簡易檢索 / 詳目顯示

研究生: 趙士傑
Chao, Shih-chieh
論文名稱: 一個用於JPEG影像具有易碎與強健特性之多目的浮水印技術
A Multipurpose Watermarking Technique with Fragility and Robustness on JPEG Image
指導教授: 何裕琨
Ho, Yu-kuen
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 中文
論文頁數: 71
中文關鍵詞: 多目的浮水印易碎型浮水印強健型浮水印著作權保護完整性認證
外文關鍵詞: Robust watermark, Fragile watermark, Multipurpose watermark, Integrity verification
相關次數: 點閱:118下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來有許多學者提出多目的數位浮水印(Multipurpose Digital Watermark)之技術,嵌入多目的數位浮水印之目的是利用不同浮水印之特性以達成多種的用途,較常見的是將強健型及易碎型浮水印依序嵌入,希望結合二者的優點以達到多功能浮水印的效果。而在JPEG壓縮格式中嵌入此類型之數位浮水印,對網路媒體傳輸可達保護與認證之目的。
    本論文在JPEG影像上提出一個具有易碎與強健特性的數位浮水印技術,此技術利用多組重覆之易碎型浮水印再計算出區塊特徵與相關值嵌入於JPEG之離散餘弦轉換域量化後係數中。此浮水印可保護所有量化後係數,達到易碎型浮水印影像完整性認證(Integrity Authentication)的效果。所嵌入之易碎型數位浮水印,利用重覆碼(Repetition Code)之機制具有可還原成著作權資訊的特性,因此亦具有強健型浮水印著作權保護的效果。此外在區塊相關值計算時利用一嵌入因子(Embedding Factor, EF)計算出影像區塊特徵相關性(Block Feature Correlation),即可在浮水印的易碎性與強健性之間作調整,達到兼具著作權保護與竄改定位上之目的。
    本論文所提出之浮水印技術經由實驗證明,在影像受到局部竄改或攻擊時能夠以影像區塊為單位偵測出受到竄改或攻擊之部份,藉由影像區塊特徵相關性的嵌入方式可抵抗剪下-貼上攻擊(Cut-and-Paste Attack)、向量量化攻擊(Vector Quantization Attack)與移植攻擊(Transplantation Attack)等目前已被提出的攻擊方法亦可偵測出被攻擊之區塊。在著作權保護方面經由,實驗結果可知即使整個影像皆加入高斯雜訊或經過低通濾波器,亦可由浮水印還原所嵌入之著作權資訊證明影像著作權之歸屬,達到著作權保護之功能。

    Multipurpose digital watermarking techniques are published in recent years. Those techniques embed the different watermarks such as fragile and robust for combining the advantages. In this paper, we propose a multipurpose watermarking technique with fragility and robustness on JPEG image. First, we generate many watermarks with the user key and copyright information so that they are different from each others. Then calculate the image block features and the correlations for embedding those watermarks into the Discrete Cosine Transform (DCT) coefficients. By using the Repetition Code mechanism, those embedded watermarks can be converting to original copyright information that is used to generate those watermarks so that it obtains the function of copyright information protection. Because of the Embedding Factor (EF) is used to calculate the image block correlations, the watermarking technique can adjust between the fragility and the robustness of the embedded watermarks. By the experiment result, this technique can detect the modified regions with block unit and overcomes the cut-and-paste attack, vector quantization attack and transplantation attack. The copyright information has a strong robustness to low pass filter and Gaussian noise.

    第一章 緒論............................................1 第二章 相關背景. ......................................6 2.1 JPEG壓縮格式簡介. ..............................6 2.2 重覆碼.........................................15 2.3 使用秘密和之易碎型浮水印技術...................16 2.4 多目的浮水印技術...............................20 2.5 相關浮水印攻擊方法.............................23 2.6 影像評估方式...................................26 第三章 具有易碎與強健特性之多目的浮水印技術................28 3.1 浮水印的產生........................................31 3.2 秘密和計算區塊特徵.............................32 3.3 浮水印的嵌入...................................36 3.4 浮水印萃取之完整性認證與著作權保護.............41 3.4 演算分析及錯誤警報..................................46 第四章 實驗結果............................................48 4.1 實驗相關配備及環境.............................50 4.2 嵌入因子之調整與竄改偵測定位準確度.............50 4.3 嵌入因子之調整與著作權保護.....................62 4.4 嵌入因子與浮水印的易碎及強健性之調整...............67 第五章 結論與未來展望.................................69 表目錄 表2-1 JPEG標準規格書建議量化表...........................9 表2-2 不同品質參數對應之壓縮品質表......................12 表3-1 不同QF之下NC值錯誤警報狀況......................47 表4-1 嵌入因子之調整與PSNR關係表.......................62 表4-2 NC值與偵測到受攻擊之區塊比率之相對應關係(高斯雜訊).....67 表4-3 NC值與偵測到受攻擊之區塊比率之相對應關係(低通濾波器)...68 圖目錄 圖2-1 JPEG壓縮系統架構流程圖............................7 圖2-2 直流係數與交流係數..................................8 圖2-3 頻率分佈圖.........................................8 圖2-4 Zig-zag 掃瞄順序........................................10 圖2-5 512*512像素灰階圖Lena.................................13 圖2-6 512*512像素灰階圖F16..................................13 圖2-7 9相鄰區塊示意圖........................................17 圖2-8 產生Si(j)挑選係數的例子.................................18 圖2-9 YAUN等學者之嵌入方法架構圖...........................21 圖2-10 YAUN等學者之萃取方法架構圖..........................21 圖2-11 各種區塊相依模式......................................24 圖3-1 JPEG壓縮流程與浮水印嵌入、萃取之關係圖................28 圖3-2 4個相鄰區塊模式.......................................32 圖3-3 相鄰區塊與特徵值之對應位置.............................32 圖3-4 區塊特徵挑選係數之範例.................................34 圖3-5 嵌入後影像區塊.........................................39 圖3-6 嵌入程序示意圖.........................................40 圖3-7 浮水印萃取、完整性偵測與著作權偵測之程序圖..............44 圖4-1 原始Lena影像..........................................49 圖4-2 原始F16影像...........................................49 圖4-3 原始NCKU著作權資訊..................................49 圖4-4 影像低頻部份之竄改偵測實驗(EF=0)......................51 圖4-5 影像低頻部份之竄改偵測實驗(EF=10)......................52 圖4-6 影像低頻部份之竄改偵測實驗(EF=15)......................53 圖4-7 影像低頻部份之竄改偵測實驗(EF=20)......................54 圖4-8 影像高頻部份之竄改偵測實驗(EF=10)......................55 圖4-9 影像高頻部份之竄改偵測實驗(EF=15)......................56 圖4-10 影像高頻部份之竄改偵測實驗(EF=25).....................57 圖4-11 嵌入因子為0時受到剪下-貼上攻擊之竄改偵測實驗.........58 圖4-12 嵌入因子為10時受到剪下-貼上攻擊之竄改偵測實驗........59 圖4-13 嵌入因子為15時受到剪下-貼上攻擊之竄改偵測實驗........60 圖4-14 嵌入因子為20時受到剪下-貼上攻擊之竄改偵測實驗........61 圖4-15 嵌入因子為0時受到高斯雜訊攻擊之偵測結果..............63 圖4-16 嵌入因子與NC值之曲線圖(Lena)....................64 圖4-17 嵌入因子與NC值之平均曲線圖(高斯雜訊)............64 圖 4-18 嵌入因子為0時通過低通濾波器之偵測結果...............65 圖4-19 嵌入因子與NC值之曲線圖(Lena).........................66 圖4-20 嵌入因子與NC值之平均曲線圖(低通濾波器)...............66

    [1] Bijan G. Mobasseri, Senior Member, IEEE, and Robert J. Berger, II, "A Foundation for Watermarking in Compressed Domain", IEEE Signal Processing Letters, Vol. 12, No. 5, Page(s):399 - 402, MAY 2005

    [2] C.-T. Li, "Digital fragile watermarking scheme for authentication of JPEG images", IEE Proc.-Vis. Image Signal Process, Vol. 151, No. 6 ,Page(s):460 - 466, December 2004

    [3] Chun-Shien Lu, Member, IEEE, and Hong-Yuan Mark Liao, Member, IEEE, “Multipurpose Watermarking for Image Authentication and Protection”, IEEE Transactions on Image Processing, Vol. 10, No. 10, Page(s):1579 - 1592, OCTOBER 2001

    [4] David W. Cook II and P. K. Rajan, Fellow, IEEE, "TIAMAT: A New Fragile Watermarking Technique for Image Authentication", IEEE System Theory Proceeding of the Thrity-Eighth Southeastern Symposium on 5-7, Page(s):221–225, March 2006

    [5] Gregory K. Wallace, "The JPEG Still Picture Compression Standard", Consumer Electronics, IEEE Transactions, Vol. 38, Issue 1, Pages xviii-xxxiv, 1992

    [6] Haifeng Zhu , Chunhui Zhao, Chunming Tang, "A Fragile Watermarking Scheme For Tamper Detection and Recovery of Image", Proceedings of the 6th World Congress on Intelligent Control and Automation, Page(s):9748 - 9751, June, 2006

    [7] http://www.ijg.org/

    [8] Matthew Holliman and Nasir Memon, “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes”, IEEE Transactions on Image Processing, Vol. 9, No. 3, Page(s):432 - 441, March 2000

    [9] Mehmet Utku Celik, Student Member, IEEE, Gaurav Sharma, Senior Member, IEEE, Eli Saber, Senior Member, IEEE, and Ahmet Murat Tekalp, Senior Member, IEEE, "Hierarchical Watermarking for Secure Image Authentication With Localization", IEEE Transactions on Image Processing, VOL. 11, NO. 6, Page(s):585 - 595 , JUNE 2002

    [10] Paulo S. L. M. Barreto, Hae Yong Kim, Vincent Rijmen, "TOWARD A SECURE PUBLIC-KEY BLOCKWISE FRAGILE AUTHENTICATION WATERMARKING", IEE Proc. Vis. Image Signal Process., 148, (2), pp. 57–62, 2002

    [11] Ping Wah Wong, Senior Member, IEEE, and Nasir Memon, Member, IEEE, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification", IEEE Transactions on Image Processing, Vol. 10, NO. 10, Page(s):1593 – 1601, OCTOBER 2001

    [12] YUAN Jun, CUI Guo-hua, ZHANG Yi-jia, "A Practical Multipurpose Color Image Watermarking Algorithm for Copyright Protection and Image Authentication", IEEE Digital Telecommunications, ICDT'06 International Conference, Page(s):72 – 72, 2006.

    [13] Zhe-Ming Lu, Member, IEEE, Dian-Guo Xu, Member, IEEE, and Sheng-He Sun, "Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization", IEEE Transactions on Image Processing, Vol. 14, No. 6, Page(s):822 – 831, JUNE 2005

    [14] 陳同孝,張真誠,黃國峰,“數位影像處理技術”,pp.1-9, 旗標出版社,92年出版。

    下載圖示 校內:2008-09-13公開
    校外:2008-09-13公開
    QR CODE