簡易檢索 / 詳目顯示

研究生: 李俊逸
Jiun-yi Li
論文名稱: 彩色半色調印刷影像資訊隱藏技術之研究
A Study on Information Hiding for Color Halftone Printed Images
指導教授: 周遵儒
Chou, Tzren-Ru
學位類別: 碩士
Master
系所名稱: 圖文傳播學系
Department of Graphic Arts and Communications
論文出版年: 2004
畢業學年度: 92
語文別: 中文
論文頁數: 40
中文關鍵詞: 資訊隱藏印刷影像數位半色調編碼解碼
英文關鍵詞: information hiding, printed image, digital halftoning, encoding, decoding
論文種類: 學術論文
相關次數: 點閱:267下載:34
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本研究提出一項全新的適用於印刷影像特性之資料隱藏技術,利用印刷半色調網點在色彩排列組成方式的不同來表現所隱藏的訊息,這種特殊組成型態的網點稱作是漩渦式網點(Vortex Dot),其微小型態上的變化不易被人眼所察覺。同時,本研究也設計了兩組數位影像特徵,分別是色彩力距(Color Moment)與相對色彩位移(Relative Color Displacement),用以檢驗彩色半色調印刷影像的網點組態變化。進一步再配合本研究所提出的方陣式位址碼(Phalanx Addressing Code)編碼技術在二維影像平面上進行與位置無關(Location Independent)的資料儲存與擷取,藉由隨機隱藏提高加密的安全性。實驗結果顯示本研究所提出的加密技術可在彩色半色調印刷影像中進行資訊隱藏,並且將輸出影像掃瞄後進行辨識解碼處理。

    In this dissertation we propose a brand-new data hiding technique for color halftone printed images. The configuration of the color composition of a halftone cell is adopted to present the hidden information. Such a halftone cell with various composition configurations is called the vortex dot. The tiny variation of these cells is almost invisible for human being. In addition, we also design the two features, called the color moment and relative color displacement, to classify the configuration of the vortex dots. Besides, we further propose the phalanx addressing code, to encode the hidden data into the host image in a location-independent way. It could raise security of data hiding by embedding randomly. The experimental results show that the proposed method is a possible solution to hide data in a color halftone printed image.

    中文摘要 ………………………………………………… i 英文摘要 ………………………………………………… ii 圖目錄 …………………………………………………… iv 表目錄 …………………………………………………… vi 壹、緒論 ………………………………………………… 1 貳、文獻探討 …………………………………………… 3 一、印刷影像特性 ………………………………… 3 二、數位半色調技術 ……………………………… 7 三、資訊隱藏技術 ………………………………… 11 參、彩色印刷影像資訊隱藏系統 ……………………… 13 一、彩色印刷影像加密編碼技術 ………………… 15 二、彩色半色調網點辨識技術 …………………… 23 肆、實驗結果與討論 …………………………………… 28 一、實驗結果 ……………………………………… 29 二、討論 …………………………………………… 37 伍、結論與建議 ………………………………………… 39 參考文獻 ………………………………………………… 40

    [1]Graphic Arts Publishing, “Color Separation Technique,” 3rd, 1989.
    [2]J.A.C. Yule, “Principles of Color Reproduction,” 2nd rev edition, John Wiley & Sons, Inc, January, 2001.
    [3]Murat Mese and Vaidyanathan, “Recent Advances in Digital Halftoning and inverse Halftoning Methods,” IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, vol. 49, no. 6, June 2002.
    [4]Yachin Pnueli and Alfred M. Bruckstein, “Gridless Halftoning A Reincarnation of the Old Method,” Graphical Models and Image Processing, vol. 58, no. 1, pp. 38–64, January 1996.
    [5]Chang-Chou Lin and Wen-Hsiang Tsai, “Visual cryptography for gray-level images by dithering technique,” Pattern Recognition Letters 24, pp. 349-358, 2003.
    [6]Hagit Zabrodsky Hel-Or, “Watermarking and copyright labeling of printed images,” Journal of Electronic imaging, vol. 10, no. 3, pp. 749-803, July 2001.
    [7]Robert Ulichney, “Digital Halftoning,” The MIT Press, 1987.
    [8]Ioannis Katsavounidis and C. -C. Jay Kuo, “A Multiscale Error Diffusion Technique for Digital Halftoning,” IEEE Transactions on image processing, vol. 6, no. 3, pp. 483-490, March 1997.
    [9]Ming Sun Fu and Oscar C. Au, “Data hiding watermarking for halftone images,” IEEE Transactions on image processing, vol. 11, no. 4, pp.477-484, April 2002.
    [10]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, nos. 384, pp. 313-335, 1996.
    [11]Phen-Lan Lin, “Digital watermarking models for resolving rightful ownership and authenticating legitimate customer,” The Journal of Systems and Software 55, pp. 261-271, 2001.
    [12]Da-Chun Wu and Wen-Hsiang Tsai, “Embedding of any type of data in images based on a human visual model and multiple-based number conversion,” Pattern Recognition Letters 20, pp. 1511-1517, 1999.
    [13]F. Deguillaume, S. Voloshynovskiy, and T. Pun, “Secure hybrid robust watermarking resistant against tampering and copy attack,” Signal Processing 83, pp. 2133-2170, 2003.
    [14]Joseph Ò, Ruanaidh, Holger Petersen, Alexander Herrigel, Shelby Pereira, Thierry Pun, “ Cryptographic copyright protection for digital images based on watermarking techniques,” Theoretical Computer Science 226, pp. 117-142, 1999.
    [15]Min-Shiang Hwang, Chin-Chen Chang, and Kuo-Feng Hwang, “Digital watermarking of images using neural networks,” Journal of Electronic imaging, vol. 9, no. 4, pp. 548-555, October 2000.
    [16]Y. Shih and Y. T. Wu, “Combinational image watermarking in the spatial and frequency domains,” Pattern Recognition 36, pp.969-975, 2003.
    [17]Jonathan K. Su, Frank Hartung, and Bernd Girod, “Digital watermarking of text, image, and video documents,” Compute & Graphics, vol. 22, no. 6, pp. 687-695, 1998.
    [18]Young-Chang Hou, “Visual cryptography for color images,” Pattern Recognition 36, pp. 1619-1629, 2003.
    [19]David L. Hecht, “Printed Embedded Data Graphical User Interfaces,” IEEE Computer, pp. 47-55, March 2001.
    [20]Jiun-Yi Li, Tzren-Ru Chou, and His-Chun Wang, “Multi-channel Watermarking Technique of Printed Images and Its Application to Personalized Stamps,” CVGIP, 16th, August 2003.
    [21]Alasia and Alfred V., “Process of coding indicia and product produced thereby,” U.S. patent 3 937 565, February, 1979.
    [22]Alessandro M. Palau and Robert R. Snapp, “The Labeled Cell Classifier: a Fast Approximation to k Nearest Neighbors,” 14th, ICPR, December, 1997.
    [23]Richard O. Duda, Peter E. Hart, and David G. Stork, “Pattern Classification,” 2nd, John Wiley & Sons, Inc, 2001.
    [24]Michael Purser, “Introduction to Error-Correcting codes,” Artech House, INC, 1995.
    [25]Rafael C. Gonzalez, “Digital image processing,” 2nd, Addison-Wesley Publishing Company, 1987.

    QR CODE