簡易檢索 / 詳目顯示

研究生: 黃柏勳
Po-Shuin Huang
論文名稱: 基於資料隱藏及適性區塊的高效能數位影像錯誤修復法
High Efficient Adaptive Block-Based Error Concealment for Digital Images with Data Hiding
指導教授: 張隆紋
Long-Wen Chang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 40
中文關鍵詞: 適性區塊資料隱藏錯誤修復
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在網路及多媒體資訊的帶動下,將資訊隱藏在數位資料中的技術漸漸普遍,其重要性也逐步升高。尤其在軍事、緊急醫療、監視系統上,這些技術更是目光的焦點。使用在這幾個領域上的數位影像,都有著空間或時間上的限制,以致於某一時間點所產生的影像,無法重製,也無法重新傳送。更重要的是,這些領域對影像品質的要求相當高,其內容的準確性須達到一定的水準才有法律上或實用上的參考價值。因此,已有許多針對這些領域來開發的基於資料隱藏與不經壓縮的通訊頻道的錯誤修復演算法,來面對數位影像封包掉落或是遭受攻擊的情況,其在修復畫質的表現上令人驚豔,但普遍來說,它們都有運算複雜度過高,難以實際應用的問題。 本篇論文將會提出一個高效能的錯誤修復演算法,其核心是將影像區塊以其與鄰近區塊之相關性及本身複雜度作分類,並分別施與不同的修復策略,同時針對區塊特性的不同,將可嵌入資訊的空間重新分配,以期達到實際應用上可接受的運算複雜度,並同時保持高水準的影像修復品質。


    Chapter 1 Introduction 1 Chapter 2 Reviews of the previous works 3 Chapter 3 Analysis 5 3-1 Two-ways reference block 5 3-2 Joint source recovery 9 Chapter 4 Proposed method 13 4-1 Preprocessing 14 4-2 Data generation and mapping block locating 16 4-2-1 Authentication bits 17 4-2-2 Recovery bits 17 4-2-3 Data integration 22 4-3 Data embedding 24 4-4 Data extraction and image authentication 25 Chapter 5 Simulation results 29 Chapter 6 Conclusion and future work 39 Chapter 7 Reference 40

    [1] C. Y. Lin, D. Sow, and S. F. Chang, “Using Self-Authentication-and-Recovery Images for Error Concealment in Wireless Environments,” Proceedings of SPIE, Volume 4518, pp. 267-274, November 2001.
    [2] Chung-Yen Wang, “Image authentication with localization and recovery using adjacent block,” NTHU, VIP Lab, 2007
    [3] S. S. Wang and S. L. Tsai, “Automatic image authentication and recovery using fractal code embedding and image inpainting,” Pattern Recognition, Volume 41, Issue 2, pp. 701-712, February 2008
    [4] D. W. Cook II and P.K Rajan, “TIAMAT: A New Fragile Watermarking Technique for Image Authentication,” System Theory, 2006 Proceeding of the Thirty-Eighth Southeastern Symposium, pp. 221- 225, March 2006
    [5] Q. Sun, J. Apostolopoulos, C. W. Chen, and S. F. Chang, “Quality-Optimized and Secure End-to-End Authentication for Media Delivery,” Proceedings of the IEEE, Volume 96, No. 1, January 2008
    [6] F. Ahmed and I. S. Moskowitz, “Correlation-based watermarking method for image authentication applications,” Optical Engineering, Volume 43, Issue 8, pp. 1833-1838, August 2004
    [7] C. Fei, D. Kundur, and R. H. Kwong, “Analysis and Design of secure Watermark-Based Authentication Systems,” IEEE transactions on information forensics and security, Volume 1, No.1, March 2006
    [8] C. B. Adsumilli, M. C. Q. Farias, S. K. Mitra, and M. Carli, “A Robust Error Concealment Technique Using Data Hiding for Image and Video Transmission Over Lossy Channels,” IEEE transactions on circuits and systems for video technology, Volume 15, No.11, November 2005

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE