研究生: |
莊偉銘 Wei-Ming Chung |
---|---|
論文名稱: |
利用數位浮水印於影像監視系統的影像認證技術 Image Surveillance System with Digital Watermarking for Image Authentication |
指導教授: |
張隆紋
Long-Wen Chang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 中文 |
論文頁數: | 34 |
中文關鍵詞: | 影像認證 、數位浮水印 |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在未來,許多的商品以及影像,舉凡數位票卷、犯罪影像、醫學影像等等,都從傳統模式走向數位化,為了防止被惡意竄改,影像認證變得極為重要。
我們提出一個基於內容的半易碎浮水印方法,來驗證數位影像的合法性。模擬結果顯示,利用離散小波轉換低頻資訊的Zernike moments來取影像特徵值,增加了影像的堅韌性,會使得影像擁有半易碎的特質,換而言之,我們的方法不僅僅可以讓影像抗壓縮,也可以指出測試影像被修改的位置。
實驗結果顯示,我們可以指出影像被竄改的位置,更有高度的堅韌性,抵抗JPEG壓縮係數75以上的能力,實做上,這個方法兼具高強韌性及影像認證,非常適合用在路面影像監視系統上。
In the very near future, many products and transaction in our daily life will be done in the digital world. For example, tickets, crime images, and medical images are digital. In order to prevent the images from being tampered with, image authentication is extremely important.
A semi-fragile watermarking algorithm based on the image content is proposed to inspect and verify the legitimacy of an image. Simulation result shows that choosing the Zernike moments as features in the low pass wavelet band increases the robustness of image.
Experimental result shows that we can tell if an image is maliciously attacked or not and locate which block is tampered. Moreover, the image has high robustness against noise and JPEG compression with the quality factor Q 75. The technique can be used in an surveillance system for image authentication to prove the legality both the image and the surveillance system for digital forensic.
[1] H. Liu , J. Lin, J. Huang “Image authentication using content based watermark,” Circuits and Systems, ISCAS . IEEE International Symposium on, vol.4, pp. 4014 – 4017, May 23-26 2005.
[2] A. C. Popescu and H. Farid “Exposing digital forgeries in color filter array interpolated image,” IEEE Transactions on Signal Processing, vol.53, no. 10, Oct. 2005.
[3] P. W. Wong; Memon, N. “Secret and public key image watermarking schemes for image authentication and ownership verification,” Image Processing, IEEE Transactions on, vol.10, issue 10, pp.1593 – 1601, Oct. 2001.
[4] P. W. WONG. “A watermark for image integrity and ownership verification,” Proc. IS&T PIC Conf., Portland OR, USA, May 1998.
[5] P. W. WONG. “A public key watermark for image verification and authentication,” Image Processing, ICIP 98. Proceedings, pp. 425–429, Oct. 4–7, 1998.
[6] E. T. Lin, C. I. Podilchuk, E. J. Delp “Detection of image alterations using semi-fragile watermarks,” in Proc. SPIE, Security and Watermarking of Multimedia
Contents II, San Jose, CA, vol. 3971, pp. 152-163, Jan. 2000.
[7] C. Fei, D. Kundur, R.H. Kwong “Analysis and design of secure watermark-based authentication systems,” Information Forensics and Security, IEEE Transactions on
vol. 1, issue 1, pp. 43 – 55, Mar. 2006.
[8] H.S. Kim, H.K. Lee “Invariant image watermark using Zernike moments,” IEEE Transactions on Circuits and Systems For Video Technology, vol. 13, no. 8, Aug 20.