圖………………………………..………..…………………34 圖 5.1插入浮水印之比較圖(Baboon)…..………………………………36 圖 5.2插入浮水印之比較圖(Lena)………..…..……………………….36 圖 5.3插入浮水印之比較圖(Sail Boat)…..………………………………37 圖 5.4插入浮水印之比較圖(Field).……..……………………………..37 圖 5.5 JPEG壓縮破壞之關係圖….…………..……………………………38 圖 5.6 Cropping破壞之關係圖…….…………..……………………………40 圖 5.7 直方圖破壞之關係圖….…….…………..……………………………41 圖 5.8 邊緣增加破壞之關係圖….…….…………..……………………………45 圖 5.9 低通濾波破壞之關係圖….…….…………..……………………………43 圖 5.10 插入四浮水印之範例圖….…….…………..……………………………44 圖 A.1 Zig Zag Code後之排列方式………..……………………………49 圖 B.1 Sobel遮罩……………….………..……………………………51 圖 B.2 邊緣偵測之結果……………….………..……………………………52 表目錄 表 5.1 未經破壞之萃取值………………………..…………………………….. 37 表 5.2 JPEG壓縮破壞後之萃取值……………………..……………………….. 39 表 5.3 Cropping破壞後之萃取值….…………..……………………………40 表 5.4 直方圖破壞後之萃取值.…….…………..……………………………41 表 5.5 邊緣增加破壞後之萃取值….…….…………..……………………………42 表 5.6 低通濾波破壞後之萃取值….…….…………..……………………………43 表 5.7 插入四浮水印之後之萃取值…….…………..……………………………45

參考資料
[1] A. Piva, M. Barni, and F. Bartolini, “Copyright Protection of digital image by Means of frequency Domain Watermarking”, http://www-nt.e-technik.uni-erlangen.de/%7Ehartung/watermarkinglinks.html, 1998.
[2]A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image”, Proceedings of 4th IEEE International Conference on Image Processing ICIP'97, Santa Barbara, CA, USA, Vol 1, pp. 520-523, October 26-29, 1997.
[3]A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “A watermarking technique for the protection of digital images IPR”, European Multimedia, Microprocessor Systems and Electronic Commerce EMMSEC 97, Florence, Italy, November 3-5, 1997.
[4]A. S. Lewis and G. Knowles, “Image compression using the 2-D wavelet transform”, IEEE Transactions on Image Processing, 1992.
[5 ]C. C. Tseng, R. D. Lin and S. L. Lee, “Image watermarking based on toral automorphism, block DC value Quantization and error correcting codec”, Conference on Computer Vision, Graphic and Image Processing, pp. 158-165 , April, 1999.
[6]C. Ting. Hsu and J. L. Wu, “Hidden digital watermarks in Images”, IEEE Transactions On Image Processing, Vol. 8. No. 1. JANUARY, 1999.
[7]C. I. Podilchuk, and W. Zeng, “Image-Adaptive watermarking using visual models”, IEEE Journal On Selected Areas in Communications, Vol . 16. No. 4, May, 1998.
[8]C. S. Lu, Hong Y. Liao, S. K.Huang, and C. J. Sze, “Cocktail watermarking on image and audios”, Conference on Computer Vision, Graphic and Image Processing, pp. 30-37, April, 1999.
[9]S. Craver, N. Memon, B. L. Yeo, and M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications”, IEEE Journal on Selected Areas in Communications, Vol. 16. No. 4,May ,1998.
[10]D. Boneh and J. Shaw,“Collusion-secure fingerprinting for digital data”, IEEE Transactions on Information Theory 44, pp.1897-1905, September, 1998.
[11]D. Kundur and D. Hatzinakos, “Improve robust watermarking through attack characterization”, http://www-nt.e-technik.uni-erlangen.de/%7Ehartung/watermarkinglinks.html, 1998.
[12]D. Kundur and D. Hatzinakos, “A Robust Digital Image Watermarking Scheme using Wavelet-Based Fusion”, Proceedings of IEEE International Conference on Image Processing, Santa Barbara, California, Vol. 1, pp. 544-547, October 1997.
[13]F. Bartolini, M. Barni, V. Cappellini, and A. Piva, “Mask building for perceptually hiding frequency embedded watermarks”, Proceedings of 5th IEEE International Conference on Image Processing ICIP'98, Chicago, Illinois, USA, Vol 1, pp. 450-454, October 4-7, 1998.
[14]F. Jurie, “A new log-polar mapping for space variant imaging.Application to face detection and tracking”, Patten Recognition , pp. 865-875, 1999.
[15]H. Frank, K. S. Jonathan, and G. Bernd, “Spread Spectrum Watermarking:Malicious Attacks and Counterattacks”, Telecommunications Labatory, University of Erlangen-Nuremberg, 1999.
[16]G. C. M. Silvestre and W. J. Dowling, “Image Watermarking Using Communication Techniques”, Image Processing and Its Applications, No. 443. pp. 15-17, 1997.
[17]I. J. Cox, J. Kilian, T. Leighton, and T. Shammoon, “Secure spread spectrum watermarking for multimedia”, Transactions on Image Processing, Vol. 6. No. 12, December, 1997.
[18]J. Fridrich , “Applications of Data Hidding In Digital Image”, ISPACS, 1998.
[19]J.J.K.O. Ruanaidh, W. J. Dowling, and F. M. Boland, “Phase watermarking of digital images”, Proceedings International Conference on Image Processing, 1996.
[20]J. J. K. O. Ruanaidh and T. Pun, “Rotation,scale and translation invariant spread spectrum digital image watermarking”, Signal Processing, pp. 303-317, 1998.
[21]J. Johnston, N. Jayant and R. Safranek, “ Signal compression based on models of human perception”, Proceedings of the IEEE, Vol. 81, No. 10, October, 1993.
[22]H. K. Ju, W. D. Lee, and H. P. Jin, “A watermarking with two signatures”, Multimedia Signal Processing, 1998.
[23] L.Torres and M.Kunt, “Video Coding”, The Second Generation Approach. Kluwer Academic Publishers, 1995.
[24]M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “Copyright protection of digital images by embedded unperceivable marks”, http://www-nt.e-technik.uni-erlangen.de/%7Ehartung/watermarkinglinks.html, 1997.
[25]M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT domain system for robust image watermarking”, Signal Processing, pp.357-372, 1997
[26]M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “Robust watermarking of still images for copyright protection”, Proceedings 13th International Conference on Digital Signal Processing DSP97, Santorini, Greece, Vol. 2, pp. 499-502, July 2-4, 1997.
[27]M. Barni, F. Bartolini, V. Cappellini, A. Lippi, and A. Piva, “A DWT-based algorithm for spatio-frequency masking of digital signatures”, Proceedings of SPIE Vol. 3657, Security and Watermarking of Multimedia Contents, Electronic Imaging '99, San Jose, CA, January, 1999.
[28]M. J. J. J. B. Maes and C. W. A. M. Overveld, “Digital Watermarking by Geometric Warping”, IEEE Image Processing, 1998.
[29 ]M. D. Swanson, B. Zhu, and A. H.Tewfik, “Robust Data Hiding for Image”, IEEE Digital Signal Processing Workshop(DSP 96), Loen, Norway, pp.37-40,September, 1996.
[30]M. D. Swanson, K. MEI, and A. H. Tewfik, “Multimedia Data-embedding and Watermarking Technologies”, Proceeding of the IEEE, Vol. 86. NO. 6. June, 1998.
[31] S. K. Mohan and K. R. R. Rajmohan, “Content Based Watermarking of Images”, ACM Multimedia 98-Electronic Proceedings, 1998.
[32]S. C. Pei, Y. H. Chen, and R. F. Torng, “Digital Image and Video Watermarking Utilizing Just-Noticeable-Distortion Model”, Conference on Computer Vision, Graphic and Image Processing, pp. 174-182, 1999.
[33]S. D. Servetto, C. I. Podilchuk, and K. Ramchandran, “Capacity Issues In Digital Image Watermarking”, International Conference on Image Processing, 1998.
[34 ] R. G. V. Schyndel, A. Z. Tirkel, and C. F. Osborne, “A Digital Watermark”, IEEE International Conference on Image Processing, 1994.
[35]G. Voyatzis and I.Pitas ,“ Protecting digital image copyrights: a framework”, IEEE Computer Graphics and Applications, 1999.

QR CODE