簡易檢索 / 詳目顯示

研究生: 鄭如芸
Ju-Yun, Cheng
論文名稱: 具數位簽章概念之浮水印技術
Image Authentication with A Timestamped Signature of the image and Wavelet Transform
指導教授: 張隆紋
Long-Wen, Chang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2001
畢業學年度: 89
語文別: 英文
論文頁數: 23
中文關鍵詞: 區塊凌波轉換數位簽章浮水印
外文關鍵詞: block wavelet transform, digital signature, watermark
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於電腦的普及與網路的高速發展使電子媒體的傳輸趨於頻繁,連帶的引起媒體傳輸上的安全及著作權等問體的討論。而浮水印就是為了保護數位媒體(如影像、聲音等)在網路上的版權問題,藉由嵌入將來可作為識別之資料於數位媒體中且必須滿足不可察覺性(Imperceptibility)、強韌性(Robustness)等要求下,能夠使數位媒體在資源分享的網路上一旦被盜用可以證明其合法擁有權。
    而浮水印的發展主要可分為加入空間域(Spatial domain)或加入頻率域(Frequency domain)兩種方式,各有其優缺點。為了對付目前各種攻擊方式,除了必須滿足上述的不可察覺性、強韌性之外,還必須能夠在多重浮水印的攻擊下充分的證實其來源可靠性。目前加密演算法及數位簽章已被廣泛應用在文件的保密上,為了使浮水印更趨於安全所以必須研究如何結合現有之技術來應用於本論文中。

    所以本論文利用加密演算法及數位簽章的概念來找出位置及製作浮水印。在加密演算法方面,利用加密後的原始影像來找出加入浮水印位置,可增加影像合法性及減少浮水印被攻擊的機會;利用數位簽章的概念製造浮水印,可以使浮水印與影像間有依賴性,並且可結合CA來加入時戳以證明加入之時間以其抵抗各式攻擊。


    With rapid growth of multimedia, that how to protect electronic data from attacking becomes an important issue to be considered. And digital watermarking is one scheme to hide copyright marks and information into digital media (such as audio, image and video) for copyright protection. And we need to be sure that the watermark still existed and could be recognized after extracted under compression and malicious attack.
    In this paper, we implement the method that integrates encryption algorithm to find the positions where watermarks are going to be embedded into. This method is based on Block DWT (discrete wavelet transform) and we embed multi-watermark into Block DWT coefficients except the low frequency bands. And in this paper, we try to use the concept of digital signature to produce our watermark. Finally, we compare the results of experiments under different attacking.

    1. Introduction 1 2. Preliminary 2 2.1 Block Wavelet Transform 2 2.2 The Encryption Algorithm 5 2.3 Watermark Generation 8 3. The Proposed Method 10 3.1 The Embedding Procedure 10 3.2 The Extraction Procedure 13 4. Experiment Results 15 5. Conclusion 22 Reference 23

    [1] Scott Craver, Nasir Memon, Boon-lock Yeo, and Minerva M. Yeung, “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications,” in IEEE journal on selected areas in communications, vol.16, no. 4, May 1998.
    [2] Wenjun Zeng, and Bede Liu, “A Statistical Watermark Detection Technique Without Using Original Images for Resolving Rightful Ownerships of Digital Images,” in IEEE transactions on image processing, vol. 8, no. 11, Nov. 1999.
    [3] Charilaos Christopoulos, “JPEG2000 Verification Model 4.0,” source by Verification Model ad-hoc group.
    [4] A. Enis Cetin, Omer N. Gerek, and Sennur Ulukus, “Block Wavelet Transforms for Image Coding,” in IEEE transactions on circuit and systems for video technology, vol. 3, no. 6, Dec. 1993.
    [5] M. Riaz and H.M. Heys, “The FPGA Implementation of the RC6 and CAST-256 Encryption Algorithms,” in proceedings of the 1999 IEEE Canadian conference on Electrical and Computer Engineering Shaw Conference Center, Edmonton, Alberta, Canada May 9-12, 1999.
    [6] R. Rivest, A. Shamir, and L. Strawczynski, “A Method for Obtaining Digital Signature and Public-Key Cryptosystem,” Communication of the ACM, vol. 21, no. 2, Feb. 1978.
    [7] Siang-Gen Sia, Charles G. Boncelet, and Gonzalo R. Arce, “A Multi-resolution Watermark for Digital Image,” in IEEE 1997.
    [8] J. Huang, G. F. Elmasry, and Y.Q. Shi, “Power Constrained Multiple Signaling in Digital Image Watermarking”.
    [9] Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” in IEEE Transactions on image processing, vol. 6, no. 12, Dec. 1997.
    [10] Soo-Chang Pei, and Yuan-Hsiang Tai, “Digital Audio Watermarking Techniques Utilizing Human Auditory System,” in images and recognition, vol. 6, no. 1, 2000.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE