簡易檢索 / 詳目顯示

研究生: 江振揚
Jiang, Zhen-Yang
論文名稱: Game Theoretic Analysis of Watermarking Scheme using A Saliency Model
基於賽局理論分析之顯著資訊浮水印技術
指導教授: 張隆紋
Chang, LongWen
口試委員: 張寶基
Chang, Pao-Chi
杭學鳴
Hang, Hsueh-Ming
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 39
中文關鍵詞: 數位浮水印顯著資訊賽局理論
外文關鍵詞: watermarking, saliency model, game theory
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著網際網路不斷的發展,多媒體資訊的保護與認證日趨重要,而數位浮水印便是用來解決此一問題的有效技術。
    本論文提出一個建立在人眼視覺系統的顯著資訊數位浮水印技術,並且以結合空間域以及頻率域的方式,來提高影像之嵌入容量,但在視覺上達到不易被察覺的嵌入效果,以及應用賽局理論建立競賽機制,來分析控制嵌入浮水印後影像的品質與浮水印嵌入的強度,在影像品質與嵌入強度之間取得平衡;最後利用浮水印的特性,可以令接收端對影像內容之認證。
    由實驗結果得知,我們提出的方法可以有效的抵抗JPEG壓縮,達到浮水印的保護與影像內容的認證,同時保有影像的品質。


    In this paper, we proposed a novel watermark scheme of copyright protection to obtain an acceptable image quality and to improve the capacity of data hiding. To achieve above goals, our proposed watermark scheme uses the saliency model of human visual system to decide the embedding positions of the host image for reducing the visual distortion. The watermark is embedded in the frequency domain for authentication and in the spatial domain for data hiding. We apply the game theory to obtain optimal quantization step size for each domain. By game theoretic analysis, we get Nash equilibrium as the best strategy for the quality of watermarked image and the robustness of the embedded watermark.

    Chapter 1 Introduction Chapter 2 Related Work 2.1 The visual attention model 2.2 Extensive games with perfect information 2.2.1 Overview 2.2.2 Nash equilibrium 2.3 Torus Automorphsim Chapter 3 Proposed Method 3.1 The watermarking in the frequency domain 3.1.1 Select the coefficients of DCT 3.1.2 The embedding procedure 3.2 The watermarking in the spatial domain 3.3 Select quantization step size by game theory 3.4 Watermark extraction and authentication Chapter 4 Experimental Result Chapter 5 Conclusion Reference

    [1] A.K. Choudhury, N.F. Maxemchuk, S.Paul, and H.G. Schulzrinne, “Copyright protection for electronic publishing over computer networks”, June 1994.
    [2] C-T Hsu and J-L. Wu, “Hidden digital watermarks in images”, IEEE Tran on Image Processing, pp. 58-68, Jan 1999.
    [3] V.M. Potdar, S. Han, and E. Chang, “A survey of digital image watermarking techniques”, IEEE Intl. Conf. Industrial Informatics, pp. 709-716, Aug 2005.
    [4] Frank Y. Shih, and Scott Y.T. Wu, “Combinational image watermarking in the spatial and frequency domains”, Pattern Recognition, 36(7), pp. 1489-1500, July 2003.
    [5]Ku-Hung Chen, “The combination of data hiding and digital watermarking in images”, Information system and application at NTHU, Taiwan, 2004
    [6] Arijit Sur, S. Srikar Sagar, and Rajarshi Pa, “A new image watermarking scheme using saliency based visual attention model”, India Conference (INDICON), 2009 Annual IEEE, pp. 1-4, 2009
    [7]Chi-Kai Yu, “A study on a watermarking game”, Information system and application at NTHU, Taiwan, 2008
    [8]Yu-Rou Tang, “Game-theoretic analysis of semi-fragile watermarking for image authentication and tamper localization”, Computer science at NTHU, Taiwan, 2009
    [9]L. itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis”, IEEE Trans. Pattern Analysis and Machine Intelligence, 20(11), pp. 1254-1259, November 1998.
    [10]G. Voyatzis and I. Pitas, “Digital image watermarking using mixing systems”, Computers & Graphics, 22(4), pp. 405-416, August 1998.
    [11]E. Koch ,and J.Zhao, “Towards robust and hidden image copyright labeling”, Proc. IEEE Nonlinear Signal and Image Processing, pp. 452-455, June 1995
    [12]Chiou-Ting Hsu, and Ja-ling Wu, “Hidden signatures in images”, IEEE Signal Processing Society 1996 International Conference on Image Processing (ICIP'96), Vol. III, pp. 743-746, September 1996.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE