簡易檢索 / 詳目顯示

研究生: 陳勇成
Yong-cheng Chen
論文名稱: 具竄改偵測與回復之影像浮水印技術
An Image Watermarking Technique with Tamper Detection and Recovery
指導教授: 郭景明
Jing-Ming Guo
口試委員: 丁建均
Jian-Jiun Ding
阮聖彰 
Shanq-Jang Ruan
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 80
中文關鍵詞: 浮水印離散餘弦轉換竄改偵測竄改還原
外文關鍵詞: Watermark, Discrete Cosine Transform, Tamper detection, Tamper restoration
相關次數: 點閱:222下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著科技不斷地發展,近年來在數位影像處理技術已提出了許多相關的新理論及新的演算法,人類也越來越重視數位影像的發展,為了滿足科技發展上的需求,影像處理技術就顯得相當重要。
    最近幾年,網路的發展與數位科技的成長越來越快。然而,數位多媒體資訊在網際網路中很容易被竄改或破壞,所以智慧財產權的保護也相形的更為重要。就目前的發展來說,很多研究提出影像認證的方法,如強健型浮水印、易碎型浮水印、半易碎型浮水印以及竄改偵測與回復的技術。目前有的影像認證研究都只能取出數位浮水印或是偵測與回復被竄改的區域,而無法兼具兩者的功能。然而這些方法都沒有辦法對影像提供真正完整的保護。基於這個原因,我們提出一個新的思維:不只能夠把遭竄改的區域準確的偵測並回復它,並且藏入數位浮水印來當作認證用,還能夠抵抗一些基本的攻擊。
    在這篇論文中,我們提出一個具有竄改偵測與回復功能之影像浮水印技術。主要的目標是能夠準確的偵測及回復被竄改的區域,除此之外,亦具有某種程度的強健型數位浮水印功能,能夠抵抗裁切攻擊。
    影像中加入適當的浮水印技術,則可有效防止遭遇有心人士的竄改,保護影像的原始性及完整性,將可提供多功能的保全機制,特性如下四點:

    a.無法察覺性:
    最重要的條件就是浮水印在視覺上的透明性。經由浮水印過程而做成的「加工品」,不但令人反感、不討人喜歡,而且還可能降低或毀壞了已錄製資料的價值。因此如何在不超越可察覺門檻的限制下,設計出利用人類視覺系統的效果來嵌入浮水印的方法,就顯得非常重要,可在嵌入浮水印後不被察覺。

    b.惡意竄改的脆弱性:
    任何企圖惡意竄改資料的行為應該能夠被偵測出來。惡意攻擊之後,嵌入的浮水印應該變得無法被偵測出來,因此一旦影像裡無法偵測到浮水印時,我們就可以推斷資料可能已經被修改過了。

    c.竄改部分的局部限制性:
    可辨識出已被竄改的範圍,已確認資料的其餘部分未遭改變。

    d.原始影像之還原性:
    可提供遭到修改後之資料部分獲得大致上的還原,以鑑別原始資料內容。

    從各種測試數據證明,我們所提出的想法的確是一個兼具某種強健型浮水印功能的影像竄改偵測與回復技術。


    As the science and technology develop constantly in recent years, many related new theories and algorithms have been proposed in the digital image processing technique. It raises more and more attention in the development of the digital image. To meet the demand of technical development, the technique of image processing appears important.
    Recently, the Internet grows rapidly. Digital multimedia information can easily be manipulated and tampered intentionally. So the intellectual property protection becomes more and more important. On the current development, there are many research proposed for watermarking, such as robust watermarking, fragile watermarking, semi-fragile watermarking, and tamper detection with recovery technique. The current image authentication researches are mostly extract watermarking or tamper detection and recovery, few of them are focusing on both of these two techniques. However, one of these techniques could not complete protect the image. Due to this reason, we propose a novel technique, not only can detect but also recover the tampering region. Embedding a digital watermark as authentication and also resists some basic attacks.
    In this thesis, an image watermarking scheme with tamper detection and recovery is proposed. The main goal is to detect and recover the tampered region accurately. In addition, the proposed method is robust to against the cropping attack.
    Embedding the suitable watermark in images can effectively prevent the malicious tampering to protect the primitive and integrity of the image. This can also provide the multi-purpose security service, the characteristics are as follows:

    a) Undetectable:
    The transparency of the embedded watermark in human vision is the most important issue. By embedding watermark, the “artifact” not only ill-flavored, but also possibly reduce or destroy the evaluation of the transcribed information. Therefore, how to design the embedding watermark method by utilizing the human visual system under the just noticeable threshold become extremely important, which cannot be detectable after watermark embedding.

    b) Fragile for malicious alteration:
    Any attempts to tamper data should be detected. After malicious attacks, the embedded watermark should become unable to detect, once the watermark is undetectable in the image, we may infer that the data are possibly revised.

    c) Tamper regions restriction:
    It can identify the tamper region, and confirm the other regions of the data that are not altered.

    d) Recovery of the original image:
    It can provide rough restoration for tampered data to identify the original data content.

    As documented in the simulation results, the proposed method is robust to against attacks and is able to detect tampering. Moreover, the recovery ability is one of the feature of the propose method.

    中文摘要....................................................i 英文摘要..................................................iii 誌謝........................................................v 目錄.......................................................vi 圖表索引.................................................viii 第一章 緒論.................................................1 1.1 背景說明與動機..........................................1 1.2 研究目的................................................2 1.3 內容大綱................................................2 第二章 浮水印技術之相關文獻探討.............................4 2.1 前言....................................................4 2.1.1 數位浮水印的目的......................................4 2.1.2 數位浮水印的特性......................................4 2.1.3 數位浮水印的能力......................................6 2.1.4 數位影像浮水印的隱藏區域及相關文獻....................6 2.2 浮水印相關攻擊..........................................9 2.3 影像還原................................................9 2.3.1 影像還原的目的.......................................10 2.3.2 影像竄改與還原的方法.................................10 2.4 數位浮水印的用途.......................................11 2.5 浮水印的認證方式.......................................12 2.5.1 統計方法.............................................12 2.5.2 像訊號雜訊比.........................................13 2.5.3 浮水印正確的解碼率...................................13 第三章 數位半色調技術......................................14 3.1 前言...................................................14 3.2 有序抖動法.............................................14 3.2.1 群聚有序抖動法.......................................16 3.2.2 散置有序抖動法.......................................17 3.3 誤差擴散法.............................................19 3.4 直接二元搜尋...........................................20 3.5 半色調回復技術.........................................23 第四章 數位浮水印及具有效偵測攻擊與回復影像之技術..........24 4.1 空間域技術的探討.......................................24 4.2 數位浮水印演算法的探討.................................25 4.2.1 色彩轉換模式.........................................25 4.2.2 頻率域之數位浮水印技術的探討.........................26 4.2.3 數位浮水印型態—隨機亂數.............................28 4.2.4 數位浮水印型態—灰階影像.............................29 4.3 數位浮水印及偵測攻擊與回復影像之流程圖.................30 4.3.1 數位浮水印的藏匿步驟.................................30 4.3.2 數位浮水印萃取步驟並且偵測裁切攻擊與回復.............34 第五章 實驗結果分析與討論..................................37 5.1 實驗條件...............................................37 5.2 實驗內容、結果與討論...................................38 5.2.1 實驗一...............................................38 5.2.2 實驗二...............................................52 5.2.3 實驗三...............................................53 5.2.4 實驗四...............................................61 第六章 結論與建議..........................................74 參考文獻...................................................75 作者簡介...................................................80

    [1] R. Schyndel, A. Trikel, and C. Osborne, “A digital watermark,” Proc. IEEE. Int. Conf. Image Processing, vol. 2, pp. 86-90, 1994.
    [2] N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 4, pp. 2168-2171, May 1996.
    [3] I. Pitas, “A method for signature casting on digital images,” Proc. IEEE. Int. Conf. Image Processing, vol. 3, pp. 215-218, 1996.
    [4] R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” Proc. IEEE. Int. Conf. Image Processing, vol. 3, pp. 219-222, 1996.
    [5] W. Bender, D. Gruhl, and N. Morimoto, “Techniques for data hiding,” Tech. Rep., MIT Media Lab, 1994.
    [6] G. Voyatzis and I. Pitas, “Chaotic watermarks for embedding in the spatial digital image domain,”Proc. IEEE. Int. Conf. Image Processing, vol. 2, pp.432-436, 1998.
    [7] G. Voyatzis and I. Pitas, “Application of toral automorphism in image watermarking,”Proc. IEEE. Int. Conf. Image Processing, vol. 1, pp. 237-240, 1996.
    [8] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
    [9] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for Images, Audio and Video,” Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 243-246, 1996.
    [10] M. D. Swanson, B. Zhu, and A. H. Tewfik, “Transparent robust image watermarking,” Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 219-222, Sept. 1996.
    [11] C. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models, ” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525-539, May 1998.
    [12] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Trans. Image Processing, vol. 8, pp. 58-68, Jan. 1999.
    [13] C. T. Hsu and J. L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. Circuits and Systems II : Analog and Digital Signal Processing. vol. 45, pp. 1097-1101, Aug 1998.
    [14] D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” Proc. IEEE Int. Conf. Image Processing, vol. 1, pp. 544-547, 1997.
    [15] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking technique: limitations, attacks, and implications,” IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 573-586, May 1998.
    [16] W. Zeng and B. Liu, “A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images,” IEEE Trans. Image Processing, vol. 8, pp. 1534-1548, Nov. 1999.
    [17] J. Lee and C. S. Won, “A watermarking sequence using parities of error control coding for image authentication and correction,” IEEE Trans. Consumer Electronics, vol. 46, pp. 313-317, May 2000.
    [18] X. Niu, S. Sun, and W. Xiang, “Multiresolution watermarking for video based on gray-level digital watermark,” IEEE Trans. Consumer Electronics, vol. 46, pp. 375-384, May 2000.
    [19] J. S. Cho, S. W. Shin, W. H. Lee, J. W. Kim, and J. U. Choi, “Enhancement of robustness of image watermarks embedding into colored image, based on WT and DCT,” Proc. IEEE Int. Conf. Information Technology: Coding and Computing, pp. 483-488, March 2000.
    [20] A. Piva, F. Bartolinin, V. Cappellini, and M. Barni, “Exploiting the cross-correlation of RGB-channels for robust watermarking of color images,” Proc. IEEE Int. Conf. Image Processing, vol. 1, pp. 306-310, Oct. 1999.
    [21] J. K. Joseph, O. Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” Proc. IEEE Int. Conf. Image Processing, vol. 1, pp. 536-539, 1997.
    [22] V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” Proc. IEEE Int. Conf. Acoustics, Speech, and Signal, vol. 6, pp. 3469-3472,1999.
    [23] F. Hartung and M. Kutter, “Multimedia watermarking techniques,”Proc. IEEE, vol. 87, pp. 1079-1107, July 1999.
    [24] A. Herrigel, H. Perersen, J.Q Ruanaidh, T.Pun, and P. Shelby, “Copyright technigues for digital images based on asymmertric cryptograghic technigues,” Proc. Workshop on Information Hiding, Portland, Oregon, USA, Apr. 1998.
    [25] Walton, S. (1995), ” Image Authentication for a Slippery New Age,” Dr. Dobb's Journal, Vol. 20, pp. 18-26.
    [26] Schneider, M. and Chang, S.-F. (1996), “A Robust Content Based Digital Signature for Image Authentication,” Proc. IEEE Int. Conf. Image Processing, pp. 227-230.
    [27] Nasir Memon, and Ping Wah ong, “Protecting Digital Media Content”, Commun. of the ACM, vol. 41, pp. 35-43, July 1998.
    [28] 盧毓隆(2001),「結合視覺特性以及多域水紋浮水印技術之靜態畫像保護研究」,碩士論文,淡江大學電機工程研究所。
    [29] Wu, M. and Liu, B. (1998), “Watermarking for Image Authentication,” IEEE International Conference on Image Processing, Vol. 2, pp. 437-441.
    [30] Yang, C. K. and Tsai, W. H. (1996), “Improving Block Truncation Coding by Line and Edge Information and Adaptive Bit Plane Selection for Gray-Scale Image Compression,” Pattern Recognition, Letters 16, pp.67-75.
    [31] Pan, H. K., Chen, Y. Y., and Tseng, Y. C. (2000), “A Secure Data Hiding Scheme for Two-Color Images,” IEEE ISCC 2000, pp. 750-755.
    [32] 張真誠、陳同孝、黃國峰(2000),電子影像技術,松崗電腦圖書資料股份有限公司,台北。
    [33] H. R. Kang, “Digital Color Halftoning,” SPIE Optical Engineering Press, 1999.
    [34] M. Hepher, “A comparison of ruled and vignetted screens,” Penrose Annual, Vol, 47,pp. 166-177, 1953.
    [35] R. W. Floyd and L. Steinberf, “An adaptive algorithm for spatial gray scale”, in proc. SID 75 Digest. Society for information Display, pp. 36-37,1975.
    [36] R. Ulichney, “Digital Halftoning”, Cambridge, MA. MIT Press,1987.
    [37] Mostafa Analoui & Jan P. Allebach, “Model Based Halftoning Using Direct Binary Search”, Human Vision, Visual Processing, and Digital Display III, Proc. SPIE, vol. 1666, pp. 96-108, 1992.
    [38] J. P. Allebach, T. J. Flohr, D. P.Hilgenberg, C. B. Atkins, and C. A. Bouman,“Model-Based Halftoning via Direct Binary Search”, Recent Progress in Digital Halftoning, Reprinted from IS&T Proceedings, pp. 50-56, 1994.
    [39] T. N. Pappas and D. L. Neuhoff, “Least-Squares Model-based halftoning”,Human Vision, Visual Processing, and Digital Display III, Proc. SPIE, vol. 1666,pp. 165~p176, 1992.
    [40] Lin, C.-Y., and Chang, S.-F., “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Transactions on Circuits and Systems of Video Technology, Vol. 11, No. 2, pp.153-168, Feb., 2001.
    [41] 陳同孝、張真誠、黃國峰,數位影像處理技術,旗標出版股份有限公司,台北,2003。
    [42] 呂博文,「應用向量量化來防護數位影像的被竄改」,國立中正大學,資訊工程研究所 碩士論文 (2001)。
    [43] 陳同孝、張家銘、陳彥圖,「以邊緣為特徵值之影像竄改偵測與還原系統」,第十二屆全國資料安全會議,國立台中技術學院,資訊管理系 (2002)。

    QR CODE