研究生: |
詹皓棠 Hao-Tang,Chan |
---|---|
論文名稱: |
適用於數位全息圖認證之可逆式浮水印嵌入法則開發與分析 A Reversilbe Fragile Watermarking Algorithm for Holograms |
指導教授: |
黃文吉
Hwang, Wen-Jyi |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2014 |
畢業學年度: | 102 |
語文別: | 中文 |
論文頁數: | 54 |
中文關鍵詞: | 全息圖 、Hadamard轉換 、可逆式 、高PSNR 、嵌入數量大 |
論文種類: | 學術論文 |
相關次數: | 點閱:110 下載:14 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文的目的是提出一個新法則來改善浮水印嵌入的效果,新的法則是以Hadamard轉換為基礎進行還原的。在本文中會用數據以及公式來表現出新的法則不但可以讓Hologram還原成原始狀態,在PSNR值與嵌入的資訊數量上有良好的表現,足以取代先前所提出的浮水印嵌入法則。上述的優點正足以表示本論文所使用的法則則擁有相當好的隱蔽性、可逆性與靈敏性,這三個優點對於Hologram是來講是相當重要的。Hologram是一個很講求精準還原的技術,尤其是如果還原上有偏差的情形產生時,會導致後續的研究很難取得正確的結果,所以本論文的法則是必要,可以使用本論文的法則來將浮水印嵌入,一方面保證獲得的結果是正確的,一方面也保證浮水印截取之後可以還原,完全足以適用在Hologram的相關技術上。
[1] U. Schnars and W. P. Jueptner , Digital Holography, Spring-Verlag, 2005.
[2] I. Cox,M. Miller, J.Bloom, J. Fridrich. T,Kalker. Digital Watermarking and Steganography, 2nd Ed., Morgan Kaufmann, 2008.
[3] H. T. Chang and C. L. Tsan, Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain, Applied Optics, pp.6211-6219, 2005
[4] C. J. Cheng and L. C. Lin, Correlation-based watermarking by a digital hologtaphic technique, Opt. Eng., Bol. 44, 2005.
[5] J. Lim, Robust image watermarking scheme against geometric attacks using a computer- generated hologram, Applied Optics,pp.6302-6312,2010.
[6] J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach. New York:Wiley,2002.
[7] I. Kamel and H. Juma, A Lightweight Data Integruty Scheme for Sensor Networks, Sensors, pp.4118-4136, 2011.
[8] M. Wu and B. Liu, Watermarking for image authentication, Proc. IEEE Int. Conf. Image Processing, pp.437-441, 1998.
[9] D, Catagata, A. L. Radu, S.EI Assad, C.Apostoe, Chaos based fragile watermarking algorithm for JPEG images. Proc. International Conf. for Internet Technology and Secure Transactions, 2010.
[10] C. C. Chang, C. C. Lin, C. S. Tseng and W. L. Tai, Reversible hiding in DCT-based compressed images, Information Science, Vol. 127, pp. 2768-2786, 2007.
[11] J. Fridrich, M. Goljan, and R. Du, Invertible authentication, in Proc. SPIE Security Watermarking Multimedia Cintents, San Hose, CA, Jan.2001, pp. 197-208.
[12] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, Reversible data hiding. IEEE Trans. Circuits and Systems for Video Technology, Vol. 16. pp. 354-362, 2006.
[13] C.-C. Lin, N.-L. Hsueh, A lossless data hiding scheme based on three-pixel block differences, Pattern Recognition, Vol. 41, pp.1451-1425, 2008.
[14] C. C. Lin, W. L. Tai, and C. C. Chang, Multilevel reversible data hiding based on histogram modification of difference image, Pattern Recognition, Vol. 41, pp. 3582- 3591, 2008.
[15] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, Reversible Image Watermarking Using Interpolation Technique, IEEE Trans. Information Forensics and Security, Vol 5, pp.187-193, 2010.
[16] W. HONG, T.-S. Chen, Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism, J. Vis. Commun. Image R., Vol. 22, pp. 131-140, 2011.
[17] C.-J. Cheng, W.-J. Hwang, H.-Y. Zeng, and Y.-C. Lin, A Fragile Watermarking Algorithm for Hologram Authentication, IEEE Journal of Display Technology, Vol 10. Pp.263-271, 2014.
[18] K. J. Horodam, Hadamard Matrices and Their Applications, Princeton University Press, 2007.
[19] D. C. Ghiglia and M. D. Pritt, Two-Dimensional Phase Unwrapping:Theory , Algorithms and Software, Wiley Inter-Science: New York, NY, USA, 1998.
[20] Y. L. Lee, Y. C. Lin, H. Y. Tu, and C. J. Cheng, Phase measurement accuracy in digital holographic microscopy using a wavelength-stabilized laser diode, Journal of Optics, 025403, 2013.