研究生: |
唐玉柔 Tang, Yu-Rou |
---|---|
論文名稱: |
基於賽局理論分析之半脆弱型浮水印影像認證與竄改定位 Game-theoretic Analysis of Semi-fragile Watermarking for Image Authentication and Tamper Localization |
指導教授: |
張隆紋
Chang, Long-Wen |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2010 |
畢業學年度: | 98 |
語文別: | 英文 |
論文頁數: | 41 |
中文關鍵詞: | 半脆弱型浮水印 、影像認證 、賽局理論 |
外文關鍵詞: | semi-fragile watermarking, image authentication, game theory |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
摘要
在網路不斷進步的環境下,多媒體內容的認證日趨重要。半脆弱型浮水印技術同時保有強韌型浮水印與脆弱型浮水印的特性,不僅可以對接收端做影像內容之認證,也可偵測出被惡意竄改的區域。
此外,賽局理論也已廣泛應用在影像處理上。在本篇論文中,我們提出了一個完整的半脆弱型浮水印的影像認證系統,並應用賽局理論分析來控制嵌入浮水印後影像的品質與浮水印嵌入的強度。利用賽局的理論與機制,我們可以得到Nash 均衡解來做為最佳嵌入浮水印的策略。不僅可以得到高準確度的認證,也同時保有影像的品質。
由實驗結果得知,我們提出的方法有高準確度的影像認證、可以成功的偵測出被竄改的區域且能對抗JPEG壓縮與AWGN的攻擊。
References
[1] Yu-Ping HU and De-Zhi Han, “Using Two Semi-fragile Watermark For Image Authentication,” Proceeding of fourth International Conference on Machine Learning and Cybernetics, vol. 9, 18-21 August 2005, pp.5484-5489.
[2] X. Qi, X. Xin and R. Chang, “Image authentication and tamper detection using two complementary watermarks”, Proc. of Int. Conf. on Image Processing, 2009, pp.4257-4260.
[3] Jin, C., Chao, Y., Zhang, X.-L, “Semi-Fragile Watermark Based on Adaptive Quantization for Image Content Authentication,” In: International Conference on E-Business and Information System Security, pp. 1–5 (2009).
[4] Wang, J., Wang, X., Peng, H., “A Semi-fragile Image Watermarking Resisting to JPEG Compression”, 2009 International Conference on Management of e-Commerce and
e-Government, pp.498-502, October, 2009.
[5] Hossein Kourkchi and Shahrokh Ghaemmaghami Sharif University of Technology, Tehran, Iran “Improvement to a Semi-fragile Watermarking Scheme against a Proposed Counterfeiting Attack,” Feb. 15-18, 2009 ICACT 2009.
[6] M. Al-Mualla, “Content-Adaptive Semi-Fragile Watermarking for Image Authentication,” In Proceedings of the 2007 IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2007), Marrakech, Morocco, 11--14 December, 2007, pp. 1256-1259.
[7] CH Lin, JC Liu, CH Shih, YW Lee, “A Robust Watermark Scheme for Copyright Protection,” International Journal of software Engineering and Its Application, Vol. 2, No. 4, October, 2008.
[8] J.-L. Liu, D.-C. Lou, M.-C. Chang, and H.-K. Tso, “A Robust Watermarking Scheme Using Self-Reference Image.” Computer Standards & Interfaces, 28:356–367, 2006.
[9] Lin, S. and C. Chin, "A Robust DCT-based Watermarking for Copyright Protection," IEEE Trans. Consumer Electronics, 46(3): 415-421, 2000.
[10] E. Lin, E.J. Delp, “A review of fragile image watermarks,” Proceedings of the ACM Multimedia and Security Workshop, Orlando, FL, November 1999, pp. 35–40.
[11] Phen-Lan Lin, Po-Whei Huang, and An-Wei Peng, “A fragile watermarking scheme for image authentication with localization and recovery,” Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering (ISMSE’04), 2004.
[12] Martin J. Osborne, “An Introduction to Game Theory,” Oxford University Press, 2004.
[13] J. Luo, I. Ahmad and Yu Sun, “Controlling the Bit Rate of Multi-Object Videos with Non-cooperative Game Theory,” IEEE Transformations on multimedia, vol.12, no.2, Feb. 2010.
[14] H. I. Bozma and J. S. Duncan, “A game-theoretic approach to integration of modules,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 11, pp. 1074–1086, Nov. 1994.
[15] A. Chakraborty and J. S. Duncan, “Game-theoretic integration for image segmentation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 21, no. 1, pp. 12–30, Jan. 1999.
[16] A.Chakraborty and J. S. Duncan, “Game-theoretic Integration for Image Segmentation,” IEEE Trans. Pattern Anal. Mach. Intell., vol.21, no.1, pp. 12–30, Jan. 1999.
[17] C. DeLorenzo, X. Papademetris, Lawrence H. Staib, K. Vives, D. Spencer, and James S. Duncan, “Image-Guided Intraoperative Cortical Deformation Recovery Using Game Theory: Application to Neocortical Epilepsy Surgery,” IEEE Transformations on medical imaging, vol. 29, no. 2, February 2010.
[18] P. Comesa˜na, F. P´erez-Gonz´alez, and F. Balado, “Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs,” in Proc. of the IEEE International Conference on Image Processing (ICIP), vol. 3, September 2003, pp. 479–482.
[19] J. P. Boyer, P. Duhamel and J. Blanc-Talon, ”Game-Theoretic Analysis of a Semi-FragileWatermarking Scheme Based on SCS”, ICIP 2005, Genoa, Italy.
[20] P. Moulin and A. Ivanovic, “Game-theoretic analysis of watermark detection,” In ICIP (3), pages 975–978, 2001.
[21] Anelia Somekh-Baruch and Neri Merhav,“On the Capacity Game of public Watermarking Systems,” ISIT 2002, Lausanne, Switzerland, June 30-July 5, 2002.