研究生: |
張惎紘 Ji-Hong Chang |
---|---|
論文名稱: |
以簽章保障所有權之條碼數位浮水印系統 Image Copyright Protection Using Bar-Code Watermark System with Digital Signature |
指導教授: |
張隆紋
Long-Wen Chang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2002 |
畢業學年度: | 90 |
語文別: | 英文 |
論文頁數: | 26 |
中文關鍵詞: | 數位簽章 、資料隱藏 、數位浮水印 、條碼 、所有權保護 、RSA加密法 、SHA-1雜湊函數 |
外文關鍵詞: | Digital Signature, Data Hiding, Digital Watermark, Bar-Code, Copyright Protection, RSA Cryptography, SHA-1 Hash Function |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文以1024-bits RSA加密法保護交易的訊息,再以數位簽章處理買賣方(buyer-seller)的問題,防止買方非法散佈以及賣方假造散佈;然後將簽章編成條碼(bar-code)當作浮水印嵌入,使其具有相當高的錯誤矯正能力,只要從被破壞的影像中析出的浮水印相似度(Similarity)還在某個標準之上就可完全回復其文字型態的內容。
以條碼當作浮水印是一種完全創新的想法,以往強固性浮水印是將一個商標(meaningful logo)當作浮水印嵌入,並輔以錯誤矯正碼(error correcting code)修復破壞後的結果。而如果將要藏入的文字訊息先編成條碼,其承受破壞的能力將遠超過任何一種錯誤矯正碼,原因在於條碼才是真正有序的圖形,所謂的meaningful logo只對人眼有意義,圖檔本身其實是無序的,所以條碼可根據本身所具有的一些規則擁有強大的自我修復能力,這是使用meaningful logo再加上錯誤矯正碼也做不到的要求,這點在實驗的結果中很明顯地呈現出來。
In this thesis, we use 1024-bits RSA cryptography to protect the trade messages. We also use digital signature to prevent a buyer from unauthorized copies and to prevent a seller from forged unauthorized copies. We encode the signature with bar-code and embed the bar-code image into the original image. As long as the similarity of watermark extracts from the damaged image over a threshold, the signature can be fully recovered.
It is a new idea to bring the bar-code concept into the watermark system. The general method of robust watermark that people would utilize is to embed a meaningful logo into an image and correct the damaged watermark with error correcting code (ECC). Our simulation shows that the proposed algorithm gets much better results than that with ECC.
[1] Ko-Ming Chan, “Public Watermarking System based on Wavelet Transform with Cryptographic and Self-Correcting Watermark”, Department of Computer Science National Tsing Hua University, 2001.
[2] 國科會計劃,計劃主持人:賴溪松、邱榮輝、孫宏民教授,「資訊學門-資訊安全研究發展」規劃報告,Dec. 1999.
[3] N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proceedings, IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 4, May 1996, pp. 2168-2171.
[4] S. Craver, N. Memon, B. L and M. M Yeung “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in Communications, Vol. 16 Issue: 4, May 1998, pp. 573 –586.
[5] Houng-Jyh Wang and C.-C. Jay Kuo, "Image Protection via Watermarking on Perceptually Significant Wavelet Coefficients." IEEE 1998 Workshop on Multimedia Signal Processing, Redondo Beach, CA., Dec. 7-9, 1998.
[6] R. Rivest, A. Shamir, and L. Strawczynski, “A Method for Obtaining Digital Signature and Public-Key Cryptosystem,” Communication of the ACM, vol. 21, no. 2, Feb. 1978.
[7] Siang-Gen Sia, Charles G. Boncelet, and Gonzalo R. Arce, “A Multi-resolution Watermark for Digital Image,” in IEEE 1997.
[8] S. B. Wicker and V. K. Bhargava (eds.), Reed-Solomon Codes and Their Applications, IEEE Press, 1994.
[9] W. Stallings, "Cryptography and network security: principles and practice, 2nd Edition." Prentice Hall, 1999.
[10] Bruce Schneier, "Applied Cryptography", Second Edition, John Wiley & Sons, 1996.
[11] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, " Secure Spread Spectrum Watermarking for Multimedia", IEEE Transaction on Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
[12] C.-T. Hsu and J.-L. Wu, "Hidden Digital Watermarks in Images, "IEEE Transactions on Image Processing, Vol. 8,No. 1, pp.58-68, Jan. 1999.
[13] Kuo-Shing Liu, “Designing A Distributed RSA User System”, College of Management National Chiao Tung University, June 1992.
[14] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, Addison Wesley, 1992.
[15] Ping Wath Wong, Nasir Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification”, IEEE Transactions on Image Processing, Vol. 10, No. 10, pp 1593-1601, OCTOBER 2001.
[16] Chiou-Ting Hsu, Ja-Ling Wu, “Hidden Digital Watermarks in Images”, IEEE Transactions on Image Processing, Vol. 8, No. 1, pp 58-68, January 1999.
[17] Nasir Memon, Ping Wah Wong, “A Buyer-Seller Watermarking Protocol”, IEEE Transactions on Image Processing, Vol. 10, No. 4, pp 643-649, April 2001.
[18] Hiroo Wakaumi, Takatoshi Komaoka, Eiji Hankui, “Grooved Bar-Code Recognition System with Tape-Automated-Bonding Head Detection Scanner”, IEEE Transactions on Magnetics, Vol. 36, No. 1, pp 366-370, January 2000.
[19] 商品條碼應用手冊,中華民國商品條碼策進會/經濟部商業司,1993