| 研究生: |
張哲豪 Chang, Che-Hao |
|---|---|
| 論文名稱: |
一個基於奇異值分解具有竄改偵測能力之強健型灰階值浮水印技術 A Robust Grayscale Watermarking Scheme with Tamper Detection Ability Based on Singular Value Decomposition |
| 指導教授: |
何裕琨
Ho, Yu-Kuen |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2009 |
| 畢業學年度: | 97 |
| 語文別: | 中文 |
| 論文頁數: | 79 |
| 中文關鍵詞: | 多目浮水印 、竄改偵測 、灰階型浮水印 、完整性認證 、著作權保護 |
| 外文關鍵詞: | Copyright protection, Integrity verification, Grayscale watermark, Multipurpose watermark, Tamper detection |
| 相關次數: | 點閱:97 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在影像中,嵌入多目的數位浮水印之目的是利用不同浮水印之特性以達多種之用途,較常見的是嵌入強健型及易碎型兩種特性之浮水印,以結合兩者的優點來達到保護與認證之目的。在網路媒體之傳輸上,有別於使用二值型浮水印(Binary Watermark),近來對於灰階型浮水印(Grayscale Watermark)的使用有日漸普及之趨勢。
曾有學者在原始影像之區塊上利用奇異值分解(Singular Value Decomposition, SVD)所得之最大奇異值來嵌入灰階型浮水印,由於奇異值具有聚集影像大部分的能量及不受細微干擾而改變的特性,因此可利用修改能按大小排列之奇異值的最大值來嵌入灰階型浮水印,並且藉由深度因子(Depth Factor, DF)來調整浮水印的強健性,以避免對原始影像品質有過多影響。
為了加入竄改偵測能力之易碎型浮水印於此強健型灰階值浮水印之技術中,本論文修改利用區塊最大奇異值嵌入灰階型浮水印之方法,以縮小方法深度因子對原始影像的影響,然後再利用已嵌入灰階值浮水印之奇異值最低位元(Least Significant Bit, LSB),產生一個二值型數列浮水印嵌入於影像區塊之最低位元,形成一易碎型浮水印以便偵測出影像受到竄改的區域,此形成一多目的灰階值浮水印技術。
由實驗證明本論文因此提出之方法,由於縮小深度因子對影像影響較以往學者所提之灰階型浮水印技術少,因此影像品質較佳,此外,在影像受到局部竄改或攻擊時能夠以影像區塊為單位偵測出受到竄改或攻擊之部分。在著作權保護方面,萃取浮水印的過程中亦不需要原始影像,只需要所有人的密鑰即可將此灰階型浮水印萃取出來,此外即使整個影像皆加入高斯雜訊或經過JPEG壓縮,亦可萃取出甚高品質之灰階值浮水印,以證明影像著作權之歸屬以達到著作權保護之功能。
The purpose of multipurpose digital watermarking technique is embedding different watermarks for combining their advantages such as fragile watermark and robust watermark. In network transmission, in order to protect and verify image; more and More digital watermark is adopted grayscale watermark different from binary watermark for protection and authentication in Internet Transmission。
The watermarking schemes based on the singular value decomposition (SVD) embed a watermark into singular values because these singular values have the most power of an image and can not be changed by small noise. By this property, the watermark embeds into the largest of singular value, avoiding having much effect for the quality of cover image.
For getting tamper detection ability in the robust grayscale watermarking scheme, first we modified the maximum of singular value in block and enhanced image quality by reducing depth factor(DF) effect. Then, we use conditions to determine how much modification in singular value, then. we can embed the binary bit string into the LSB of cover image, and use this watermark to detect which block of watermarked image is modified. We propose the multipurpose watermark scheme with verification and tamper detection ability.
By the experiment results, proposed scheme can defense normal attack and detect the modified regions with block unit. In the Copyright protection, proposed scheme can extract the high quality grayscale watermark only need keys without original cover image, and extracted watermark can overcome Gaussian noise attack and JPEG compression.
[1] R.G.Van Schyndel, A.Z.Tirkel, and C.F. Osborne, “A digital watermark”, in Proc.ICIP94, IEEE Int. Conf. Image Processing, vol. 2, pp.86-90, Austin, Texas, Nov. 1994
[2] R.Wolfgang and E.J.Delp, ”A watermark for digital images”, in Proc.ICIP96. IEEE Int. Conf. Image Processing, vol. 3, pp.219-222, Lausanne, Switzerland, Sep. 1996
[3] Ming-Quan Fan, Hong-Xia Wang,“A novel multipurpose watermarking scheme for copyright protection and content authentication”, Second Workshop on Digital Media and its Application in Museum & Heritage (DMAMH 2007), 2007
[4] Yuan Jun, Cui Guo-hua, Zhang Yi-jia, ”A Practical Multipurpose Color Image Watermarking Algorithm for Copyright Protection and Image Authentiction”, IEEE Conference, Page(s):72-72,2006.
[5] Lin Zhuang, Mingyan Jiang,”Multipurpose Digital Watermarking Algorithm Based on Dual-Tree CWT”, Proceedings of the sixth international conference on intelligent systems design and applications,2006
[6] Xiaohu Ma, Xiaofeng Shen, “A novel blind grayscale watermark algorithm based on SVD”, Audio, Language and Image Processing, 2008. ICALIP 2008. , Page(s): 1063-1068, July 2008
[7] Jieh-Ming Shieh, Der-Chyuan lou, Ming-Chang Chang,”A semi-blind digital watermarking scheme based on singular value decomposition”,computer standards & interfaces,2006
[8] Ruizhen Liu and Tieniu Tan, ”An SVD-based watermarking scheme for protecting rightful ownership”, IEEE Transcation on Multimedia,Vol.4,No. 1,Page(s):121-128,Mar 2002
[9] Jieh-Ming Shieh, Der-Chyuan Lou, Ming-Chang Chang, “A semi-blind digital watermarking scheme based on singular value decomposition” isda, vol. 2, pp.123-126, 2008 Eighth International Conference on Intelligent Systems Design and Applications, 2008
[10] De-song Wang, Jian-ping Li, Xiao-yang Wen, “Biometric Image Integrity Authentication Based on SVD and Fragile Watermarking”, Proceedings of the 2008 Congress on Image and Signal Processing, Vol. 5, 2008
[11] Vivi Oktavia1, Won-Hyung Lee,” A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition”, Advances in Multimedia Information Processing – PCM, 2004
[12] Ganic, E. and Eskicioglu, A. M., “Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies”, Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security, Magdeburg, Germany, pp.166-174, 2004
[13] 陳同孝, 張真誠, 黃國峰, “數位影像處理技術”, pp.1-9,旗標出版社, 92年出版
[14] Shumei Wang, Weidong Zhao and Zhicheng Wang, “A Novel Gray Scale Watermarking Algorithm in Wavelet Domain”, Proceedings of the 2008 IEEE International Conference on Information and Automation, 2008
[15] Shumei Wang, Weidong Zhao and Zhicheng Wang, “A Novel Gray Scale Watermarking Algorithm Based on LU Factorization”, Information Processing (ISIP), 2008 International Symposiums on Volume , Issue , May 2008
[16] Kundur D. and Hatzinakos D., “Towards a telltale watermark techniques for tamper-proofing”, Proc. IEEE. Int. Conf. Image Processing, vol. 2, pp.409-413,1998
[17] R.C. Gonzalez, R.E.Woods, S.L.Eddins, “Digital Image Processing-using MATLAB”, 東華書局, 94出版
[18] Ming-Quan Fan, Hong-Xia Wang, “A Novel Multipurpose Watermarking Scheme for Copyright Protection and Content Authentication”, Proceedings of the Second Workshop on Digital Media and its Application in Museum & Heritage table of contents Pages 19-24, 2007