簡易檢索 / 詳目顯示

研究生: 張文馨
Chang, Wen-Hsin
論文名稱: Semi-fragile watermarking for image authentication, localization and recovery using Tchebichef moments
基於Tchebichef moments之半脆弱型浮水印影像認證及回復
指導教授: 張隆紋
Chang, Long-Wen
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 45
中文關鍵詞: 半脆弱型浮水印影像認證影像回復Tchebichef moments
外文關鍵詞: semi-fragile watermarking, image authentication, image recovery
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • In this paper, a semi-fragile watermarking for image authentication, localization, and recovery scheme by using Tchebichef moments is proposed. We use robust invariant Tchebichef moments to generate the authentication feature, and use scaled Tchebichef moments to construct recovery information from low-frequency domain.. In order to improve the quality of watermarked image and keep the robustness of watermark, we applied HVS to adjust the embedding and extraction quantization step size. The proposed method provides a complete authentication process from RST attack estimation to image recovery. The proposed method has high accuracy of authentication, can localize and recover the tampered region successfully and is robust to JPEG compression and AWGN operations.


    在網路高速發展的環境下,多媒體內容之認證越來越重要。半脆弱型浮水印技術可以同時保有脆弱型以及強韌型浮水印的特性,達到可同時對接受端做影像內容之認證及偵測被惡意攻擊之區塊。
    在本篇論文中,我們提出了一個完整的半脆弱型浮水印之影像認證系統,可以從預測幾何攻擊參數、影像認證、指出遭竄改區塊到回復影像。我們提出的系統主要架構在Tchebichef moments上,因為Tchebichef moments是屬於離散域的moments function,具有很好的影像回復特性,而invariant Tchebichef moments則是具有很好的強韌性。因此我們使用這兩個特性來做為影像回復資訊以及影像特徵認證。
    從實驗結果得知,我們提出的方法可以有高準確度的認證,並且成功地指出及回復被竄改的區塊,也因為我們的方法有根據人眼視覺系統做調整,所以我們可以得到較好的影像品質。

    List of Contents Chapter 1 Introduction……………………………………………………………...1 Chapter 2 Related Works……………………………………………………………4 2.1 Tchebichef moments…………………………………………………………4 2.2 RST estimation………………………………………………………………7 2.3 Invariant Tchebichef moments………………………………………………9 Chapter 3 Proposed Method……………………………………………………….13 3.1 Human visual system……………………………………………………….13 3.2 Watermark embedding procedure…………………………………………..14 3.3 Watermark extraction and authentication procedure………………………..23 Chapter 4 Experimental Results…………………………………………………...27 4.1 Quality of watermarked images…………………………………………….27 4.2 RST estimation……………………………………………………………...29 4.3 Robustness of authentication………………………………………………..30 4.4 Tampered region localization and recovery………………………………...31 Chapter 5 Conclusion……………………………………………………….……...37 Reference……………………………………………………….…………….……..38

    [1] R.Mukundan, D.H. Ong, P.A. Lee, “Image Analysis by Tchebichef Moments,” IEEE Transactions on Image Processing, vol. 10, No. 9, pp.1357~1364, September 2001
    [2] L. Zhang, G.B Qian, W.W Xiao, “Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moments of Original Image,” Journal of Software, vol. 18, No. 9, pp.2283~2294, September 2007
    [3] H.F. Yang, X.M. Sun, “Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model,” International Conference on Multimedia and Ubiquitous Engineering 2007
    [4] M.J. Tsai, C.C Chien, “A Wavelet-Based Semi-Fragile Watermarking with Recovery Mechanism,” IEEE International Symposium on Circuits and Systems, pp.3033-3036, May 2008
    [5] L. Zhang, G.B Qiam, W.W Xiao, J. Zhen, “Geometric Invariant Blind Image Watermarking by Invariant Tchebichef Moments,” Optics Express, vol. 15, No. 5, pp.2251~2261, March 2007
    [6] G.H. Liu, Z. Zhu, X. Jie, “Orientation and Damage Inspection of Insulators Based on Tchebichef Moment Invariants,” IEEE International Conference Neural Networks & Signal Processing, pp.48~52, June 2008
    [7] Y.L. Tang, C.T. Chen, “Image Authentication Using Relation Measures of Wavelet Coefficients,” IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004
    [8] K.W. See, K.S. Loke, P.A. Lee, K.F. Loe, “Image Reconstruction Using Various Discrete Orthogonal Polynomials in Comparison with DCT,” Applied Mathematics and Computation, pp.346~359, 2007
    [9] S.M. Elshoura, D.B. Megherbi, “Analysis of Noise Sensitivity and Reconstruction Accuracy of Tchebichef Moments,” IEEE Southestcon, pp.521~526, April 2008
    [10] C.W. Kao, “Zernike Moment and Edge Features Based Semi-Fragile Watermark for Image Authentication with Tampering Localization,” NTHU VIP Lab, 2007
    [11] H.F. Yang, Z.H. Yang, M.F. Jiang, “Content Based Image Public Waternarking,” In proceedings of Eurographics Workshop on multimedia, pp.163~172, 2004
    [12] K. Ding, C. He, L.G. Jiang, H.X. Wang, “Wavelet-Based Semi-Fragile Watermarking with Ttamper Detection,” IEICE Transaction Fundamentals E88-A(3), pp.787~790, 2005

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE