研究生: |
范志鴻 Chi-Hung Fan |
---|---|
論文名稱: |
基於最佳摻入位址的高抗壓縮浮水印系統 Optimal embedded positions in watermarking system for resisting high JPEG compression |
指導教授: |
許文星
Wen-Hsing Hsu |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
論文出版年: | 2006 |
畢業學年度: | 94 |
語文別: | 中文 |
論文頁數: | 58 |
中文關鍵詞: | 數位浮水印 、最佳摻入位址 、最佳摻入數值 、壓縮零值 、JPEG壓縮 |
外文關鍵詞: | digital watermark, optimal embedded point, optimal embedded value, compressive zero number, JPEG compression |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
有鑑於現今高速網際網路的普及化,人們在傳輸數位多媒體資料時,往往希望可以擁有更加快速且方便的傳輸速率。因此人們通常會將數位資料盡可能的以不失真為前提做壓縮的動作,然而其中就存在著如何保護智慧財產權的問題需要被解決,為了防止這些非法的行為來破壞個人隱私,現今已有不少的技術被發展出來還解決這方面的問題。
數位浮水印是一個較為新且發展中的技術,用來克服上述的問題。對於數位訊號是否有被竄改,我們可以藉由檢查摻入在其中的數位浮水印就可以合理的判斷出來,數位浮水印獨特的特性是它不會被因為摻入的多媒體而被分離,也就是說數位浮水印可以存活在任何蓄意的攻擊當中,因此如何正確的偵測出數位浮水印在各種不同的攻擊下是非常重要的,而在本篇論文中我們將主要注重於壓縮方面的攻擊來做研究,並且提出一個新的浮水印系統來針對此攻擊做保護。
在本篇論文中,我們提出了一個新的數位浮水印系統,我們希望此系統不只可以具備高抗壓縮的能力,並且可以盡可能保持圖像的品質不被影響到,而我所提出的方法主要著重在JPEG壓縮方面,JPEG壓縮已是現今用於靜態影像的國際標準規格。我們主要提出兩個方法於此系統中,「分析方則」以及「摻入法則」,在「分析法則」中我們仔細的分析原影像在JPEG壓縮時的變化,因而可獨自的針對不同影像找出其最佳的浮水印摻入位址,此步驟就是造就高性能實驗結果的重要因素。在實驗結果中可以看到我們的方法,有效的達到先前預期的高抗壓縮能力。並且我們將會將我們的方法與其他人的方法作比較,以間接地證明我們實驗結果的性能。
With the popularity of high speed internet, the transmission
of digital media need to be more faster and easier. Therefore, people usually compress the media data to keep the size as small as possible. Hence, there exist an important issue for copyright protection to be solved. In order to avoid the piracy from illegal behavior, several kinds of technologies are developed to solve this problem. Digital watermarking is a novel and developed technology that can overcome above disadvantage. Whether the digital data is modified or not, we can still judge the legitimacy by checking its watermarking. The unique property of the the watermark is that it cannot be separated from embedded media. It means that the watermark can survive in any arbitrary attack. Therefore, it is important that how to detect rightful ownerships under various attacks. Accordingly, in this thesis we pay more attention on compressive attack and propose a new watermark system to avoid it.
In this thesis, we present a new method of digital watermarking system. We want to design the system not only to resist high compressive attack but also to keep the image quality as good as possible. My proposed method mainly concentrates on high JPEG compression, which has been established the international compressive standard for still image. There are two main proposed methods, one is the proposed analysis method, and the other is the proposed embedded method. In the proposed analysis method, owing to
we particularity analyze the distortion of host image on JPEG compression. Therefore, we can individually find out the optimal embedded points and values for every image. This process is the most important factor to achieve our high performance of experiments. The experiments shows that my proposed method can fit theoretical anticipation under JPEG compression. Also we will compare our method with others' to indirectly prove the performance of our experiment .
[1] Frank Y. Shih and Scott Y. T. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognition, vol. 36, pp. 969-975, 2002.
[2] Mohamed A. Suhail and Mohammad S. Obaidat, "Digital watermarking-based dct and jpeg model," IEEE Trans. on Instrucmentation and Measurement, vol. 52, pp. 1640{1647, 2003.
[3] Rafael C. Gonzales and Richard E.Woods, "Digital image processing, second edition," .
[4] C. Busch, W. Funk, and S. Wolthusen, "Digital watermarking: From concepts to real-time video applications," IEEE Comput. Graphics Applicat., vol. 19, pp. 25-35, 1999.
[5] M. D. Swanson, M. Kobayshi, and A. H. Tewfik, "Multimedia data embedding and watermarking technologies," Proc. IEEE, vol. 86, pp. 1064-1087,
1998.
[6] F. Hartung and M.Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, pp. 1079-1106, 1999.
[7] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrumwatermarking for multimedia," IEEE Trans. Image Processing, vol. 6,
pp. 1673-1687, 1997.
[8] G. Z. Wu, Y. Y. Wang, and W. H. Hsu, "Robust watermark embedding/detection algorithm for h.264 video," Journal of Electronic Imaging, vol. 14, pp. 13013-0-13013-9, 2005.
[9] W. Guan and S. Ma, "A list-processing approach to compute voronoi diagrams and the euclidean distance transform," IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, 1998.
[10] M. Kreveld M. Berg, M. Overmars, and O. Schwarzkopf, "Computational geometry," Algorithms and Applications. Berlin, Germany, 1997.
[11] R. Klein, "Concrete and abstract: Voronoi diagrams. berlin, germany," 1987.
[12] T. Tommasini, A. Fusiello, E. Trucco, and V. Roberto, "Marking good features track better," in Proc. of IEEE Conf. Computer Vision and Pattern Recognition, pp. 178-183, 1998.
[13] P. Wolfgang and E. Delp, "A watermark for digital images," in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, pp. 219-222, 1996.
[14] J. Huang, Y. Q. Shi, and Y. Shi, "Embedding image watermarks in dc components," IEEE Trans. on Circults and Systems for Video Technology, vol. 10, pp. 974-979, 2000.
[15] L. Chen and Y. Q. Shi, "An integrated classifier in classified coding," in Proc. of IEEE Int. Symposium on Circuits and Systems(ISCAS'98), vol. 44, pp. 146-149, 1998.
[16] T. Y. Chung, M. S. Hong, Y. N. Oh, and S. H. Park, "Digital watermarking for copyright protection of mpeg2 compressed vedio," in Proc. of IEEE Transactions on Consumer Electronics, vol. 44, pp. 895-901, 1998.
[17] C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing jpeg compression from malicious manipulation," IEEE Trans. on Circuits and Systems of Video Technology, vol. 11, pp. 153-168, 2001.
[18] C. K. Ho and C. T. Li, "Semi-fragile watermarking scheme for authentication of jpeg images," in Proc. of IEEE Int. Conf. on Information Technology, p. 2004.
[19] B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. on Information Theory, vol. 47, pp. 1423-1443, 2001.
[20] J. J. Eggers and B. Girod, "Informed watermarking," Norwell, 2002.
[21] P. H. W. Wong and O. C. Au, "A blind watermarking technique in jpeg compressed domain," in Proc. of 2002 Int. Conf. on Image Processing, vol. 3, pp. 497-500, 2002.
[22] P. H. W. Wong, A. Chang, and O. C. Au, "On improving the iterative watermark embedding technique for jpeg-to-jpeg watermarking," in Proc. of 2004 Int. Symposium on Circuits and Systems (ISCAS'04), vol. 2, pp. 161-164, 2004.
[23] P. H. W. Wong and O. C. Au, "A capacity estimation technique for jpeg-to-jpeg image watermarking," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp. 746-752, 2003.
[24] P. H. W. Wong, O. C. Au, and Y. M. Yeung, "Novel blind multiple watermarking technique for images," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp. 813-830, 2003.