研究生: |
張維中 CHANG, WI CHUNG |
---|---|
論文名稱: |
具雙重浮水印及區塊小波轉換之影像認證機制 Image Authentication with Dual Watermarks and Block Wavelet Transform for IP Networks |
指導教授: |
張隆紋
Long-Wen Chang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2001 |
畢業學年度: | 89 |
語文別: | 英文 |
論文頁數: | 26 |
中文關鍵詞: | 數位簽章 、時間戳記 、浮水印 、區塊小波轉換 、雜湊函數 、雙重浮水印 |
外文關鍵詞: | Digital Signature, timestamp, watermark, block wavelet transform, hash function, Dual Watermarks |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
鑒於網際網路之普及與智慧財產權意識高漲,數位浮水印技術在近年來受到學術及產業界廣泛的注意,其可應用在多媒體資料如數位音樂、靜態影像、動態視訊等,浮水印的技術是將一些數位信號附於各多媒體資料當中,且其具不易破解、不易消除的特性,對於著作權保護問題提供有效的解決方法。
浮水印的加入,無可避免的必定會對影像造成某種程度的影響。因此強韌度與影像品質之間的拿捏就必須依使用者根據需求而定。浮水印技術主要著重於兩個領域,即 Spatial Domain與Frequency Domain 兩部分,各有其應用之領域。
目前浮水印技術多半用於提供資料所有者之所有權認證,但在新型態犯罪手法日漸增多前提之下,浮水印強韌度不再是唯一考量。接收端如何確保資料來源正確性及完整性、如何預防多重浮水印所造成的所有權之模糊等都是目前資訊安全所會面臨的問題。再此一趨勢之下,浮水印之發展結合安全性相關演算法將日漸迫切。數位簽章(digital signature)及時間戳記(timestamp)目前已廣泛的被應用在電子商務等相關領域,但是數位媒體極易遭到不法人士利用各種技術加以竄改,這使得合法使用者簽章很容易遭到破壞,因此如何克服此一問題是數位簽章應用在多媒體資料之一大課題。
本論文計劃在凌波頻譜上結合加密演算法(Encryption)及時間戳記(Time Stamp)並分別於Spatial Domain 與 Frequency Domain 加入浮水印。此一方法除浮水印本身強韌性(robustness)之考量外,也著重於傳送端及接收端驗證之機制。另外使用有意義之浮水印取代以往常用之任意序列(random sequence)浮水印更加深浮水印本身之可辨認性及預防IBM攻擊。
Digital watermarks have been proposed recently as a means for copyright protection of multimedia data. In this paper we emphasize that security of an image.
A timestamp can record the original message’s digest and authentication time to prove the ownership of the original message. This is already used widely in many applications. In this paper we combined timestamp and encryption algorithm such as ECC for watermark embedding to prevent some attack like multi-watermarks and IBM attack. Besides this we also used adaptive block wavelet transform to search the significant coefficients in the LL band in order to increase watermark robustness.
Experimental result shows the watermark extraction after attacks like JPEG compression, noise corruption, cropping and edge sharpening. We also show a watermark that extracted with illegal timestamp or key.
[1] JPEG2000 Verification Model edited by Charilaos Christopoulos April 1999.
[2] F.Minter, G. Braudaway, and M. M. Yeung, ”Effective and ineffective digital watermarks,” in Proceeding of ICIP, (Santa Barbara, CA), October 1997.
[3] N. Memom and P. W. Wong, “Protecting digital media content: Watermark for copyright and authentication.” Communication of ACM, July 1998.
[4] Jiri Fridrich “A Hybrid Watermark For Tamper Detection In Digital Images” ISSPA, August 1999.
[5] Ping Wah Wong “A Public Key Watermark for Image Verification and Verification Authentication”, IEEE 1998.
[6] Liehua Xie Conzalo R Arce and Arianne Lewis E.Bert Basch “Image Enhancement Towards Soft image Authentication”.
[7] Akira Takura, Shozo Natio “A Secure and Trusted Time Stamping Authority” 1999 IEEE.
[8] S. Haber and W. S. Stometta, “How to Time-Stamp a Digital Document,” J.of Cryptography, vol.3, No2, pp.99-111, 1991.
[9] S.Crqver, N.Memon, B. Yeo and M, Yeung, “Can invisible watermarks resolve rightful ownships?”IBM Research Rep., RC20509, 1996.
[10] J.J. Botes, W.T. Penzhorn, “Public – Key based on Elliptic Curve”. IEEE 1993.
[11] J.J. Botes, W.T. Penzhorn, “An Implement Of An Elliptic Curve Cryptosystem ”, IEEE 1994.
[12] Don Johnson, Alfred Menezes, “The Elliptic curve Digital Signature Algorithm” Technical Report, CORR 99-34, Dept. of C&O.
[13] Jiri Fridrich, Miroslav Goljan, “Robust Hash Function for Digital Watermarking” IEEE 2000.
[14] Min Shiang Hwang, Chin Chen Chang, Kuo Feng Hwang, “A Watermarking Technique Base On One-Way Hash Function ” IEEE 1999.
[15] Rahouma, K.H. “Utilization of multiple block cipher hashing in authentication and digital signatures” Networks, 2000. (ICON 2000). Proceedings. IEEE International Conference on, 2000
[16] Liehua Xie, Gonzalo R. Acre, Arianne Lewis, E. Bert Basch “Image Enhancement Towards Soft Image Authentication”. IEEE 2000.
[17] B.Schneider. Applied Cryptography: protocols, algorithm, and source code. Wiley, New York, 1996.
[18] Li Zhi Cheng; Hui Xu; Yong Luo “Integer discrete cosine transform and its fast algorithm” Electronics Letters, Volume: 37 Issue: 1, 4 Jan. 2001.
[19] C. G. B. Xiang Gen Xia, and G. R. Arce, “A multisolution Watermark for Digital Image.” In 1997 International Conference on Image Processing (ICIP 97), (Santa Barbara, CA), IEEE Signal Processing Society, July 1997.
[20] Young Huh “the new extended JPEG with variable quantizer using block wavelet transform” IEEE 1997.
[21] Young Huh, K.Panusopone, K. R. Rao “progressive transmission of image using block wavelet transform” IEEE 1997.