簡易檢索 / 詳目顯示

研究生: 賴俊智
Chun-Chih Lai
論文名稱: 數位浮水印強健性之分析與比較
Analysis and Comparison in the Robustness of Digital Watermarking Algorithm
指導教授: 林昌鴻
Chang Hong Lin
口試委員: 陳維美
Wei-Mei Chen
吳晉賢
Chin-Hsien Wu
許孟超
Mon-Chau Shie
林昌鴻
Chang Hong Lin
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 中文
論文頁數: 85
中文關鍵詞: 數位浮水印強健性空間域頻率域離散餘弦最小位元取代編碼尖峰訊噪比正規化關聯值
外文關鍵詞: digital watermark, robustness, spatial domain, frequency domain, DCT, LSB, PSNR, NC
相關次數: 點閱:292下載:9
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 資訊科技發展至今,網際網路(Internet)已成為絕佳的資訊交流媒介。許多的個人著作及資訊也因為數位化而能夠在網路上流通,但是,也因此而容易遭受到非法的複製、盜用和散佈而衍生出智慧財產權的問題,數位浮水印便是用來解決此一問題的有效技術之一。數位浮水印的技術發展至今已經多年的歷史了,而許多的文獻在數位浮水印的強健性上也有所探討。而這些相關技術的提出,其目的都是為了使數位資料可以獲得更好的保護。
    因此,本論文將分別以兩篇有關空間域與頻率域的數位浮水印技術的強健性做一個探討與研究。首先,以離散餘弦與最小位元取代編碼法(LSB)為基礎的浮水印來探討。接著,以MATLAB做為實驗的平台並且將這些浮水的演算法一一實現。最後,再將獲得的實驗數據以尖峰訊噪比及正規化關聯值等做評估的標準並且加以分析與比較。


    The prevailing usage of networks and the huge amount of multimedia data have incurred urgent issues on copyright protection. Digital watermarking techniques have high potential in providing an efficient way to solve this problem. Various watermarking algorithm has been developed in recent years, and it can efficiently identify media ownership, and media legitimate user information.
    In this thesis Least Significant Bit (LSB) based spatial domain technique and Middle band Discrete Cosine Transform (DCT) domain techniques are compared. Both subjective (visual effects) and objective (PSNR) method were used to evaluate the watermarked images when different attacks. The middle band DCT domain algorithm is more robust compared to LSB based technique.

    目次 摘要 I Abstract II 誌謝 III 目次 IV 圖目錄 VI 表目錄 IX 第一章 簡介 1 1.1研究背景 1 1.2研究目的 2 1.3論文架構 2 第二章 浮水印相關技術與文獻探討 3 2.1 數位浮水印的原理與特性 3 2.2 浮水印的安全需求與應用 10 2.3 攻擊的種類 12 2.4 浮水印的強健性評估標準 14 第三章 研究方法 17 3.1 基於離散餘弦轉換之浮水印 17 3.1.1 系統架構 17 3.1.2浮水印嵌入法則 20 3.2 最小位元取代編碼法LSB浮水印嵌入與萃取 26 3.2.1 浮水印嵌入與萃取法則 28 第四章 實驗結果 29 4.1 以離散餘弦轉換進行浮水印的嵌入與萃取 30 4.1.1 嵌入PN Sequence法則的實驗結果 34 4.1.2 基於分佈於中頻區域系數的嵌入法則的實驗結果 37 4.2 LSB浮水印之嵌入與萃取 40 4.3 攻擊實驗 42 4.3.1 高斯雜訊攻擊 42 4.3.2 裁切攻擊 45 4.3.3 Salt & Pepper雜訊攻擊 48 4.3.4 旋轉攻擊 50 4.3.5 縮小放大攻擊 53 4.3.6 對比度攻擊 56 4.3.7 壓縮攻擊 61 4.4 浮水印攻擊比較 64 4.5 實驗數據 65 第五章 結論 68 第六章 參考文獻 69

    [1] V.M. Postdar, S. Han, E. Chang, “A Survey of Digital Image Watermarking Techniques,” IEEE International Conference on Industrial Informatics, Aug. 2005, pp.709-716
    [2] C. Gu, X. Cao, “Research on Information Hiding Technology,” Communications and Networks (CECNet), International Conference on Consumer Electronics, April 2012, pp. 2035-2037
    [3] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information Hiding-A Survey,” Proceedings of the IEEE, Vol. 87, Issue 7, Jul. 1999, pp. 1062-1078
    [4] F. Husain, “A Survey of Digital Watermarking Techniques for Multimedia Data,” MIT International Journal Electronics Communication Engineering, Vol. 2, No.1, Jan. 2012, pp. 37-43
    [5] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, T. Kalker, “Digital Watermarking and Steganography,” Morgan Kaufmann, 2nd Edition, Elsevier Inc., pp. 4-13
    [6] 潘正祥, 張真誠, 林詠章, “挑戰影像處理〔數位浮水印技術〕,”滄海書局
    [7] S. Craver, N. Memon, B.L. Yeo, M. Yeung, “Can Invisible Watermarks Resolve Rightful Ownerships?,” IBM T.J Watson Research Center, Research Report, RC20509, July 1996, pp. 1-21
    [8] M. Chandra, S. Pandey, R. Chaudhary, “Digital Watermarking Technique for Protecting Digital Images,” IEEE International Conference on Computer Science and Information Technology (ICCSIT), 2010, pp. 226-233
    [9] P.H.W Wong, O.C. An, “A Novel Semi-private watermarking technique,” IEEE International Symposium on Circuits and Systems, Vol. 2, May 2002, pp. II-448-II-451
    [10] M. Kutter, F. Petitcolas, “A Fair Benchmark for Image Watermarking Systems,” Proceedings of SPIE conference on Security and Watermaking of Multimedia Contents, Vol. 3657, 1999, pp. 226-239
    [11] P. Jain, S. Rajawat, “Fragile Watermarking for Image Authentication: Survey,” International Journal of Electronics and Computer Science Engineering, Vol. 1, No. 3, 2012, pp. 1232-1237
    [12] S.P. Mohanty, B.K. Bhargava, “Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks,” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), Vol. 5, Issue 2,
    Nov. 2008, pp.1-24
    [13] M.A. Suhail, M.S. Obaidat, “A Robust Digital Watermarking Technique,” IEEE International Conference on Electronics, Vol. 2, 2000, pp.629-632
    [14] P. Singh, R.S. Chadha, “A Survey of Digital Watermarking Techniques, Applications and Attacks,” International Journal of Engineering and Innovative Technology, Vol. 2, Issue 9, March 2013, pp. 165-175
    [15] C. Gu, X.Y. Hu, “Robust Watermarking on Copyright Protection of Digital Originals,” IOP Science, Journal of Physics, Conference Series, Vol. 231, No. 1, 2010, pp. 1-7
    [16] P.R. Reddy, V.N.K Prasad, D.S. Rao, “Robust Digital Watermarking of Color Images under Noise attacks,” International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009, pp.334-338
    [17] Y.D. Chung, C.H. Kim, “Robust Image Watermarking Against Filtering Attacks,” SICE 2003 Annual Conference, Aug. 2003, pp. 4-6
    [18] L. Cai, S. Du, “Robust Digital Watermarking Method Against RST Attacks,” International Conference on Signal Processing and Communications, Dec. 2004, pp. 491-495
    [19] C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L Miller, Y.M. Lui, “Rotation, Scale, and Translation Resilient Watermarking for Images,” IEEE Transactions on Image Processing, Vol. 10, Issue 5, May 2001, pp. 767-782
    [20] A. Boroujerdizadeh, A.R. Ghobadi, A.H. Yaribakht, M.Shahidan Bin Abdoullah, “A Novel Method to Reduce Collusion Attack Possibility on Watermarking,” IEEE International Conference on Advanced Communication Technology (ICACT), Jan. 2013, PP. 1066-1071
    [21] R. Pareek, P.K. Ghosh, “Discrete Cosine Transformation based Image Watermarking for Authentication and Copyright Protection,” International Journal of Engineering and Advanced Technology, Vol. 1, Issue 3, Feb. 2012, pp. 152-156
    [22] M. Barni, C.I. Podilchuk, F. Bartolini, E.J. Delp, “Watermark Embedding: Hiding a Signal within a Cover Image,” IEEE Communications Magazine, Vol. 39, Issue 8, Aug. 2001, pp. 102-108
    [23] I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, Issue 12, Dec. 1997, pp. 1673-1687
    [24] S. Katezenbeisser, Fabien, A.P. Petitcolas, “Information Techniques for Steganography and Digital Watermarking,” Artech Inc., Dec. 1999, pp. 43-75
    [25] G.C.M. Silvestre, W.J. Dowling, “Embedding Data in Digital Images using CDMA Techniques,” IEEE International Conference on Image Processing, Vol. 1, Sep. 2000, pp. 589-592

    [26] R.L. Pickholz, D.L. Schilling, “Theory of Spread-Spectrum Communications-A Tutorial,” IEEE Transaction on Communications, Vol. 30, No. 5, May 1982, pp. 855-884
    [27] R. Chaturvedi, A. Sharma, N. Hemrajani, D. Goyal, “Analysis of Robust Watermarking Technique Using Mid Band DCT Domain for Different Image Formats,” International Journal of Scientific and Research Publications, Vol. 2, No. 3, March 2012, pp. 1-4
    [28] A. Singh, S. Jain, A. Jain, “Digital Watermarking Method Using Replacement of Second Least Significant Bit (LSB) with Inverse of LSB,” International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 2, Feb. 2013, pp. 121-124
    [29] S. Kaengin, S. Airphaiboon, S. Pathoumvanh, “New Technique for Embedding Watermark Image into an Audio Signal,” IEEE International Symposium on Communications and Information Technology, Sep.2009, pp. 29-32
    [30] J.M. Guo, T. Kao, Y.F. Liu, J.T. Wang, “Alteration Detection and Recovery for Medical and Surveillance Systems,” IEEE International Conference on Machine Learning and Cybernetics (ICMLC), Vol. 6, July 2010, pp. 3021-3025

    QR CODE