簡易檢索 / 詳目顯示

研究生: 方凌仕
Fang, Ling-Shih
論文名稱: Game Theoretic Image Authentication and Recovery with Watermarking from Region of Interest
使用賽局理論在有興趣的範圍上的浮水印認證與回復
指導教授: 張隆紋
Chang, Long-Wen
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2010
畢業學年度: 98
語文別: 英文
論文頁數: 26
中文關鍵詞: 數位浮水印合作賽局影像認證影像還原
外文關鍵詞: watermarking, cooperative game, image authentication, image recovery
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Due to the development of multimedia technology and internet, digital images can be easily transmitted by the network. In some situations, digital images involve important evidence in news or reports. But in the internet, digital images are easily to be modified. So the image authentication and image recovery is very important in now. In this paper, we proposed a watermarking scheme with a capability of tampered region localization, recovery and against no-intentional manipulations, such as JPEG compression, in region of interest. In order to improve the tradeoff, there are two players in watermark generating and embedding. One is the number of coefficients of watermark generation, the other one is quality factor in watermarking embedding. By using game theory, the two players are chose a best strategy to obtain a better result.


    Chapter 1 Introduction……………………………………………1 Chapter 2 Related Works…………………………………………3 Chapter 3 Proposed Method………………………………………5 3.1 Watermarking generation……………………………………5 3.2 Watermarking embedding………………………………………8 3.3 Authentication and Recovery………………………………10 3.4 Application of Game theory…………………………………11 Chapter 4 Experimental Results…………………………………14 4.1 PSNR………………………………………………………………15 4.2 Robustness against JPEG compression……………………17 4.3 Influence of game theory……………………………………18 Chapter 5 Conclusion………………………………………………24 Reference……………………………………………………………25

    [1] Wen-Hsin Chang, “Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments”, Information Systems and Applications at National Tsing Hua University Hsin-Chu, Taiwan, July 2009
    [2] Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake, Héctor Pérez-Meana, “Image Authentication Scheme Based on Self-embedding Watermarking”, CIARP '09:, Lecture Notes In Computer Science; Vol. 5856, November 2009
    [3] C.- X. Zhao, A.T.S. Ho, H. Treharne, V. Pankajakshan, C. Culnane, W. Jiang, “A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform”. IIHMSP 2007. Third International Conference on Volume 1, pp. 283 – 286, 26-28 Nov. 2007.
    [4] Y. M. Y. Hassan and A. M. Hassan, “Tamper Detection with Self Correction Hybrid Spatial-DCT Domains Image Authentication Technique”, Communication Systems Software and Middleware and Workshops COMSWARE, pp. 608-613, 2008.
    [5] Kourkchi, H. ; Ghaemmaghami, S. ; “Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack” Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on, pp 1928 - 1932. April 2009
    [6] Mei Jiansheng, Li Sukang and Tan Xiaomei, “A Digital Watermarking Algorithm Based On DCT and DWT” Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09), pp. 104-107. May 2009
    [7] Al-Mualla, M.E. ; “Content-Adaptive Semi-Fragile Watermarking for Image Authentication”, Electronics, Circuits and Systems, 2007. ICECS 2007. 14th IEEE International Conference on, pp. 1256 – 1259. May 2008
    [8] Le Guelvouit, G.; Pateux, S.; Guillemot, C. “Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information”, Image Processing. 2002. Proceedings. 2002 International Conference on, pp 477-480, December, 2002
    [9] Stéphane Pateux, Gaëtan Le Guelvouit “Practical watermarking scheme based on wide spread spectrum and game theory” Signal Processing: Image Communication Volume 18, Issue 4, Pages 283-296, April 2003
    [10] Shaheen S. Fatima Michael Wooldridge Nicholas R. Jennings “An analysis of the Shapley Value and its Uncertainty for the Voting Game”, 7th International Workshop on Agent-Mediated Electronic Commerce, pp. 39-52. Aug 2005
    [11] Noam Nisan, Tim Roughgarden, E´ va Tardos, Vijay V. Vazirani, “Algorithmic Game Theory”, Cambridge University Press, 2007

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE