研究生: |
黃柏臻 Huang, Po-Chen |
---|---|
論文名稱: |
Game Theoretic image authentication and recovery with hierarchical watermarking 使用賽局理論於階層式浮水印的認證與回復 |
指導教授: |
張隆紋
Chang, Long-Wen |
口試委員: |
陳祝嵩
黃文良 張隆紋 |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2011 |
畢業學年度: | 99 |
語文別: | 英文 |
論文頁數: | 31 |
中文關鍵詞: | 影像認證 、影像回復 、賽局理論 、數位浮水印 |
外文關鍵詞: | Image authentication, Tamper detection, Game theory, Digital watermarking |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
In recent years the wide band networks made the exchange of digital images, easy and fast. However, it is also easy to modify or forge digital images and the protection of their contents becomes very important. Digital watermarking is considered as a solution for authentication and recovery when the image is under an attack.
In this paper, a game-theoretic analysis of a hierarchical digital watermarking method for image tampering detection and recovery is proposed. We use a cooperative game to decide how many bits will be embedded according to the different types of blocks. One player is complex block, and the other is smooth block. Their strategies are number of bits in watermarking embedding. The two players are cooperate to choose an optimal embedding strategy profile to get the best recovery rate and best quality to generate the watermarked image. The proposed method use hierarchical detection to authenticate the watermarked image and localize its tampered region. The simulation shows the good performance of the proposed algorithm.
由於網路的蓬勃發展,使得數位資料可以透過網路輕易的傳送,也因為如此,影像很容易被惡意的篡改。所以影像認證與影像還原是非常重要的一環。最常見的解決方法就是使用數位浮水印。
在本篇論文中,我們提出了一個階層式數位浮水印的影像認證及復原機制,並套入賽局理論去分析最適合的嵌入策略。在此賽局中,分別有兩位玩家,複雜區塊與平滑區塊,他們會互相合作選擇出一個最佳的策略,讓我們得到良好的嵌入浮水印後圖像品質與復原率。並藉由階層式的認證機制,能有效找出被竄改的區域,並進行復原
由實驗結果得知,我們提出的方法 可以有效認證原圖是否被修改且對於修改的區域進行復原。
Reference
[1] P.-p. Liu, et al., "A Novel Image Fragile Watermarking Algorithm Based on Chaotic Map," pp. 631-634, 2008.
[2] V. F. E. Chrysochos, and A. N. Skodras, "Robust Watermarking of Digital Images Based on Chaotic Mapping and DCT," EUSIPCO, 2008.
[3] M. Hamad and S. A. M. Gilani, "A semi-fragile watermarking scheme for color image authentication," in Proceedings of world academy of science, engineering and technology, pp. 317-321, 2006.
[4] C.Cruz, J. Mendoza, M. Nakano, H. Perez, B. Kurkoski, "Semi- Fragile Watermarking based Image Authentication with Recovery Capability", pp.269-272,ICIECS 2009.
[5] E. Lin, C. Podilchuk, and E. Delp, “Detection of image alterations using semi-fragile watermarks,” in Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, USA, 23–28, pp. 152–163, 2000.
[6] Yeh GH and Lee GC, “Toral fragile watermarking for localizing and recovering tampered image”, in IEEE Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, pp. 321-324, 2005.
[7] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A Digital Watermark”, Proc. of the IEEE Int. Conf. on Image Processing, vol. 2, pp. 86-90, Austin, Texas, 1994.
[8] P. Lin, et al., "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, pp. 2519-2529, 2005.
[9] T. Lee and S. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, pp. 3497-3506, 2008.
[10] C. Chang, H. Fan and L. Tai, Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition 41, pp. 654-661, 2008.
[11] Niebur, E. and Koch, C, “Control of Selective Visual Attention: Modeling the `Where' Pathway,” Neural Information Processing Systems, 1996.
[12] Paul L. Rosin, “A simple method for detecting salient regions”, Pattern Recognition, Volume 42, Issue 11, pp. 2363-2371, 2009.
[13] M.Z. Aziz and B. Mertsching, “Fast and robust generation of feature maps for region-based visual attention”, IEEE Transactions on Image Processing 17, pp. 633–644, 2008.
[14] F. Moosmann, D. Larlus and F. Jurie, “Learning saliency maps for object categorization”, ECCV International Workshop on the Representation and Use of Prior Knowledge in Vision, 2006.
[15] J. A. O’Sullivan, P. Moulin, and J. M. Ettinger,“Information-Theoretic Analysis of Steganography,” Proc. IEEE Innt. Symp. on Info. Thg, Cambridge, MA, pp. 297, 1998.
[16] P. Moulin, “The Role of Information Theory in Watermarking and Its Application to image Watermarking,” Signal Processing, Special Issue on Information-Theoretic Issues in Watermarking, 2001.
[17] M.Tsai, et al., “A game-theoretic framework for the security system of visible watermarking,” Expert Systems with Applications: An International Journal archive
Volume 38 Issue 5, 2011.
[18] Stéphane Pateux, Gaëtan Le Guelvouit, “Practical watermarking scheme based on wide spread spectrum and game theory,” Signal Processing: Image Communication Volume 18, Issue 4, pp. 283-296, 2003.
[19] Shaheen S. Fatima Michael Wooldridge Nicholas R. Jennings, “An analysis of the Shapley Value and its Uncertainty for the Voting Game”, 7th International Workshop on Agent-Mediated Electronic Commerce, pp. 39-52, 2005.