簡易檢索 / 詳目顯示

研究生: 楊典運
Yang, Tien-Yun
論文名稱: 保護無損之數位畫框系統設計與其SoC晶片之實現
Protected Lossless Digital Painting Systems and Its SoC Implementation
指導教授: 楊家輝
Yang, Jar-Ferr
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 64
中文關鍵詞: 無失真影像壓縮資料隱藏數位浮水印
外文關鍵詞: Lossless Image Encode, Data Hiding, Digital Watermarking
相關次數: 點閱:61下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於數位技術的蓬勃發展,各種多媒體之著作,如音樂、電影、照片,隨著數位化與嵌入式系統的進步而散播快速,然而伴隨而來的是著作內容保護不易。多創意內容被數位化且形成可攜式的產品,如MP3隨身聽、掌上型數位電視、數位相框、電子書。但是在種種創作中,藝術繪畫之內容保護隨著高密度液晶螢幕之發展,數位藝術繪畫之保護亦漸形重要。
    本論文結合二階層H.264無失真影像壓縮、基於直方圖的可回復式資料隱藏、以及可回復式可見式浮水印等技術,結合浮水印、資料隱藏、影像壓縮等理論技術以保護數位藝術繪畫,並於德州儀器DM6446 單系統晶片系統(SoC)實現數位畫框系統,不僅達到可攜,強調無失真地呈現,同時也達到保護數位內容的效果。

    Under the fast development in digital technology, multimedia content creations, such as music, movies , and photos, which were hard to duplicate and deliver in the past, become easier to be distributed and played due to digitalization and the invention of system on chip (SoC). However, this trend also introduces the problem in protecting digital contents in personal MP3 player, handheld video player, digital photo album, and electronic book. Furthermore, the protection of digital art paintings also become more important when the high density LCD displayers are successfully developed.
    In this thesis, we integrate two-layer H.264 lossless image compression, histogram-based data hiding, and recoverable watermarking techniques to design a protected lossless digital painting system. In the same time, we realize this digital painting system on TI DM6446 DVEVM. With the proposed system, we achieve a portable, lossless, and low cost digital painting display system, which can effectively protect the content of digital arts.

    摘要(中文) i ABSTRACT (English) ii 誌謝. iii 目錄. iv 表目錄. vii 圖目錄. viii 第1章 簡 介 1 1.1 研究背景與動機 1 1.2 數位影像內容保護發展簡介 2 1.3 嵌入式系統簡介 3 1.4 論文大綱 6 第2章 系統晶片與相關演算法發展 7 2.1 德州儀器TMS320DM6446晶片系統 7 2.2 數位浮水印發展 13 2.3 可回復資料隱藏發展 15 2.4 無失真影像壓縮發展 19 2.4.1 RLC編碼方法 20 2.4.2 JPEG-LS編碼方法 21 2.4.3 JPEG 2000編碼方法 22 2.4.4 H.264-LS 與 H.264-LS DPCM 24 第3章 數位畫框系統架構與實現 28 3.1 數位畫框架構 28 3.2 演算法 31 3.2.1 二階層H.264無失真影像壓縮 31 3.2.2 基於直方圖的可回復式資料隱藏 33 3.2.3 可回復式可見式浮水印 37 3.3 進階式數位畫框架構 38 3.4 適用於不可見式浮水印架構 44 第4章 實驗結果分析與實作測試 48 4.1演算法比較平台 48 4.2 測試影像 49 4.3 實驗結果數據分析 51 4.3.1 藏密量的比較 51 4.4 實作平台與實作呈現 54 4.4.1 實作平台 55 4.4.2 實作成果 57 第5章 結論 59 參考文獻 61

    [1] Fabien, A. P., Anderson, R. J. and Kuhn, M.G. “Information Hiding – A Survey,”Proceedings of the IEEE Special Issue on Protection of Multimedia Content, Vol. 87,No 7,p1062-1078,1999
    [2] P. W. Wong and N. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE Transactions on Image Processing, Vol. 10,No 10,pp1593-1601
    [3] V. Schyndel, R. Tirkel, A. and Osbourne, ”A digital watermark,” ICIP 94
    [4] K. Matsui and K. Tanaka, ”Video-steganography:How to embed a signature in a picture,” IMA Interllectual property project processing, pp.187-206, Jan, 1994
    [5] S. D. Lin and C. F.Chen ,”A Robust DCT-Based Watermarking for Copyright Protection, “ IEEE Transactions on Consumer Electronics , Vol. 46,No. 3 ,p 415-421,2000
    [6] Z. Yang, C. Patrizio, and K. Deepa, ”Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,” IEEE Transactions on Image Processing, Vol. 13,No. 3, p430-448,2004
    [7] C .T. Hsu and J. L. Wu , ”Hidden Digital Watermark in Image,” IEEE Transactions on Image Processing, Vol. 8 , Jan. 1999 , p58-68.
    [8] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniquesfor data hiding,” IBM Systems Journal, vol. 35, no. 3&4, pp.313-336, 1996.
    [9] F. Fridrich, M. Goljan, and R. Du (2001), “Invertible Authentication Watermark for JPEG Images,” IEEE Int. Conf. Information Technology: Coding and Computing, pp. 223-227.
    [10] M. U. Celik and G. Sharma, A. M. Tekalp, “Localized Lossless Authentication Watermark (LAW),” IEEE Transactions Multimedia, Vol. 5, no. 2, pp. 161 – 173,June 2003.
    [11] M. U. Celik, G. Sharma, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, Vol. 14, No. 2, pp. 253-266. , Feb. 2005
    [12] J. Tian, ”Reversible Watermarking by Difference Expansion,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 13, no. 8, pp.19-22, Aug, 2003.
    [13] A. M. Alattar, “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 147-1156, Aug. 2004
    [14] A. M. Alattar, “Reversible Watermark Using the Difference Expansion of Quads,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ISCAS '04), Vol. 3, pp. 377-380, 2004.
    [15] Z. Ni, Y. Q. Shi, N. Ansari and W.Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, Mar. 2006
    [16] 戴顯權,資料壓縮,二版,台北,紳藍出版社,2002年
    [17] ISO/IEC IS 14495, Information Technology Lossless and Near-lossless Compression of Continuous-tone still Images: Baseline, 2000(JEPG-LS).
    [18] ISO/IEC 15444-1: Information technology-JPEG2000 image coding system Part 1: core coding system, 2000.
    [19] M. J. Weinberger, G. Seroussi, and G. Sapiro, “The Loco-I Lossless Image Compression Algorithm: Principles and Standardization Into JPEG-LS ,“ IEEE Transactions on Image Processing, Vol. 9, No. 8, Aug, 2000.
    [20] D. Taubman, “High Performance Scalable Image Compression with EBCOT,” International Conference on Image Processing, Vol. 3, pp.344-348, 1999.
    [21] Y. L. Lee, K. H. Han, and G. J. Sullivan, “Improved Lossless Intra Coding for H.264/MPEG-4 AVC,” IEEE Transactions on Image Processing, Vol. 15, no. 9, pp. 2610- 2615, Sep. 2006.
    [22] J. R. Ding, J. Y. Chen, F. C. Yang, and J. F. Yang . “Two-layer and Adaptive Entropy Coding Algorithms for H.264-based Lossless Image Coding,” IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.1369-1372 ,2008
    [23] D. Marpe, H. Schwarz, and T. Wiegand “Context-Based Adaptive Binary Arithmetic Coding in the H.264/AVC Video Compression Standard ,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 7, July 2003
    [24] H. M. Tsai, L. W. Chang , “A High Secure Reversible Visible Watermarking Scheme,” IEEE International Conference on Multimedia & Expo , pp.2106- 2109 ,2007
    [25] M. U. Celik, G. Sharma,”A. M. Tekalp “Lossless watermarking for image authentication: a new framework and an implementation,” IEEE Transactions on Image Processing Vol.15,No.4, 1042-1049 ,Apr 2006
    [26] Reference software JM12.2 , http://iphome.hhi.de/suehring/tml/
    [27] 呂慈純,陸哲明,張真誠,多媒體安全技術,初版,台北,全華出版社,2007年 10月

    下載圖示 校內:2009-07-26公開
    校外:2011-07-26公開
    QR CODE