研究生: |
藍品淳 Pin-Chun Lan |
---|---|
論文名稱: |
一種利用混合轉換之強韌型數位影像浮水印技術 A Study on Mixed Transform Technology for Robust Digital Watermark of Digital Image |
指導教授: |
莊謙本
Chuang, Chien-Pen |
學位類別: |
碩士 Master |
系所名稱: |
工業教育學系 Department of Industrial Education |
論文出版年: | 2011 |
畢業學年度: | 99 |
語文別: | 中文 |
論文頁數: | 80 |
中文關鍵詞: | 尺度不變特徵技術 、離散小波轉換 、離散餘弦轉換 、雜訊可見函式 |
英文關鍵詞: | scale-invariant feature transform, discrete wavelet transform, discrete cosine transform, noise visibility function |
論文種類: | 學術論文 |
相關次數: | 點閱:176 下載:1 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本篇論文針對數位影像設計一個具有強韌性質的數位浮水印技術,目的是為了保護數位影像的智慧財產權。一般而言,對於浮水印影像的攻擊可分成幾何攻擊與非幾何攻擊兩大類,一個良好的強韌型數位浮水印演算法要能承受上述的攻擊。然而,在大部分抵抗幾何攻擊的研究中,有著浮水印嵌入容量受到限制的問題,有鑑於此,本篇論文使用尺度特徵不變技術來抵抗幾何攻擊,並且藉由二維條碼本身的高容量和高容錯特性,提升浮水印容量。結合離散小波與離散餘弦的混合轉換,並加入雜訊可見函式的考量,可以改善浮水印影像的視覺透明度。由數個實驗結果來展示演算法的效能,測試的攻擊模式有影像壓縮、縮放、模糊、銳化、對比以及亮度等攻擊,並與另一現存的浮水印演算法做比較,可以擁有較高的影像品質與攻擊抵抗能力。本篇論文的浮水印演算法能有效地兼顧強韌度與視覺透明度,進一步達到保護數位影像的智慧財產權之目的。
This thesis focuses on the study of robust watermarking techniques to protect the intellectual property rights for digital images. In general, watermark attacks can be divided into two classes: geometric attacks and non-geometric attacks. A robust digital watermark algorithm can resist the above attacks. Recently, most of the researches focus on resisting geometric attacks with watermarking techniques but it’s not recommended due to the restricted watermark embedding capacity. To resolve the above problem, this thesis proposes a watermark algorithm based on scale-invariant feature transform. The improvement of watermark embedding capacity depends on two-dimension barcode’s storage of high capacity of information, error-correction ability. The watermark algorithm uses a combination of the discrete wavelet transform, the discrete cosine transform and noise visibility function to improve the perceptual transparency. The experimental results demonstrate the performance of the proposed scheme. The watermark attacks uses in the experiments include image compression, resize, blurring, sharpening, contrast and brightness. Finally, the experimental results show the performance of this scheme to be superior to that of an existing one.
[1] 經濟部智慧財產局 (2011)。查禁仿冒統計。2011年6月10日,取自http://www.tipo.gov.tw/ch/index.aspx.
[2] IEEE Xplore Digital Library (2011). Available at http://ieeexplore.ieee.org/Xplore/guesthome.jsp.
[3] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.
[4] C. H. Lee and Y. K. Lee, “An adaptive digital image watermarking technique for copyright protection,” IEEE Transactions on Consumer Electronics, vol. 45, issue. 4, pp. 1005–1015, Nov. 1999.
[5] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn (1999), “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.
[6] Y. Hu and S. Kwong, “An image fusion based visible watermarking algorithm,” Proc. of the 2003 Int. Symp. on Circuits and Systems, vol. 3, pp. 794–797, May 2003.
[7] X. Zhang and S. Wang, “Fragile Watermarking with Error-Free Restoration Capability,” IEEE Transactions on Multimedia, vol. 10, issue. 8, pp. 1490–1499, 2008.
[8] J. Fridric and M. Goljan, “Images With Self-correcting Capabilities,” Proceedings of IEEE International Conference on Image Processing, vol. 3, pp. 792–796, 1999.
[9] C. Ramos, R. R. Reyes, M. N. Miyatake, and H. P. Meana, “Image Authentication Scheme Based on Self-embedding Watermarking”, Lecture Notes In Computer Science, vol. 5856, pp. 1005–1012, 2009.
[10] 陳同孝、黃國峰、張真誠,“數位影像處理技術”,初版,旗標圖書,2003年12月。
[11] N. Wang, Y. Wang and X. Li , “A Novel Robust Watermarking Algorithm based on DWT and DCT,” International Conference on Computational Intelligence and Security, vol. 1, pp. 437–441, 2009.
[12] R. G. van Schyndel, A. Z. Tirkel and C. F. Osborne, “A digital watermark,” Proceedings of the International Conference on Image Processing, vol. 2, pp. 86–90, Nov. 1994.
[13] S. P. Maity and M. K. Kundu, “Robust and Blind Spatial Watermarking In Digital Image,” Proc. 3rd Indian Conf. on Computer Vision, Graphics and Image Processing (ICVGIP '2002), pp. 388–393, Dec. 2002.
[14] G. Voyatzis and I. Pitas, “Chaotic watermarks for embedding in the spatial digital image domain,” Proc. ICIP98, vol. 2, pp.432–436 , 1998.
[15] C. Chan and L. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, vol. 37, issue. 3, pp. 469–474, Mar. 2004.
[16] M. Vetterli and J. Kovačević, 1995. Wavelets and Subband Coding. Prentice Hall, USA.
[17] W. H. Lin, Y. R. Wang, S. J. Horng, T. W. Kao and Y. Pan, “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, vol. 36, issue. 9, Nov. 2009.
[18] R. M. Zhao, H. Lian, H. W. Pang and B. N. Hu, “A Blind Watermarking Algorithm Based on DCT,” Intelligent Information Technology Application, vol. 3, pp. 821–824, 2008.
[19] A. H. Ali, “Combined DWT-DCT Digital Image Watermarking,” Journal of Computer Science, vol. 3, issue. 9, pp. 740–746, 2007.
[20] E. J. Delp and R.F. Wolgang, “A watermark for Digital Images”, Proceedings of the IEEE International Conference on Image Processing, pp.219–222, Sep. 1996.
[21] G. Gao, “A Blind Grayscale Watermark Algorithm Based on Chaos and Mixed Transform Domain,” Computer and Automation Engineering (ICCAE), vol. 1, pp. 658–662, 2010.
[22] L. Li, X. Yuan, Z. Lu and J. S. Pan, “Rotation invariant watermark embedding based on scale-adapted characteristic regions,” Information Science, vol. 180, issue. 15, pp. 2875–2888, Aug. 2010.
[23] H.Y. Lee, H. kim and H.K. Lee, “Robust Image Watermarking using local Invariant Features,” SPIE, Journal of Optical Engineering, vol. 45, issue. 3, 2006.
[24] X. W. Li, B. L. Guo and L. Chen, “RST Invariant Image Watermarking based on Invariant Contents,” Genetic and Evolutionary Computing (ICGEC), pp. 675–678, 2010.
[25] C. G. Thorat and B. D. Jadhav, “A Blind Digital Watermark Technique for Color Image Based on Integer Wavelet Transform and SIFT,” Proceedings of the International Conference and Exhibition on Biometrics Technology, vol. 2, pp. 236–241, 2010.
[26] D. G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints,” International Journal of Computer, vol. 60, vo. 2, pp. 91–110, 2004.
[27] SIFT Library (2011). Available at http://blogs.oregonstate.edu/hess/code/sift/.
[28] QR Code.com (2011). Available at http://www.denso-wave.com/qrcode/aboutqr-e.html.
[29] S. Voloshynovskiy , A. Herrigel , N. Baumgaertner and T. Pun, “A Stochastic Approach to Content Adaptive Digital Image Watermarking,” Proceedings of the Third International Workshop on Information Hiding, pp.211-236, Sep. 1999.
[30] G. Voyatzis and I. Pitas, “Applications of Toral Automorphisms in Image Watermarking,” In Proceeding of the IEEE International Conference on Image Processing, vol. 3, pp. 219-222, 1996.
[31] University of Southern California (2011). Available at http://sipi.usc.edu/database/database.php.
[32] Quick Mark (2011). Available at http://www.quickmark.com.tw/cht/basic/download.asp.