研究生: |
李國彰 |
---|---|
論文名稱: |
同位檢查之易碎式與基於小波轉換之強健式浮水印之研究 |
指導教授: | 蘇崇彥 |
學位類別: |
碩士 Master |
系所名稱: |
機電工程學系 Department of Mechatronic Engineering |
論文出版年: | 2004 |
畢業學年度: | 92 |
語文別: | 中文 |
論文頁數: | 73 |
中文關鍵詞: | 數位浮水印 、影像驗證 、小波轉換 、同位檢查 |
論文種類: | 學術論文 |
相關次數: | 點閱:276 下載:1 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本研究針對數位影像之驗證與所有權歸屬的兩大課題,分別提出易碎式與兩種強健式數位浮水印演算法:
基於同位檢查之易碎式浮水印的部分,乃配合密碼學的機制,產生與影像大小相同的一組亂數。再根據各像素點所對應的亂數值,檢查該點灰階值特定數個位元平面之同位特性,對LSB做第一道的編碼。為了避免某些灰階值造成第一道編碼不可區分的情形,再以XOR運算對LSB做第二道的編碼。整個浮水印技術是公開、安全的,且不需複雜的數學運算。對於影像於傳輸中可能遭遇的各種竄改,在接收端均能有效地偵測出來。並且偵測是以像素點為基礎,能夠達到精確地偵測影像遭竄改的區域。
基於小波轉換之強健式浮水印部分演算法一:在藍、綠、紅三個平面不同的中頻小波係數中,考慮於中間位元平面,分別在不同的空間相對位置,嵌入多個浮水印。其後以投票的機制,萃取浮水印並解密。演算法二的部分:則採用能量相近、空間分佈相關的兩個中頻小波頻帶,以相對的大小關係來嵌入浮水印,並且可以彈性調整嵌入的強度。實驗結果顯示,本研究所提出來的方法其嵌入浮水印的影像,對於亮度調整、對比調整、裁切、濾波、影像失真壓縮等攻擊,具有一定程度的強健性,適合用來作為數位影像版權的保護機制。
In this research, we focus on the issues of the digital image authentication and ownership verification. We proposed a fragile watermarking and two robust watermarking algorithms to solve these problems respectively:
A parity-check fragile watermarking technique for color image authentication is proposed. First, we generate a series of random numbers with the number equal to the number of pixels in the image. The random numbers are used to select predefined patterns for parity checking. The LSB of each pixel is encoded according to the result of parity check. To avoid some special cases of gray level, the pixel is encoded further by a simple XOR operation with the same random number. The proposed scheme is simple, secure, and public. In addition, the tamper detection is pixel based. Experimental results show that the proposed technique can accurately indicate the altered areas under many attacks of image processing.
Two robust watermarking algorithms based on the property of the multiresolution signal decomposition of the discrete wavelet transform are proposed. In the first algorithm, we embed the encrypted watermarks into the wavelet coefficients of the intermediate frequencies separately correspond to blue, green, and red image planes. The watermarks are embedded repeatedly in different relative locations. After that, extraction of the watermark is based on the voting scheme. In the second algorithm, we embed the encrypted watermark into the wavelet coefficients of the two similar intermediate bands. The embedding procedure is based on the magnitude relation between the related coefficients. By the experimental results, both the proposed watermarks could survive under certain attacks to show the robustness of the watermark and to serve as a basic copyright protection scheme for digital images.
[1] J. B. Borka, “Security in value added networks-security requirements for EDI,” Computer Standard Interface, vol.12, pp.23-33, 1991.
[2] J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Borland, “Watermarking digital images for copyright protection,” IEE Proceedings on Visual Image Signal Process, vol.143, no.4, pp.250-256, 1996.
[3] I. J. Cox and Jean-Paul M. G. Linnartz, “Some general methods for tampering with watermarks,” IEEE Journal on Selected Areas in Communications, vol.16, no.4, pp.587-593, 1998.
[4] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications,” IEEE Journal on Selected Areas in Communications, vol.16, no.4, pp.573-586, 1998.
[5] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, 2001.
[6] A. Tirkel, G. Rankin, R. V. Schyndel, W. Ho, N. Mee, and C. Osborne, “Electronic Water Mark,” in Proc. DICTA , pp.666-672, 1993.
[7] M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. ICIP, vol.2, pp.26-29, Santa Barbara, CA, Oct. 1997.
[8] P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. IEEE Int. Conf. On Image Processing, vol.1, pp.455-459, Chicago, USA, Oct. 1998.
[9] P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. on Image Processing, vol.10, no.10, pp.1593-1601, Oct. 2001.
[10] H. Zhong, F. Liu and L. Jiao, “A new fragile watermarking technique for image authentication,” IEEE Int. Conf. on Image Processing, 6th, vol.1, pp.792-795, Aug. 2002.
[11] H. Lu, R. Shen and F. Chung, “Fragile watermarking scheme for image authentication,” IEE Electronics Letters, 12th, vol.39, no.12, pp.898-900, June 2003.
[12] C. Li, D. Lou, and J. Liu, “Image-integrity and authenticity verification via content-based watermarks and a public key cryptosystem,” Jol. of the Institute of Electrical Engineering, vol.10, no.1, pp.99-106, 2003.
[13] J. Lee and C. S. Won, “Image integrity and correction using parities of error control coding,” IEEE Int. Conf. on Multimedia and Expo, vol.3, pp.1297-1300, Aug. 2000.
[14] Q. Sun, S. Chang, K. Maeno and M. Suto, “A new semi-fragile image authentication framework combining ECC and PKI infrastructures,” IEEE Int. Symposium on Circuits and Systems, vol.2, pp.440-443, 2002.
[15] J. Hu, J. Huang, D. Huang and Y. Q. Shi, “Image fragile watermarking based on fusion of multi-resolution tamper detection,” IEE Electronics Letters, 21st, vol.38, no.24, pp.1512-1513, November 2002.
[16] Z. Lu, C. Liu, D. Xu and S. Sun, “Semi-fragile image watermarking method based on index constrained vector quantization,” IEE Electronics Letters, 9th, vol. 39, no. 1, pp.35-36, Jan. 2003.
[17] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, vol.6, no.12, pp. 1673-1687, Dec. 1997.
[18] D. J. Fleet and D. J. Hegar, “Embedding invisible information in color images,” IEEE Int. Conf. on Image Processing, vol.1, pp.532-535, 1997.
[19] M. Kutter, “Watermarking resist to translation, rotation, and scaling,” in Proc. SPIE, vol. 3528, pp. 523-531, Jan. 1998.
[20] S. Pereira and T. Pun, “Fast robust template matching for affine resistant image watermarking,” IEEE trans. on Image Processing, vol.9, pp.1123-1129, 2000.
[21] J. O’Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” in Proc. IEEE Int. Conf. on Image Processing, pp. 536-539, 1997.
[22] C. Y. Lin, M. Wu, M. L. Miller, I. J. Cox, and Y. M. Lui, “Rotation, scale, and translation resilient public watermarking for images,” in Proc. SPIE Security and Watermarking of Multimedia Contents II, vol.3971, pp.90-98, 2000.
[23] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” in Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
[24] C. S. Lu, S.K. Huang, C.J. Sze, and H.Y. Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, vol.2, no.4, pp.209-224, Dec. 2000.
[25] C. W. Tang and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE trans. on Signal Processing, vol.51, no.4, pp.950-959, April 2003.
[26] H. S. Malvar and D.A.F. Florencio, “Improved spread spectrum a new modulation technique for robust watermarking,” IEEE trans. on Signal Processing, vol.51, no.4, pp.898-905, 2003.
[27] T. Furon and P. Duhamel, “An asymmetric watermarking method,” IEEE trans. on Signal Processing, vol.51, no.4, pp.981-995, 2003.
[28] A. Nikolaidis and I. Pitas, “Asymptotically optimal detection for additive watermarking in the DCT and DWT domains,” IEEE trans. on Image Processing, vol.12, no.5, pp.563-571, 2003.
[29] R. Wolfgang, C. I. Podichuk, and E. J. Delp, “The effect of matching watermark and compression transforms in compressed color images”. IEEE Int. Conf. on Image Processing, vol. 1, pp. 440-444, 1998.
[30] P.C. Su, H.Y.M. Wang, and C.C.J. Kuo, “An Integrated Approach to image watermarking and JPEG-2000 compression,” Journal of VLSI Signal Process, vol.27, no.1-2, pp.35-53, Feb. 2001.
[31] W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd Ed., Prentice Hall, 1999.
[32] S. G. Mallat, “A theory for multiresolution signal decomposition: the wavelet representation,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol.11, no.7, pp.674-693, July 1989.
[33] I. Daubechies and W. Sweldens, “Factoring wavelet transforms into lifting steps,” Journal of Fourier Analysis and Applications, vol. 4, pp. 247-269, 1997.
[34] Autonimi, M., M. Barlaud, P. Mathieu, and I. Daubechies, “Image coding using wavelet transform,” IEEE Trans. on Image Processing, vol.1, pp.205-220, 1992.
[35] 蘇崇彥,李國彰,"應用小波轉換之加密型數位浮水印",2003數位生活與網際網路科技研討會,台南成大,2003
[36] Chorng-Yann Su, Kuo-Chang Lee, and Jou-Yun Pan, 2003, "A Low-Complexity Encrypted Digital Watermark", 16th IPPR Conference on Computer Vision, Graphics and Image Processing, CVGIP’03, pp.794-801, Taiwan, 2003.
[37] W. Bemder, D. Gruhl, N. Morimoto, and A. Lu, ”Techniques for data hiding,” IBM System Journal, vol.35, no.3, pp.313-33, 1996.
[38] 友立資訊,http://www.ulead.com.tw/
[39] C. Christopoulos, A. Skodras, and T. Ebrahimi, “The JPEG2000 still image coding system: An overview,” IEEE Trans. on Consumer Electronics, vol.46, no.4, pp.1103-1127, Nov. 2000.
[40] F. A. P. Petitcolas, and Anderson, R.J., “Evaluation of copyright marking systems,” Proc. of IEEE Multimedia Systems, vol.1, pp.547-579, Florence, Italy, June 1999.
[41] F. A. P. Petitcolas, “Watermarking schemes evaluation.” I.E.E.E. Trans. on Signal Processing, vol.17, no.5, pp.58–64, September 2000.
[42] F. A. P. Petitcolas, http://www.petitcolas.net/fabien/watermarking/index.html