研究生: |
王宗彥 Chung-Yen Wang |
---|---|
論文名稱: |
基於鄰近區塊之竄改偵錯及影像復原認證方法 Image Authentication with Localization and Recovery Using Adjacent Block |
指導教授: |
張隆紋
Long-Wen Chang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 英文 |
論文頁數: | 39 |
中文關鍵詞: | 影像認證 、影像復原 、剩餘區塊 |
外文關鍵詞: | image authentication, image recovery, residual block |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著數位時代的來臨,電子數位影像已經廣泛且普遍被大眾所使用和傳遞。然而、影像內容的真實性、可信度等許多問題也隨之而來。尤其在醫學、法律、 等數位文件的應用上,確保影像的真實性便顯得格外重要。有鑑為此,我們提出了一套可以指出且復原錯誤區塊的影像認證系統。
在以下所提出的論文中,影像內容的一致性和相似性被用來建造剩餘區塊,而剩餘區塊經過了離散餘弦轉換後,以編碼藏入對映區塊。由於剩餘區塊的能量很小,所以易於藏匿也可保有好的視覺影像。
根據實驗結果,我們的系統不但可以指出影像被竄改的區塊,也可以做某種程度的復原,而藏匿過後的視覺品質達到一定水準,復原能力和偵錯精準度也有不錯的表現。
The image authentication with watermark and localization has been widely studied for many years. However, there are few of them providing the recovery in tampered region. In this paper, we proposed an authentication system not only providing localization as well as tampered region recovery.
First, we construct a reference block from adjacent block. Then a residual block is provided by subtracting reference from original block. In our assumption, the energy of it is very low and convenient for us to embed. After encoded and embedded, a system with localization and recovery is constructed.
From the simulations and experiments, we find that our proposed method gives a good vision quality. The localization of the tampered area is also successfully marked out and recovered with acceptable fidelity. Furthermore, the robustness of JPEG compression is also provided.
[1] Xiang Zhou, Xiauhui Duan and Dauxian Wang, “A Semi-Fragile Watermark Scheme for Image Authentication ,” Proc. IEEE Int. Conf. on Multimedia Modelling, pp. 374-377, Jan. 2004.
[2] Huajian Liu and Maartin Steinebach, “Digital Watermarking for Image Authentication with Localizaton.” Image Processing, 2006 IEEE International Conference, pp. 1973-1976, Oct. 2006
[3] Fawad Ahmed and M.Y.Siyal, “A Securer and Robust Hashing Scheme for Image Authentication,” Information, Communications and Signal Processing, 2005 Fifth International Conference, pp. 705- 709, Dec. 2005
[4] Abdelkader H, Ouda, Mahmoud R, El-Sakka, “Localization and security enhancement of block-based image authentication,” Image Processing, 2005. ICIP 2005. IEEE International Conference, pp. I- 673-6, Sept. 2005
[5] Phen-Lan Lin, Po-Whei Huang and An-Wei Peng, “A fragile watermarking scheme for image authentication with localization and recovery,”Multimedia Software Engineering, 2004. Proceedings. IEEE Sixth International Symposium, pp. 146- 153, Dec. 2004
[6] Cook II, David Wu and Rajan, P.K, “TIAMAT: A New Fragile Watermarking Technique for Image Authentication,” System Theory, 2006 Proceeding of the Thirty-Eighth Southeastern Symposium, pp. 221- 225, March 2006
[7] Yuan-Liang Tang and Ching-Ting Chen, “Image Authentication Using Relation Measures of Wavelet Coefficients,” Proceedings of the 2004 IEEE international Conference,
[8] Chun-Shien Lu and Liao, H.-Y.M., “Multipurpose watermarking for image authentication and protection,” Image Processing, IEEE Transactions, pp. 1579-1592, Oct 2001
[9] Ching-Yung Lin, Daby Sow and Shih-Fu “Usingself Authentication and Recovery Image for Error Concealment in Wireless Environments,”
[10] http://www.pages.drexel.edu/~weg22/edge.html
[11] Ingemar J.COX Mathew L. Miller Jeffeey A. BLOOM Digital Watermarking ISNB 1-55860-714-5
[12] Che-Fu Chu, “Reversible Data Hiding using Shifting of Mean Values,” Thesis submitted to National Tsing-Hua University,” Jul.2006
[13] Xiauyun Wu , Jun quan Hu, Zhixing Gu, Jiwu Huang “A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters,” pp. 75 - 80 2005
[14] Chun-Shien Lu, Mark Liao, “Structural Digital Signature for Image Authentication:An Incidental Distortion Resistant Shceme,” IEEE Transaction on Multimedia pp.161-173 Jun 2003