簡易檢索 / 詳目顯示

研究生: 蕭紀楹
Chi-Ying Hsiao
論文名稱: A Wavelet-Based Watermarking Scheme
一種基於小波轉換之浮水印方法
指導教授: 陳朝欽
Chaur-Chin Chen
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2008
畢業學年度: 96
語文別: 英文
論文頁數: 22
中文關鍵詞: 浮水印
外文關鍵詞: watermark
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • For the problem of copyright protection and ownership identification, the digital watermarking technique was brought up. The watermarking strategies can partially solve this problem. In this thesis, we apply a wavelet-based watermarking algorithm. We adopt the 5/3 and 9/7 wavelet transform to the original image and a binary pattern as our watermark. The binary pattern is a contour which shows the boundary of objects. The watermark is embedded into the coefficients of the high-low band and the low-high band at level 2 in a 2-scale wavelet transform of the original image. A watermark acquisition, embedding, extraction, and detection after a variety of the attacks by image processing operations and lossy data compression such as scaling, smoothing, cropping, noise adding, JPEG compression, and JPEG2000 compression are demonstrated. The PSNR values and the ratio of watermark detection of the attacks in various experiments show that our proposed approach is promising.


    Chapter 1 Introduction………………………..………1 Chapter 2 Discrete Wavelet Transform….…………...3 2.1 Flowchart of Wavelet Transform..................................................3 2.2 W5/3 Wavelet Transform………....……………………………….4 2.3 W9/7 Wavelet Transform………………………………………….5 2.4 Examples of 5/3 and 9/7 Wavelet Transforms……..……………..7 Chapter 3 A Proposed Watermarking Scheme………9 3.1 Watermark Acquisition………......................................................9 3.2 Watermark Embedding………......................................................9 3.3 Watermark Extraction................................................................10 3.4 Watermark Detection.................................................................11 Chapter 4 Experiments and Results…………………12 4.1 Experiment 1: Smoothing............................................................15 4.2 Experiment 2: Sharpening........................................................15 4.3 Experiment 3: Noise adding....................................................15 4.4 Experiment 4: JPEG compression….......................................15 4.5 Experiment 5: JPEG2000 compression.......................................15 4.6 Experiment 6: Cropping...........................................................154.7 Summary…….............................................................................19 Chapter 5 Discussion and Conclusion………....……20 References…………………………….………....……21

    [Barn2004] M. Barni and F. Bartolini, “Data Hiding for Fighting Piracy”, IEEE Signal Processing Magazine, Vol. 21, No. 2, 28–39, 2004.

    [Burr1998] C.S. Burrus, R.A. Gopinath, and H. Guo, Introduction to Wavelets and Wavelet Transforms: A Primer, 1998.

    [Cald1997] A.R. Calderbank, I. Daubechies, and W. Sweldens, “Lossless Image Compression Using Integer to Integer Wavelet Transforms”, IEEE International Conference on Image Processing, Vol. 1, 596-599, 1997.

    [Chan2004] C.K. Chan and L.M. Cheng, “Hiding Data in Images by Simple LSB Substitution”, Pattern Recognition, Vol. 37, 469–474, 2004.

    [Chen2002] C.C. Chen, “Watermarking Experiments Based on Wavelet Transforms”, The Proceedings of SPIE: Int'l Conference on Electronic Imaging and Multimedia Technology III, Vol. 4925, 60-68, 2002.

    [Cox1997] I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Transactions on Image Processing, Vol. 6, No. 12, 1673-1687, 1997.

    [Hart1999] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques”, Proceedings of the IEEE, Vol. 87, no. 7, 1079-1107, 1999.

    [Hsu1999] C.T. Hsu and J.L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, Vo1. 8, No. 1, 58-68, 1999.

    [Lai2006] B.L. Lai and L.W. Chang, “Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform”, Multimedia Signal Processing, 1085–1093, 2006.

    [Nguy2005] C. Nguyen and G.R. Redinbo, “Fault tolerance design in JPEG 2000 image compression system,” IEEE Transactions on Dependable and Secure Computing, Vol. 2, 57~75, 2005.

    [Podi1998] C.I. Podilchuk and W. Zeng, “Image-Adaptive Watermarking Using Visual Models”, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 525-539, 1998.

    [Podi2001] C.I. Podilchuk and E.J. Delp, “Digital watermarking-algorithms and applications”, IEEE Signal Processing Magazine, Vol. 18, 33-46, 2001.

    [Sent2007] V. Senthil and R. Bhaskaran, “Wavelet Based Digital Image Watermarking with Robustness against Geometric Attacks”, IEEE International Conference on Computational Intelligence and Multimedia Applications, Vol. 4, 89-93, 2007.

    [Sun2007] G. Sun and Y. Yu, “DWT Based Watermarking Algorithm of Color Images”, IEEE Conference on Industrial Electronics and Applications, 1823-1826, 2007.

    [Tau2000] D. Taubman, “Embedded Block Coding in JPEG2000,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, 33-36, 2000.

    [Tewf1997] A.H. Tewfik and M. Swanson, “Data Hiding for Multimedia Personalization, Interaction, and Protection”, Signal Processing Magazine, IEEE, Vol. 14, No. 4, 41–44, 1997.

    [Wang2000] Q. Wang and S. Sun, “DCT-Based Image-Independent Digital Watermarking”, WCCC-ICSP, Vol. 2, 942-945, 2000.

    [Web01] http://en.wikipedia.org/wiki/Digital_watermarking

    [Web02] http://www.mathworks.com/products/wavelet/

    [Web03] http://www.adobe.com/tw/products/photoshop/photoshop/features/

    [Yuso2007] Y. Yusof and O.O. Khalifa, “Digital Watermarking For Digital Images Using Wavelet Transform”, IEEE International Conference on Telecommunications, 665-669, 2007.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE