研究生: |
陳尚航 Chang-Hang Chen |
---|---|
論文名稱: |
參照於眼睛位置之數位浮水印對臉部影像遭竄改之偵測 Graft Detection in Facial Images with Digital Watermarking According to Eye Location |
指導教授: |
賴坤財
Kuen-Tsair Lay |
口試委員: |
廖弘源
Hung-Yuan Liao 方文賢 Wen-Hsien Fang |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 電子工程系 Department of Electronic and Computer Engineering |
論文出版年: | 2005 |
畢業學年度: | 93 |
語文別: | 中文 |
論文頁數: | 72 |
中文關鍵詞: | 數位浮水印 、人臉偵測 、人眼偵測 、展頻 |
外文關鍵詞: | spread spectrum, eyes detection, face detection, digital watermark |
相關次數: | 點閱:235 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,由於數位時代的來臨,數位資料廣泛的透過網際網路快速散播到世界各地,因此任何人可以輕易取得數位資料並大量複製與修改,數位資料之智慧財產權的問題日趨重要。因此,如何有效保護有價媒體自然成為目前重要的研究議題,而數位浮水印即是解決此一問題的重要技術之一。尤其是在臉部影像的移花接木方面,讓現今的人們感到恐懼及不安,本篇論文將著重於利用數位浮水印技術對影像內容做移花接木驗證。
本論文提出一種具有移花接木驗證之數位浮水印技術,它能夠正確驗證出數位影像是否有被移花接木。首先我們會先利用人臉偵測及眼球偵測技術,將數位影像的眼球中心位置求出,根據眼球位置設計出內部浮水印的視窗大小,再將格子編碼的描述(trellis code description)利用內部浮水印技術(inner watermarking technique)作展頻植入。然後再將一序列的浮水印位元,將浮水印經過格子編碼(trellis encode),再將編碼後的浮水印利用外部浮水印技術(outer watermarking technique)作植入。我們再根據萃取出來的浮水印經過格子解碼(trellis decode),產生出來的累加路徑計算值(cumulative path metric),由它來做一個依據,大於所設定的臨界值,就會驗證到此數位影像遭到移花接木。實驗結果証明我們所提出的方法可以檢查出數位影像是否有遭到移花接木。
In this digital age, digital information is broadly transferred via internet. Digital information can be co pied or modified in large quantities. Copyright issues have grown more and more important. Thus, how to protect the valuable media effectively becomes a crucial theme for researching. Digital watermarking is one of major techniques to solve this problem. In this thesis ,we want to fight grafting in facial images by watermarking.
We present a digital watermarking scheme that checks graft authentication for facial images. This scheme involves two stages of watermarking to which we refer an inner watermarking and outer watermarking. First we use face detection and eyes detection to find eye- center locations in a digital image. According to eyes location ,we choose window size of the inner watermark. We use the spectrum spreading inner watermarking to embed the description of a trellis encoder. A sequence of watermark bits that carry useful side information are then embedded into the whole area of the original image by trellis encoding. This stage is called the outer watermarking. Then we perform the extraction of outer watermark by trellis decoding. After that, the cumulative path metric is obtained. If it is greater than the threshold value, we decide that the digital image had been grafted. The result demonstrates that our method can distinguish between grafted and ungrafted images.
[1] Pei-Min Chen, “A Visible Watermarking Mechanism Using a Statistic Approach,” Proc. IEEE Int. Conf. Signal Processing, Vol.2,pp.910-913,Aug. 2000
[2] Shih-Hao Wang,Yuan-Pei Lin, “Blind Watermarking Using Wavelet Tree Quantization,” Proc. IEEE Int. Conf. Multimedia and Expo, Vol.1,pp. 589 – 592,Aug. 2002
[3] J.Herrera-Joancomarti,J.Minguillon,and D.Megias, “A Family of Image Watermarking Schemes Based on Lossy Compression,” Proc. IEEE Int. Conf. Information Technology: Coding and Computing, pp.559-563 ,April 2003
[4] B.Chen,G.W.Wornell,“Achievable Performance of Digital Watermarking Systems,” Proc. IEEE Int. Conf. Multimedia Computing and Systems, Vol1,pp.13-18,June. 1999.
[5] Kwang-Fu Li,Tung-Shou Chen,and Seng-Cheng Wu, “Image Tamper Detection and Recovery System Based on Discrete Wavelet Transformation,” Proc. IEEE Int. Conf. Multimedia Computing and Systems, Vol.1,pp.164-167,Aug.2001.
[6] Yazhou Lin,Wen Gao,Hongxun Yao,and Shaohui Lin, “A Texture-Based Tamper Detection Scheme by Fragile Watermark,” Proc. IEEE Int. Symp. Circuits and Systems, Vol.2,pp.177-180,May 2004.
[7] W.B.Pennebaker,K.L.Mitchell, JPEG Still Image Data Compression Standard, Van Nostrand Reinhold, 1992.
[8] Wei Fang ,Li Pengfei, “A Novel Face Segmentation Algorithm,” Proc. IEEE Pacific Rim Conf. Info-tech and Info-net, Vol.3,pp.550-556,Nov. 2001
[9] A.Albiol,L.Torres,and E.J.Delp, “An Unsupervised Color Image Segmentation Algorithm for Face Detection Applications,” Proc. IEEE Int. Conf. Image Processing, Vol.2,pp.681-684,Oct.2001.
[10] A.L.Yuille,D.S.Cohen,and P.W.Hallinan, “Feature Extraction from Faces Using Deformable Template,” Proc. IEEE Computer Soc. Conf. Computer Vision and Pattern Recognition, pp. 104-109. Washington,DC.1989
[11] D.S.Taubman,M.W.Marcellin, JPEG2000: Image Compression Fundamentals, Standards, and Practice, Kluwer Academic Publishers, 2002.
[12] M.S.Lew,“Information Theoretic View-Based and Modular Face Detection,” Proc. Second Int. Conf. Automatic Face and Gesture Recognition, pp.198-203,Oct.1996.
[13] S.A.Georghiades , D.J.Kriegman ,and P.N.Belhurneur, “Illumination Cones for Recognition under Variable Lighting:Faces,” Proc. IEEE Computer Soc. Conf. Computer Vision and Pattern Recognition, pp.52-58,June 1998.
[14] A.E.Kaufman,A.Bandopadhay,and B.D.Shaviv,“An Eye Tracking Computer User Interface,” Proc. IEEE Int. Symp. Virtual Reality, pp.120-121,Oct.1993.
[15] H.Kasper,B.J.M.Hess, “Magnetic Search Coil System for Linear Detection of Three-Dimensional Angular Movements,” Proc. IEEE Trans. Biomedical Engineering,Vol.466-475,May 1991.
[16] R.C.Gonzalez,R. E. Woods, Digital Image Processing, ed., Prentice Hall, 1987.
[17] N.S.Jayant, Digital coding of waveform, Prentice Hall, 1984.
[18] G.D.Forney,Jr. , “The Viterbi algorithm,” Proc. IEEE, Vol. 61, pp. 268-278, Mar. 1993.
[19] L. F. Wei, “Trellis-coded modulation with multidimensional constellation,” Proc. IEEE Trans. Information Theory, Vol. 33, pp, 483-501, Jul. 1987.
[20] 孫正忠,“基於格架式編碼之安全性展頻浮水印”國立台灣科技大學,電子工程研究所,碩士學位論文,2003.
[21] 黃量加,“利用正交展頻碼於小波轉換域之數位浮水印”國立台灣科技大學,電子工程研究所,碩士學位論文,2004.