研究生: |
林岳 Lin, Yueh |
---|---|
論文名稱: |
可逆式浮水印嵌入法則之硬體架構實現之研究 The hardware implementation of reversible watermarking algorithm |
指導教授: |
黃文吉
Hwang, Wen-Jyi |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 中文 |
論文頁數: | 49 |
中文關鍵詞: | 可逆式 |
DOI URL: | https://doi.org/10.6345/NTNU202204320 |
論文種類: | 學術論文 |
相關次數: | 點閱:79 下載:7 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文的主要目的是用一套硬體架構去實現浮水印嵌入法則。採用的法則是Hadamard Transform法則,與其他法則相比,此法則解決了其他法則有不可逆和會受到圖片種類而影響嵌入數量的問題,同時計算複雜度也不高,計算上較方便。
本論文將會以硬體架構去實現浮水印嵌入法則,在許多應用中,我們希望能夠即時的嵌入浮水印,在軟體中,嵌入所花的時間和想要嵌入的浮水印bits數成正相關,而此時用硬體處理的好處是執行時間不會因為想要嵌入的浮水印bits數而有太大變化,同時資源消耗方面也不太受影響,可在有限的時間內快速的嵌入浮水印。在其他以VLSI架構來嵌入浮水印的論文中,大多有嵌入完後不可逆的問題,或是可能無法為圖片提供全覆蓋保護,而在本論文中則解決了上述問題。綜合上述提到的觀點,本硬體架構具備低複雜度、處理速度快、可使嵌入浮水印後的圖片還原至原圖,以及提供全圖片覆蓋保護的優點。
[1] Coltuc, D. Low Distortion Transform for Reversible Watermarking. IEEE Trans. Image Processing, 21, 412-417, 2012.
[2] Chang, H. T., & Tsan, C. L.. Image watermarking by use of digital holography embedded,in the discrete-cosine-transform domain. Applied Optics, 6211-6219, 2005
[3] I. Cox,M. Miller, J.Bloom, J. Fridrich. T,Kalker. Digital Watermarking and Steganography, 2nd Ed., Morgan Kaufmann, 2008.
[4] J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach. New York:Wiley,2002.
[5] I. Kamel and H. Juma, A Lightweight Data Integruty Scheme for Sensor Networks, Sensors, pp.4118-4136, 2011.
[6] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, Reversible data hiding. IEEE Trans. Circuits and Systems for Video Technology, Vol. 16. pp. 354-362, 2006.
[6] Hong, W., & Chen, T.S. Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism, J. Vis. Commun. Image R., 22, 131-140, 2011.
[7] J. Lim, Robust image watermarking scheme against geometric attacks using a computer- generated hologram, Applied Optics,pp.6302-6312,2010.
[8] Cheng, C. J., Hwang, W. J., Chen, C.T. & Lai, X.J. (2014). Efficient FPGA-Based Fresnel Transform Architecture for Digital Holography, IEEE Journal of Display Technology, 10, 272-281, 2014.
[9] M. Wu and B. Liu, Watermarking for image authentication, Proc. IEEE Int. Conf. Image Processing, pp.437-441, 1998.
[10]Roy, S. D., Li, X., Shoshan, Y., Fish, A., & Yadid-Pecht, O.Hardware Implementation of a Digital Watermarking System for Video Authentication. IEEE Trans. Circuits and Systems for Video Technology, 23, pp 289-301, 2013. [11]Caragata, D., Radu, A. L., EI Assad, S., & Apostoe, C.. Chaos based fragile
watermarking algorithm for JPEG images, Proc. International Conf. for Internet Technology and Secure, 2008.
[12] D, Catagata, A. L. Radu, S.EI Assad, C.Apostoe, Chaos based fragile watermarking algorithm for JPEG images. Proc. International Conf. for Internet Technology and Secure Transactions, 2010.
[13] C. C. Chang, C. C. Lin, C. S. Tseng and W. L. Tai, Reversible hiding in DCT-based compressed images, Information Science, Vol. 127, pp. 2768-2786, 2007.
[14] Garimella, A., Satyanarayana, M. V. V., Kumar, R. S., Murugesh, P.S., & Niranjan, U.C.VLSI Implementation of Online Digital Watermarking Technique with Difference Encoding for 8-bit Gray Scale Images, Proc. IEEE International Conf. on VLSI Design,2003.
[15] J. Fridrich, M. Goljan, and R. Du, Invertible authentication, in Proc. SPIE Security Watermarking Multimedia Cintents, San Hose, CA, Jan.2001, pp. 197-208.
[16] Cheng, C. J., Hwang, W. J., Zeng, H. Y., & Lin, Y.C.A fragile watermarking algorithm for hologram authentication. IEEE Journal of Display Technology, 10, pp.263-271,2014.
[17] Cheng, C. J., Hwang, W. J., Zeng, H. Y., & Lin, Y.C.A fragile watermarking algorithm for hologram authentication. IEEE Journal of Display Technology, 10, pp.263-271,2014.
[18] 詹皓棠, 適用於數位全息圖認證之可逆式浮水印嵌入法則開發與分析, 國立臺灣師範大學資訊工程研究所, 2012.
[19] Hwang, W. J., Chan, H. T., & Cheng, C. J. Hologram Authentication Based on a Secure Watermarking Algorithm Using Cellular Automata. Applied Optics, 53, G64-G73. 2014.
[20] C. J. Cheng and L. C. Lin, Correlation-based watermarking by a digital hologtaphic technique, Opt. Eng., Bol. 44, 2005.
[21] Joshi, A. M., Darji, A., Mishra, V.Design and Implementation of Real-Time Image Watermarking. Proc. IEEE International Conference on Signal Processing, Communications and Computing,2011.
[22] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, Reversible Image Watermarking Using Interpolation Technique, IEEE Trans. Information Forensics and Security, Vol 5, pp.187-193, 2010.
[23] Maity, H. K., & Maity, S. P. FPGA Implementation of Reversible Watermarking in Digital Images Using Reversible Contrast Mapping. The Journal of Systems and Software, 96, 93-104, 2014.
[24] Coltuc, D., & Chassery, J. M. Very Fast Watermarking by Reversible Contrast mapping,IEEE Signal Processing letters, 14, 255-258, 2007.
[25] I. Kamel and H. Juma, A Lightweight Data Integruty Scheme for Sensor Networks, Sensors, pp.4118-4136, 2011.
[26] Mohanty, S.P., Ranganathan, N., & Balakrishnan, K. A Dual Voltage Frequency VLSI Chip for Image Watermarking in DCT Domain. IEEE Trans. Circuits and Systens-II: Express Briefs, 53,pp 394-398,2006.
[27]Mohanty, S.P., Kougianos, E., & Ranganathan, N. VLSI Architecture and Chip for Combined Invisible Robust and Fragile Watermarking. IET Comput. Digit. Tech., 1, pp 600-611, 2007.
[28] C. C. Lin, W. L. Tai, and C. C. Chang, Multilevel reversible data hiding based on histogram modification of difference image, Pattern Recognition, Vol. 41, pp. 3582- 3591, 2008.
[29] Joshi, Amit, R. M. Patrikar, and Vivekanand Mishra. Real time implementation of digital watermarking algorithm for image and video application. INTECH Open Access Publisher, 2012.
[30] Saraju P. Mohanty, N. Raganathan and K. Balakrishna , A Dual Voltage- Frequency VLSI chip for Image Watermarking in DCT Domain , IEEE Transaction on circuits and systems II(TCAS-II),vol. 53,pp 394-398,2006