簡易檢索 / 詳目顯示

研究生: 唐玉柔
Tang, Yu-Rou
論文名稱: 基於賽局理論分析之半脆弱型浮水印影像認證與竄改定位
Game-theoretic Analysis of Semi-fragile Watermarking for Image Authentication and Tamper Localization
指導教授: 張隆紋
Chang, Long-Wen
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2010
畢業學年度: 98
語文別: 英文
論文頁數: 41
中文關鍵詞: 半脆弱型浮水印影像認證賽局理論
外文關鍵詞: semi-fragile watermarking, image authentication, game theory
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 摘要
    在網路不斷進步的環境下,多媒體內容的認證日趨重要。半脆弱型浮水印技術同時保有強韌型浮水印與脆弱型浮水印的特性,不僅可以對接收端做影像內容之認證,也可偵測出被惡意竄改的區域。
    此外,賽局理論也已廣泛應用在影像處理上。在本篇論文中,我們提出了一個完整的半脆弱型浮水印的影像認證系統,並應用賽局理論分析來控制嵌入浮水印後影像的品質與浮水印嵌入的強度。利用賽局的理論與機制,我們可以得到Nash 均衡解來做為最佳嵌入浮水印的策略。不僅可以得到高準確度的認證,也同時保有影像的品質。
    由實驗結果得知,我們提出的方法有高準確度的影像認證、可以成功的偵測出被竄改的區域且能對抗JPEG壓縮與AWGN的攻擊。


    List of Contents Chapter 1 Introduction………………………………………………………………..…...1 Chapter 2 Related Works…………………………………………………………….……3 2.1 Non-cooperative games……………………………………………………….……4 2.2 Common logarithm function………………………………………………….……6 Chapter 3 Proposed Method………………………………………………………..……...7 3.1 Watermark embedding procedure………………………………………………….7 3.2 Quantization steps allocation by game theory………………………………….…15 3.3 Watermark extraction and authentication procedure……………………………...23 Chapter 4 Experimental result…………………………………………………………...29 4.1 Quality of watermarked images……………………………………..………….…31 4.2 Authentication against normal image processing…………………………………34 4.3 Tampered region localization………………………………………………….….35 Chapter 5 Conclusion……………………………………………………….…………….38 Reference……………………………………………………….…………….………..…..39 List of Figures 1. The utility matrices of two-player strategic game………………………………..…....5 2. The diagram of logarithm functions ………………………………………………......6 3. Three-level 2D discrete wavelet transform………………………………………..…..8 4. Watermark embedding flowchart………………………………………………..….…8 5. Localization watermark embedding procedure…………………………………..……9 6. Authentication watermark embedding procedure………………………………..…...12 7. The watermark DCT coefficients matrix M……………………………………….…16 8. The two non-overlapping sub-matrices………………………………………….…...16 9. The utility matrices of two players……………………………………….……….….20 10. The watermark DCT coefficients matrices and the embedded matrices………..…..22 11. The watermark extracting procedure………………………………………….….…23 12. The main authentication flowchart…………………………………………….……23 13. Determine the tampered region in the difference image DIlocal……………….…….27 14. Flowchart of authentication procedure…………………………………………..….28 15. Flowchart of tamper localization procedure……………………………………..….28 16. The diagram of the range of PSNR and BER by different quantization steps q…....30 17. The test images and watermarked images……………………………………….….32 18. Tampered localization of Lena…………………………………………………..….35 19. Tampered localization of Baboon………………………………………………...…36 20. Tampered localization of Pepper………………………………………………...….36 21. Tampered localization of Sailboat……………………………………………..…....36 22. Tampered localization of F16…………………………………………………...…..37 List of Tables 1. PSNR and BERs attacked by JPEG quality factor 70 using Nash equilibrium ….........31 2. The bits error rate of authentication difference image DIauth……………………….…34 3. The extrac

    References
    [1] Yu-Ping HU and De-Zhi Han, “Using Two Semi-fragile Watermark For Image Authentication,” Proceeding of fourth International Conference on Machine Learning and Cybernetics, vol. 9, 18-21 August 2005, pp.5484-5489.
    [2] X. Qi, X. Xin and R. Chang, “Image authentication and tamper detection using two complementary watermarks”, Proc. of Int. Conf. on Image Processing, 2009, pp.4257-4260.
    [3] Jin, C., Chao, Y., Zhang, X.-L, “Semi-Fragile Watermark Based on Adaptive Quantization for Image Content Authentication,” In: International Conference on E-Business and Information System Security, pp. 1–5 (2009).
    [4] Wang, J., Wang, X., Peng, H., “A Semi-fragile Image Watermarking Resisting to JPEG Compression”, 2009 International Conference on Management of e-Commerce and
    e-Government, pp.498-502, October, 2009.
    [5] Hossein Kourkchi and Shahrokh Ghaemmaghami Sharif University of Technology, Tehran, Iran “Improvement to a Semi-fragile Watermarking Scheme against a Proposed Counterfeiting Attack,” Feb. 15-18, 2009 ICACT 2009.
    [6] M. Al-Mualla, “Content-Adaptive Semi-Fragile Watermarking for Image Authentication,” In Proceedings of the 2007 IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2007), Marrakech, Morocco, 11--14 December, 2007, pp. 1256-1259.
    [7] CH Lin, JC Liu, CH Shih, YW Lee, “A Robust Watermark Scheme for Copyright Protection,” International Journal of software Engineering and Its Application, Vol. 2, No. 4, October, 2008.
    [8] J.-L. Liu, D.-C. Lou, M.-C. Chang, and H.-K. Tso, “A Robust Watermarking Scheme Using Self-Reference Image.” Computer Standards & Interfaces, 28:356–367, 2006.
    [9] Lin, S. and C. Chin, "A Robust DCT-based Watermarking for Copyright Protection," IEEE Trans. Consumer Electronics, 46(3): 415-421, 2000.
    [10] E. Lin, E.J. Delp, “A review of fragile image watermarks,” Proceedings of the ACM Multimedia and Security Workshop, Orlando, FL, November 1999, pp. 35–40.
    [11] Phen-Lan Lin, Po-Whei Huang, and An-Wei Peng, “A fragile watermarking scheme for image authentication with localization and recovery,” Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering (ISMSE’04), 2004.
    [12] Martin J. Osborne, “An Introduction to Game Theory,” Oxford University Press, 2004.
    [13] J. Luo, I. Ahmad and Yu Sun, “Controlling the Bit Rate of Multi-Object Videos with Non-cooperative Game Theory,” IEEE Transformations on multimedia, vol.12, no.2, Feb. 2010.
    [14] H. I. Bozma and J. S. Duncan, “A game-theoretic approach to integration of modules,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 11, pp. 1074–1086, Nov. 1994.
    [15] A. Chakraborty and J. S. Duncan, “Game-theoretic integration for image segmentation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 21, no. 1, pp. 12–30, Jan. 1999.
    [16] A.Chakraborty and J. S. Duncan, “Game-theoretic Integration for Image Segmentation,” IEEE Trans. Pattern Anal. Mach. Intell., vol.21, no.1, pp. 12–30, Jan. 1999.
    [17] C. DeLorenzo, X. Papademetris, Lawrence H. Staib, K. Vives, D. Spencer, and James S. Duncan, “Image-Guided Intraoperative Cortical Deformation Recovery Using Game Theory: Application to Neocortical Epilepsy Surgery,” IEEE Transformations on medical imaging, vol. 29, no. 2, February 2010.
    [18] P. Comesa˜na, F. P´erez-Gonz´alez, and F. Balado, “Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs,” in Proc. of the IEEE International Conference on Image Processing (ICIP), vol. 3, September 2003, pp. 479–482.
    [19] J. P. Boyer, P. Duhamel and J. Blanc-Talon, ”Game-Theoretic Analysis of a Semi-FragileWatermarking Scheme Based on SCS”, ICIP 2005, Genoa, Italy.
    [20] P. Moulin and A. Ivanovic, “Game-theoretic analysis of watermark detection,” In ICIP (3), pages 975–978, 2001.
    [21] Anelia Somekh-Baruch and Neri Merhav,“On the Capacity Game of public Watermarking Systems,” ISIT 2002, Lausanne, Switzerland, June 30-July 5, 2002.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE