簡易檢索 / 詳目顯示

研究生: 陳尚航
Chang-Hang Chen
論文名稱: 參照於眼睛位置之數位浮水印對臉部影像遭竄改之偵測
Graft Detection in Facial Images with Digital Watermarking According to Eye Location
指導教授: 賴坤財
Kuen-Tsair Lay
口試委員: 廖弘源
Hung-Yuan Liao
方文賢
Wen-Hsien Fang
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2005
畢業學年度: 93
語文別: 中文
論文頁數: 72
中文關鍵詞: 數位浮水印人臉偵測人眼偵測展頻
外文關鍵詞: spread spectrum, eyes detection, face detection, digital watermark
相關次數: 點閱:235下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,由於數位時代的來臨,數位資料廣泛的透過網際網路快速散播到世界各地,因此任何人可以輕易取得數位資料並大量複製與修改,數位資料之智慧財產權的問題日趨重要。因此,如何有效保護有價媒體自然成為目前重要的研究議題,而數位浮水印即是解決此一問題的重要技術之一。尤其是在臉部影像的移花接木方面,讓現今的人們感到恐懼及不安,本篇論文將著重於利用數位浮水印技術對影像內容做移花接木驗證。
    本論文提出一種具有移花接木驗證之數位浮水印技術,它能夠正確驗證出數位影像是否有被移花接木。首先我們會先利用人臉偵測及眼球偵測技術,將數位影像的眼球中心位置求出,根據眼球位置設計出內部浮水印的視窗大小,再將格子編碼的描述(trellis code description)利用內部浮水印技術(inner watermarking technique)作展頻植入。然後再將一序列的浮水印位元,將浮水印經過格子編碼(trellis encode),再將編碼後的浮水印利用外部浮水印技術(outer watermarking technique)作植入。我們再根據萃取出來的浮水印經過格子解碼(trellis decode),產生出來的累加路徑計算值(cumulative path metric),由它來做一個依據,大於所設定的臨界值,就會驗證到此數位影像遭到移花接木。實驗結果証明我們所提出的方法可以檢查出數位影像是否有遭到移花接木。


    In this digital age, digital information is broadly transferred via internet. Digital information can be co pied or modified in large quantities. Copyright issues have grown more and more important. Thus, how to protect the valuable media effectively becomes a crucial theme for researching. Digital watermarking is one of major techniques to solve this problem. In this thesis ,we want to fight grafting in facial images by watermarking.
    We present a digital watermarking scheme that checks graft authentication for facial images. This scheme involves two stages of watermarking to which we refer an inner watermarking and outer watermarking. First we use face detection and eyes detection to find eye- center locations in a digital image. According to eyes location ,we choose window size of the inner watermark. We use the spectrum spreading inner watermarking to embed the description of a trellis encoder. A sequence of watermark bits that carry useful side information are then embedded into the whole area of the original image by trellis encoding. This stage is called the outer watermarking. Then we perform the extraction of outer watermark by trellis decoding. After that, the cumulative path metric is obtained. If it is greater than the threshold value, we decide that the digital image had been grafted. The result demonstrates that our method can distinguish between grafted and ungrafted images.

    第一章 緒論...............................................1 1.1 前言..........................................1 1.2 數位浮水印簡介................................1 1.3 研究動機......................................3 1.4 論文摘要......................................4 第二章 相關技術介紹.......................................5 2.1 人臉偵測.......................................5 2.1.1 人臉偵測之困難處..........................5 2.1.2 人臉偵測之應用............................6 2.1.3 人臉偵測之方法............................6 2.2 眼睛追蹤.......................................8 2.2.1 眼睛追蹤之應用............................8 2.2.2 眼睛追蹤之方法............................9 2.3 小波理論......................................12 2.3.1 連續小波轉換.............................12 2.3.2 離散小波轉換.............................13 2.4 通道編碼......................................14 2.4.1 迴旋碼...................................15 2.4.2 Viterbi 演算法...........................16 第三章 系統架構..........................................20 3.1 人臉偵測......................................20 3.1.1 顏色分割.................................21 3.1.2 去除雜訊.................................24 3.1.3 搜尋人臉區域.............................25 3.1.4 邊緣偵測.................................27 3.1.5 橢圓偵測.................................29 3.2 人眼追蹤......................................31 3.2.1 人臉分析.................................32 3.2.2 人眼遮罩.................................34 3.2.3 可變型樣版法.............................36 3.3 植入數位浮水印................................41 3.3.1 正交碼...................................42 3.3.2 外植入...................................44 3.3.3 內植入...................................47 3.4 萃取數位浮水印................................49 3.4.1 內萃取...................................50 3.4.2 外萃取...................................52 3.4.3 偵測人臉是否被竄改.......................53 第四章 實驗結果與討論....................................55 4.1 系統初始條件..................................55 4.2 數位浮水印影像經過竄改........................56 4.3 數位浮水印對抗攻擊之能力......................59 4.4 偵測竄改之討論................................66 第五章 結論與未來研究方向................................68 參考文獻..........................................70

    [1] Pei-Min Chen, “A Visible Watermarking Mechanism Using a Statistic Approach,” Proc. IEEE Int. Conf. Signal Processing, Vol.2,pp.910-913,Aug. 2000

    [2] Shih-Hao Wang,Yuan-Pei Lin, “Blind Watermarking Using Wavelet Tree Quantization,” Proc. IEEE Int. Conf. Multimedia and Expo, Vol.1,pp. 589 – 592,Aug. 2002

    [3] J.Herrera-Joancomarti,J.Minguillon,and D.Megias, “A Family of Image Watermarking Schemes Based on Lossy Compression,” Proc. IEEE Int. Conf. Information Technology: Coding and Computing, pp.559-563 ,April 2003

    [4] B.Chen,G.W.Wornell,“Achievable Performance of Digital Watermarking Systems,” Proc. IEEE Int. Conf. Multimedia Computing and Systems, Vol1,pp.13-18,June. 1999.

    [5] Kwang-Fu Li,Tung-Shou Chen,and Seng-Cheng Wu, “Image Tamper Detection and Recovery System Based on Discrete Wavelet Transformation,” Proc. IEEE Int. Conf. Multimedia Computing and Systems, Vol.1,pp.164-167,Aug.2001.

    [6] Yazhou Lin,Wen Gao,Hongxun Yao,and Shaohui Lin, “A Texture-Based Tamper Detection Scheme by Fragile Watermark,” Proc. IEEE Int. Symp. Circuits and Systems, Vol.2,pp.177-180,May 2004.

    [7] W.B.Pennebaker,K.L.Mitchell, JPEG Still Image Data Compression Standard, Van Nostrand Reinhold, 1992.

    [8] Wei Fang ,Li Pengfei, “A Novel Face Segmentation Algorithm,” Proc. IEEE Pacific Rim Conf. Info-tech and Info-net, Vol.3,pp.550-556,Nov. 2001

    [9] A.Albiol,L.Torres,and E.J.Delp, “An Unsupervised Color Image Segmentation Algorithm for Face Detection Applications,” Proc. IEEE Int. Conf. Image Processing, Vol.2,pp.681-684,Oct.2001.

    [10] A.L.Yuille,D.S.Cohen,and P.W.Hallinan, “Feature Extraction from Faces Using Deformable Template,” Proc. IEEE Computer Soc. Conf. Computer Vision and Pattern Recognition, pp. 104-109. Washington,DC.1989

    [11] D.S.Taubman,M.W.Marcellin, JPEG2000: Image Compression Fundamentals, Standards, and Practice, Kluwer Academic Publishers, 2002.

    [12] M.S.Lew,“Information Theoretic View-Based and Modular Face Detection,” Proc. Second Int. Conf. Automatic Face and Gesture Recognition, pp.198-203,Oct.1996.

    [13] S.A.Georghiades , D.J.Kriegman ,and P.N.Belhurneur, “Illumination Cones for Recognition under Variable Lighting:Faces,” Proc. IEEE Computer Soc. Conf. Computer Vision and Pattern Recognition, pp.52-58,June 1998.

    [14] A.E.Kaufman,A.Bandopadhay,and B.D.Shaviv,“An Eye Tracking Computer User Interface,” Proc. IEEE Int. Symp. Virtual Reality, pp.120-121,Oct.1993.

    [15] H.Kasper,B.J.M.Hess, “Magnetic Search Coil System for Linear Detection of Three-Dimensional Angular Movements,” Proc. IEEE Trans. Biomedical Engineering,Vol.466-475,May 1991.

    [16] R.C.Gonzalez,R. E. Woods, Digital Image Processing, ed., Prentice Hall, 1987.

    [17] N.S.Jayant, Digital coding of waveform, Prentice Hall, 1984.

    [18] G.D.Forney,Jr. , “The Viterbi algorithm,” Proc. IEEE, Vol. 61, pp. 268-278, Mar. 1993.

    [19] L. F. Wei, “Trellis-coded modulation with multidimensional constellation,” Proc. IEEE Trans. Information Theory, Vol. 33, pp, 483-501, Jul. 1987.

    [20] 孫正忠,“基於格架式編碼之安全性展頻浮水印”國立台灣科技大學,電子工程研究所,碩士學位論文,2003.

    [21] 黃量加,“利用正交展頻碼於小波轉換域之數位浮水印”國立台灣科技大學,電子工程研究所,碩士學位論文,2004.

    無法下載圖示 全文公開日期 2006/07/21 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 2006/08/01 (國家圖書館:臺灣博碩士論文系統)
    QR CODE