簡易檢索 / 詳目顯示

研究生: 黃雅娟
Huang, Ya-Juan
論文名稱: 應用於所有權保護上的一種結合多個轉換域之浮水印方法
An Integrated Multi-Tranform Based Watermarking Method for Copyright Protection
指導教授: 陳永昌
Chen, Yung-Chang
口試委員: 陳永昌
Chen, Yung-Chang
黃文良
Huang, Wen-Liang
盧鴻興
Lu, Hung-Hing
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2012
畢業學年度: 100
語文別: 英文
論文頁數: 76
中文關鍵詞: 數位浮水印所有權保護強健性結合多個轉換域
外文關鍵詞: Digital watermarking, Copyright protection, Robustness, Integrated multi-tranform based watermarking
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 數位浮水印技術屬於信息隱藏領域,最近已經出現了大量的研究興趣。它在各種應用領域已成為重要的一門技術。數位浮水印用於內容保護,版權管理,內容認證和篡改檢測水印等。然而在嵌入數位浮水印的同時,往往需要考慮到實現數位影像的強健性和真實性。在過去的幾年裡,已有許多作者提出各種數位浮水印的技術。
    目前最主要可以分成兩個研究領域:一種是將資訊隱藏在圖像的空間域(Spatial domain)裡,另一種是將資訊藏在圖像的頻率域(Frequency domain)中。現今數位浮水印技術發展在頻率域中較為廣泛且有較好的隱蔽性,因此在本文中,我們以過去文獻上所提及在頻率域上嵌入浮水印的技術為基礎,如建構在離散餘弦轉換以及離散小波轉換來實現數位浮水印系統等。
    在資訊的強韌性表現下,無論在哪一種頻率域方法去實現數位浮水印技術所得的強韌性都各有優勢以及不足的地方。在本篇論文中,我們提出了複合式浮水印技術,其做法即是結合了兩種頻率域的嵌入方法,例如離散餘弦轉換以及離散小波轉換,透過這樣的想法我們可以得到在兩個轉換域上的隱密資訊,因此在影像遭受到惡意攻擊時,在做浮水印偵測時能保留在兩種轉換域上的資訊,能對我們在做著作權保護上有更進一步截長補短的效用。此後,經由一些實驗,包含: 壓縮、切割、縮放、平滑處理、雜訊、旋轉、平移以及複合式攻擊後,顯示我們的方法達到一定程度的隱蔽性及強韌性。
    在浮水印設計和檢測浮水印表現是本篇論文的一大突破。藉由計算出真陽率(True positive rate)及假陽率(False positive rate)利用在展頻技術和SVM(Support Vector Machine)方法上我們可以得到ROC (Receiver Operating Characteristic)曲線,這將會幫助我們判別浮水印機制表現的好壞。


    Digital watermarking, a branch in the field of information hiding, has drawn lots of attention of researchers and has become an important technique in various application areas. Watermarking has been widely used for content protection, copyright management, content authentication and tamper detection etc. Various kinds of watermark techniques have been proposed in the past decade, and a key problem of this issue is how to balance the tradeoff between watermark robustness and the fidelity of images.
    Based on the way to embed the watermark sequences, existing techniques can be categorized into two fields: one is to embed the watermark in spatial domain directly, and the other is to hide it in the frequency or transform domains. Today, digital watermarking techniques with better confidentiality are those developed in transform domains. Hence, in this thesis, we adopt typical transformed-based watermarking methods, such as based on DCT- and DWT-based schemes, to design and implement our watermarking algorithm.
    As for the robustness issue, we have to recognize that no matter how the robustness is measured, the pros. and cons. of a transform-based watermark scheme depends on the characteristics of the transform it used. In this thesis, we propose a joint watermarking technique and derive the way to “integrate” two independent watermarking approaches, such as DCT- and DWT-based ones. With this idea we can ensure the hiding data would be found in both transform domains without interference. Meanwhile, we will show that even the host data suffered from malicious attacks, our watermarks can still be detected in at least one of the transform domains; that is to say, they could be complement to each other. Finally, several experiment results, including JPEG compression, cropping, scaling, Gaussian noise, rotation, translation, composite attacks, stirmark and so on, will show that the proposed method has good performances on confidentiality and robustness.
    The breakthroughs of our work are the watermark derivation and the watermark detection performance strategy. By calculating the true positive rate and false positive rate we show the ROC curve utilizing Spread Spectrum and SVM method, so that they will help us to diagnose the performance of our watermarking scheme.

    Chapter 1: Introduction 1 1.1 Watermarking in Digital System 1 1.2 Motivation 2 1.3 General Watermarking Requirements of Copyright Protection 3 1.4 Thesis Organization 6 Chapter 2: Related Works 7 2.1 The Common Concept of Digital Watermarking 7 2.1.1 Types of Digital Watermark 7 2.1.2 Elements of a Watermarking System 8 2.1.3 Watermarking Techniques 8 2.2 Digital Image Watermarking 10 2.2.1 Watermarking in the Spatial Domain 10 2.2.2 Watermarking in the Frequency Domain 10 Chapter 3: Proposed Scheme 20 3.1 Introduction 20 3.2 A Joint Method of DCT- and DWT-based Watermarking Scheme 21 3.2.1 Deriving Watermark Sequence 23 3.2.2 Embedding Watermark Sequence 29 3.2.3 Extracting Watermark Sequence 31 Chapter 4: Experimental Results 34 4.1 Quality of Watermarked Image and Extracted Watermark before Attack 36 4.2 Quality of Watermarked Image and Extracted Watermark versus Various Attacks 38 4.2.1 Experiment 1: Compression 38 4.2.2 Experiment 2: Noise Adding 40 4.2.3 Experiment 3: Smoothing 42 4.2.4 Experiment 4: Cropping 44 4.2.5 Experiment 5: Down-Scaling 46 4.2.6 Experiment 6: Translation 48 4.2.7 Experiment 7: Rotation 50 4.2.8 Experiment 8: Composite Attacks 51 4.2.9 Experiment 9: StirMark Attacks 53 4.3 2D Watermark Decoder 36 Chapter 5: Watermark Detection Performance 57 5.1 Hard Decision Detector 60 5.2 Soft Decision Detectors 60 5.2.1 ROC Curve of Spread Spectrum Method 60 5.2.2 ROC Curve of Support Vector Machine Method 62 Chapter 6: Watermark Detection Performance 71 6.1 Conclusion 71 6.2 Future Works 72 References 73

    [1] S-J. Lee and S-H. Jung, "A survey of watermarking techniques applied to multimedia", Proc. IEEE Int. Symp. Industrial Electronics (ISIE), Vol. 1, pp. 272 -277, 2001
    [2] F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn, "Information Hiding- A survey", Proc. IEEE, Vol. 87, No.7, pp. 1062-1078, 2002
    [3] V. Potdar, S. Han, and E. Chang, "A survey of digital image watermarking techniques", Proc. Industrial Informatics, 2005
    [4] M. Kutter and F.A.P. Petitcolas, "A fair benchmark for image watermarking systems", Proc. Electronic Imaging '99, Security and Watermarking of Multimedia Contents, Vol. 3657, pp. 226-239, 1999
    [5] F. Cayre, C. Fontaine and T. Furon, "Watermarking security: Theory and practice", IEEE Trans. Signal Proc., Vol. 53, pp.3976, 2005
    [6] T. Kalker "Considerations on watermarking security", Proc. IEEE Conf. Multimedia Signal Processing, pp.201, 2001
    [7] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, R. J. Anderson, "A secure, robust watermark for multimedia", Information hiding: First international workshop, Vol. 1174, pp.183 -206, 1996: Springer-Verlag
    [8] A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, N. R. A. Mee, and C. F. Osborne, "Electronic watermark", Digital Image Computing, Technology and Applications (DICTA'93), pp. 666-673, 1993
    [9] F. Mintzer, G. W. Braudaway, and M. Yeung, "Effective and ineffective digital watermarks", Proc. IEEE Int. Conf. Image Processing, Vol. 3, pp.9 -12 1997
    [10] S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, "A DCT domain visible watermarking technique for images", ICME, 2000
    [11] Y. Hu and S. Kwong, "Wavelet domain adaptive visible watermarking", Electron. Lett, Vol. 37, 2001
    [12] M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification", Proc. IEEE Int. Conf. Image Processing, Vol. 2, pp. 680 -683, 1997
    [13] M. M. Yeung and F. C. Mintzer, "Invisible watermarking for image verification", Electron. Imag, Vol. 7, no. 3, pp. 578 -591, 1998
    [14] H. Malvar and D. Florencio, "Improved spread spectrum: a new modulation technique for robust watermarking", IEEE Trans. Signal Processing, Vol. 51, pp. 898, 2003
    [15] J. Fridrich, M. Goljan, and A. C. Baldoza, "New fragile authentication watermark for images", Proc. IEEE Int. Conf. Image Processing, 2000
    [16] E. T. Lin and E. J. Delp, "A review of fragile image watermarks", Proc. Multimedia and Security Workshop (ACM Multimedia '99), pp. 25-29, 1999
    [17] N. Nikolaidis and I. Pitas, "Robust image watermarking in the spatial domain", Signal Processing, Vol. 66, no. 3, pp. 385-403, 1998
    [18] R. G. Van Schyndel, A. Z. Trikel, and C. F. Osborne, "A Digital Watermark",
    Proc. Of IEEE Int’l Conf. On Image Processing. pp. 86-90, 1994
    [19] W. Bender, D. Gruhl, N. Morimot and A. Lu, "Techniques for Data Hiding",
    IBM Syst. J., Vol. 35, pp. 313-336, 1996
    [20] Chiou Ting Hsu and Ja Ling Wu: "Hidden Digital Watermarks in Images", IEEE
    Trans. On Image Processing, Vol. 8, No.1, pp. 58-68, January 1999
    [21] Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Tala1 Shamoon, "Secure
    Spread Spectrum Watermarking for Multimedia", IEEE Trans. On Image
    Processing, Vol. 6, No. 12, pp. 1673-1687, Dec. 1997
    [22] E. Koch and J. Zhao, "Toward robust and hidden image copyright labeling", in
    Proc. IEEE Nonlinear Signal and Image Processing, pp. 452–455, 1995
    [23] M.Barmi, F. Bartolini and V. Cappellini, "Copyright protection of digital images
    by embedded unperceivable marks", Image and Vision Computing, Vol. 16, pp.
    897-906, 1998.
    [24] X. Xia, C. Boncelet, and G. Arce, "A multiresolution watermark for digital images", Proc. IEEE Int. Conf. Image Processing 1997 (ICIP '97), Vol. 1, pp.548 -551, 1997
    [25] M. S. Hsieh , D. C. Tseng and Y. H. Huang, "Hiding digital watermarks using multiresolution wavelet transform", IEEE Trans. Ind. Electron., Vol. 48, pp. 875, 2001
    [26] V.Solachidis, N.Nikolaidis and I.Pitas, "Watermarking polygonal lines using Fourier descriptors", Proceedings of the IEEE International Conference on Acoustics,Speech and Signal Processing.Istanbul, Turkey, pp. 1955-1958, 2000
    [27] I.Kitamura, S.Kanai and T.Kishinami, "Copyright protection of vector map using digital watermarking method based on discrete Fourier transform", Proceedings of the IEEE 2001 International Symposium on Geoscience and Remote Sensing, pp. 9-13,2001
    [28] L. Shi, F. Hong and G.-H. Cui, "A quantization-based digital watermarking robust to geometrical transformations", Proceedings of the IEEE International Conference on Machine Learning and Cybernetics, Vol. 5, pp. 2826–2830, November 2003
    [29] V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain", IEEE Trans. Image Processing, Vol. 10, pp.1741 -1753, 2001
    [30] J. J. K.O Ruanaidh, W. J. Dowling and F. M. Boland, "Phase watermarking of digital images", Proc. Int. Conf. Image Processing (ICIP), Vol. 3, pp. 239-242, 1996
    [31] I.J. Cox, M.L. Miller and J.A. Boom, "Watermarking applications and their properties", Proc. Int. Conf. on Information Technology: Coding and Computing, pp. 6–10, 2000
    [32] N.P. Sheppard, R.S. Naini and P. Ogunbona, "On multiple watermarking," In: Proceedings of the ACM multimedia workshops on multimedia and security: new challenges, pp. 3–6, 2001
    [33] M. Ossonce, C. Delpha and P. Duhamel, "Rotation and scale insensitive image watermarking", In Proc. of the Intl Conf. on Image Processing, 2004.
    [34] Zweig MH and Campbell G, "Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine", Clinical Chemistry, Vol. 39, pp. 561-577, 1993
    [35] V, Vapnik, "The nature of statistical learning theory", Springer-Verlag, 1995
    [36] N. Cristianini and J. Shawe-Taylor, "An Introduction to Support Vector Machines and other kernel-based learning methods", Cambridge: Cambridge University Press, 2000
    [37] S. Sadjadi and J. Hansen, "A scanning window scheme based on SVM training error rate for unsupervised audio segmentation." Proc. Int. Conf. European Signal Processing (EUSIPCO), pp.1262–1266, 2010
    [38] A. Ben-Hur and J. Weston, "A user's guide to support vector machines," Methods in Molecular Biology 609, pp. 223-239, 2010

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE