簡易檢索 / 詳目顯示

研究生: 蔡昇融
論文名稱: 以特殊網點建構證件安全之研究
指導教授: 王希俊
學位類別: 碩士
Master
系所名稱: 圖文傳播學系
Department of Graphic Arts and Communications
論文出版年: 2007
畢業學年度: 95
語文別: 中文
論文頁數: 58
中文關鍵詞: 數位半色調點陣調色法特殊網點證件安全
英文關鍵詞: digital halftoning, ordered dithering, figurative halftone dots, identity document security
論文種類: 學術論文
相關次數: 點閱:224下載:14
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 證件盜用手法以肖像變造為最常見,其原因在於證件照片與證件資料難以進行比對。針對此一辨識之弱點,本研究透過點陣調色法(ordered dithering)製作特殊網點半色調肖像,建立證件照片與證件資料之絕對關連性,降低證件變造的可能性。研究過程當中,我們成功建立自動矩陣產生器,提高網點演算效率,避免人為製程易發生的錯誤;此外,為抵抗不同網點形狀產生的干擾紋路,本研究透過改變網點排列規則與網點擴張正規化,有效提升影像品質。最後,特殊網點半色調肖像,透過十倍數放大鏡得以即時辨識隱藏資訊,完整執行加密與解密之安全機制。

    To verify the linkage between the photograph and the personal data on the security document is the weakest point of authentication process and that is the reason why the alternation of photograph accounts for the major cause of fraudulent use. In order to withstand this serious attack, the figurative halftone dots designed by ordered dithering are applied to the output of portrait on the secured documents. While an identity document containing figurative halftone dots, its anti-counterfeiting feature can withstand the illegal alteration of photograph. In this paper an automatic method to generate a threshold matrix is developed to enhance the efficiency of halftone dots generation. On the other hand, the image quality is further improved by adjusting dots distribution and dot gain correction.

    中文摘要 I 英文摘要 II 目錄 III 表目錄 V 圖目錄 VI 第一章 緒論 第一節 研究背景 1 第二節 研究動機 1 第三節 研究目的 2 第四節 研究問題 3 第五節 名詞釋義 3 第二章 文獻探討 第一節 數位半色調 4 第二節 特殊網屏設計與應用 9 第三節 證件安全 14 第四節 文獻探討小結 18 第三章 研究方法 第一節 研究設計 19 第二節 臨界值矩陣產生器 20 第三節 雜訊消除 26 第四節 濃度量測 30 第四章 結果與討論 第一節 影像品質評估 32 第二節 濃度結果與校正 38 第三節 應用範例與隱藏資訊檢測 47 第五章 結論與建議 第一節 結論 55 第二節 建議與未來工作 57 參考文獻 58

    [1] Y. Abe, A Comparative Study of Digital Halftoning Techniques, Proceedings of the IEEE 1992 National, Aerospace and Electronics Conference, pp.1139-1145, vol.3, Dayton, OH, May 1992.
    [2] J.P. Allebach, T.N. Pappas, Digital Halftoning, IEEE Signal Processing Magazine, pp.12-13, Vol. 20, Issue 4, July 2003.
    [3] B. Bayer, Color imaging array, U.S. Patent 3,971,065, 1976.
    [4] B.E. Bayer, An optimum method for two level rendition of continuous-tone pictures, Proc. IEEE International Conf. on Communication, Conference Record, pp.(26-11)-(26-15), 1973.
    [5] R. Eschbach, Z. Fan, K.T. Knox, G. Marcu, Threshold Modulation and Stability in Error Diffusion, IEEE Signal Processing Magazine, pp.14-27, July 2003.
    [6] P. Fink, PostScript Screening: Adobe Accurate Screens, MountainView, Ca., Adobe Press, 1992.
    [7] R.W. Floyd and L. Steinberg, An adaptive algorithm for spatial greyscale, roceedings of Society for Information Display, Vol 17(2), pp.75-77, 1975.
    [8] A. Hausner, Graph-order Dithering, SPIE proceedings, Conference on Color Imaging XI, vol.6058, pp.(605810-1)-(605810-8), San Jose, January 2006.
    [9] P.C. Hsiao, Y.T. Chen, H.C. Wang, Watermarking a Printed Binary Image with Varied Screen Rulings, 16th IPPR Conference on Computer Vision, Graphics and Image Processing, August 2003.
    [10] S.H. Kim, Model-based Clustered-Dot Screening, SPIE proceedings, Conference on Color Imaging XI, vol.6058, pp.(60580S-1)-(60580S0-9), San Jose, January 2006.

    [11] F. Koltai, Optical security features by using information carrier digital screening, SPIE proceedings, Conference on Optical Security and Counterfeit Deterrence Techniques IV, vol.4677, pp.138-144, San Jose, January 2002.
    [12] F. Koltai, B. Adam, Enhanced optical security by using information carrier digital screening, proceeding, Conference on Optical Security and Counterfeit Deterrence Techniques V, SPIE, vol . 5310, pp.160-169, San Jose, January 2004.
    [13] D.L. Lau, R. Ulichney, and G.R. Arce, Blue and green noise halftoning models, IEEE Signal Processing Magazine, pp.28-38, Vol. 20, Issue 4, July 2003.
    [14] V. Ostromoukhov, R.D. Hersch, Artistic Screening, Proceeding of SIGGRAPH’95, In ACM Computer Graphics, Annual Conference Series, pp.219-228, CA, August 1995.
    [15] V. Ostromoukhov, R.D. Hersch, Multi-Color and Artistic Dithering, Proceeding of SIGGRAPH 99, In ACM Computer Graphics, Annual Conference Series, pp.219-228, CA, August 1999.
    [16] T.N. Pappas, J.P. Allebach, D.L. Neuhoff, Model-Based Digital Halftoning, IEEE Signal Processing Magazine, pp.14-27, Vol. 20, Issue 4, July 2003.
    [17] B. Perry, S. Carr, P. Patterson, Digital Watermarks as a Security Feature for Identity Documents, SPIE proceedings, Conference on Optical Security and Counterfeit Deterrence Techniques III, vol.3973, pp.80-87, San Jose, April 2000.
    [18] N. Rudaz, R.D. Hersch and V. Ostromoukhov, An interface for the interactive design of artistic screens, Proceedings of the EP'98 Conferences, pp.1-10, St Malo, March, 1998.
    [19] N. Rudaz, R.D. Hersch, Protecting identity documents with a just noticeable microstructure, SPIE proceedings, Conference on Optical Security and Counterfeit Deterrence Techniques IV, vol.4677, pp.138-144, San Jose, January 2002.
    [20] N. Rudaz, R.D. Hersch, Protecting identity documents by microstructure color differences, Journal of Electronic Imaging, pp.315-323, Vol. 13, Issue 2, April 2003.
    [21] P. Sherry, A. Savakis, Improved techniques for watermarking halftone images, Proceedings of 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), pp.V-1005-V-1008, NY, May 2004.
    [22] O. Taheri, A.M. Attar, S. Sadri, R.A. Fattahi, I. Hosseini, Dot Diffusion with Nonlinear Thresholding to Hide Data in Halftoned Images, Proceedings of 2006 IEEE Information and Communication Technologies (ICTTA '06), pp.146-1473, Damascus, April 2006.
    [23] R. Ulichney, Digital Halftoning, MIT Press, Cambridge, MA, 1987.
    [24] R. Ulichney, The void-and-cluster method for generating dither arrays, in IS&T Symposium on Electronic Imaging Science & Technology, pp.332-343, San Jose, 1993.
    [25] H.C. Wang, C.Y.Lin, C.C. Huang, Data Hiding in a binary image by the modified digital halftoning techniques, proceedings, 1999 Conference on Computer Vision, Graphics and Image Processing, pp.183-190, Taipei, August, 1999.
    [26] S. K. Yip, O.C. Au, C.W. Ho, H.M. Wong, Pi-preserve data hiding for halftone image, Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication System, pp.125-128, Hong Kong, December 2005.
    [27] X. Zhang, F. Liu, L. Jiao, An Effective Image Halftoning and Inverse Halftoning Technique Based on HVS, Proceedings of IEEE Faith International Conference on Computational Intelligence and Multimedia (ICCIMA '03), pp.441-445, Xi’an, September 2004.

    QR CODE