研究生: |
賴俊智 Chun-Chih Lai |
---|---|
論文名稱: |
數位浮水印強健性之分析與比較 Analysis and Comparison in the Robustness of Digital Watermarking Algorithm |
指導教授: |
林昌鴻
Chang Hong Lin |
口試委員: |
陳維美
Wei-Mei Chen 吳晉賢 Chin-Hsien Wu 許孟超 Mon-Chau Shie 林昌鴻 Chang Hong Lin |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 電子工程系 Department of Electronic and Computer Engineering |
論文出版年: | 2013 |
畢業學年度: | 101 |
語文別: | 中文 |
論文頁數: | 85 |
中文關鍵詞: | 數位浮水印 、強健性 、空間域 、頻率域 、離散餘弦 、最小位元取代編碼 、尖峰訊噪比 、正規化關聯值 |
外文關鍵詞: | digital watermark, robustness, spatial domain, frequency domain, DCT, LSB, PSNR, NC |
相關次數: | 點閱:461 下載:11 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
資訊科技發展至今,網際網路(Internet)已成為絕佳的資訊交流媒介。許多的個人著作及資訊也因為數位化而能夠在網路上流通,但是,也因此而容易遭受到非法的複製、盜用和散佈而衍生出智慧財產權的問題,數位浮水印便是用來解決此一問題的有效技術之一。數位浮水印的技術發展至今已經多年的歷史了,而許多的文獻在數位浮水印的強健性上也有所探討。而這些相關技術的提出,其目的都是為了使數位資料可以獲得更好的保護。
因此,本論文將分別以兩篇有關空間域與頻率域的數位浮水印技術的強健性做一個探討與研究。首先,以離散餘弦與最小位元取代編碼法(LSB)為基礎的浮水印來探討。接著,以MATLAB做為實驗的平台並且將這些浮水的演算法一一實現。最後,再將獲得的實驗數據以尖峰訊噪比及正規化關聯值等做評估的標準並且加以分析與比較。
The prevailing usage of networks and the huge amount of multimedia data have incurred urgent issues on copyright protection. Digital watermarking techniques have high potential in providing an efficient way to solve this problem. Various watermarking algorithm has been developed in recent years, and it can efficiently identify media ownership, and media legitimate user information.
In this thesis Least Significant Bit (LSB) based spatial domain technique and Middle band Discrete Cosine Transform (DCT) domain techniques are compared. Both subjective (visual effects) and objective (PSNR) method were used to evaluate the watermarked images when different attacks. The middle band DCT domain algorithm is more robust compared to LSB based technique.
[1] V.M. Postdar, S. Han, E. Chang, “A Survey of Digital Image Watermarking Techniques,” IEEE International Conference on Industrial Informatics, Aug. 2005, pp.709-716
[2] C. Gu, X. Cao, “Research on Information Hiding Technology,” Communications and Networks (CECNet), International Conference on Consumer Electronics, April 2012, pp. 2035-2037
[3] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information Hiding-A Survey,” Proceedings of the IEEE, Vol. 87, Issue 7, Jul. 1999, pp. 1062-1078
[4] F. Husain, “A Survey of Digital Watermarking Techniques for Multimedia Data,” MIT International Journal Electronics Communication Engineering, Vol. 2, No.1, Jan. 2012, pp. 37-43
[5] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, T. Kalker, “Digital Watermarking and Steganography,” Morgan Kaufmann, 2nd Edition, Elsevier Inc., pp. 4-13
[6] 潘正祥, 張真誠, 林詠章, “挑戰影像處理〔數位浮水印技術〕,”滄海書局
[7] S. Craver, N. Memon, B.L. Yeo, M. Yeung, “Can Invisible Watermarks Resolve Rightful Ownerships?,” IBM T.J Watson Research Center, Research Report, RC20509, July 1996, pp. 1-21
[8] M. Chandra, S. Pandey, R. Chaudhary, “Digital Watermarking Technique for Protecting Digital Images,” IEEE International Conference on Computer Science and Information Technology (ICCSIT), 2010, pp. 226-233
[9] P.H.W Wong, O.C. An, “A Novel Semi-private watermarking technique,” IEEE International Symposium on Circuits and Systems, Vol. 2, May 2002, pp. II-448-II-451
[10] M. Kutter, F. Petitcolas, “A Fair Benchmark for Image Watermarking Systems,” Proceedings of SPIE conference on Security and Watermaking of Multimedia Contents, Vol. 3657, 1999, pp. 226-239
[11] P. Jain, S. Rajawat, “Fragile Watermarking for Image Authentication: Survey,” International Journal of Electronics and Computer Science Engineering, Vol. 1, No. 3, 2012, pp. 1232-1237
[12] S.P. Mohanty, B.K. Bhargava, “Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks,” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), Vol. 5, Issue 2,
Nov. 2008, pp.1-24
[13] M.A. Suhail, M.S. Obaidat, “A Robust Digital Watermarking Technique,” IEEE International Conference on Electronics, Vol. 2, 2000, pp.629-632
[14] P. Singh, R.S. Chadha, “A Survey of Digital Watermarking Techniques, Applications and Attacks,” International Journal of Engineering and Innovative Technology, Vol. 2, Issue 9, March 2013, pp. 165-175
[15] C. Gu, X.Y. Hu, “Robust Watermarking on Copyright Protection of Digital Originals,” IOP Science, Journal of Physics, Conference Series, Vol. 231, No. 1, 2010, pp. 1-7
[16] P.R. Reddy, V.N.K Prasad, D.S. Rao, “Robust Digital Watermarking of Color Images under Noise attacks,” International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009, pp.334-338
[17] Y.D. Chung, C.H. Kim, “Robust Image Watermarking Against Filtering Attacks,” SICE 2003 Annual Conference, Aug. 2003, pp. 4-6
[18] L. Cai, S. Du, “Robust Digital Watermarking Method Against RST Attacks,” International Conference on Signal Processing and Communications, Dec. 2004, pp. 491-495
[19] C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L Miller, Y.M. Lui, “Rotation, Scale, and Translation Resilient Watermarking for Images,” IEEE Transactions on Image Processing, Vol. 10, Issue 5, May 2001, pp. 767-782
[20] A. Boroujerdizadeh, A.R. Ghobadi, A.H. Yaribakht, M.Shahidan Bin Abdoullah, “A Novel Method to Reduce Collusion Attack Possibility on Watermarking,” IEEE International Conference on Advanced Communication Technology (ICACT), Jan. 2013, PP. 1066-1071
[21] R. Pareek, P.K. Ghosh, “Discrete Cosine Transformation based Image Watermarking for Authentication and Copyright Protection,” International Journal of Engineering and Advanced Technology, Vol. 1, Issue 3, Feb. 2012, pp. 152-156
[22] M. Barni, C.I. Podilchuk, F. Bartolini, E.J. Delp, “Watermark Embedding: Hiding a Signal within a Cover Image,” IEEE Communications Magazine, Vol. 39, Issue 8, Aug. 2001, pp. 102-108
[23] I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, Issue 12, Dec. 1997, pp. 1673-1687
[24] S. Katezenbeisser, Fabien, A.P. Petitcolas, “Information Techniques for Steganography and Digital Watermarking,” Artech Inc., Dec. 1999, pp. 43-75
[25] G.C.M. Silvestre, W.J. Dowling, “Embedding Data in Digital Images using CDMA Techniques,” IEEE International Conference on Image Processing, Vol. 1, Sep. 2000, pp. 589-592
[26] R.L. Pickholz, D.L. Schilling, “Theory of Spread-Spectrum Communications-A Tutorial,” IEEE Transaction on Communications, Vol. 30, No. 5, May 1982, pp. 855-884
[27] R. Chaturvedi, A. Sharma, N. Hemrajani, D. Goyal, “Analysis of Robust Watermarking Technique Using Mid Band DCT Domain for Different Image Formats,” International Journal of Scientific and Research Publications, Vol. 2, No. 3, March 2012, pp. 1-4
[28] A. Singh, S. Jain, A. Jain, “Digital Watermarking Method Using Replacement of Second Least Significant Bit (LSB) with Inverse of LSB,” International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 2, Feb. 2013, pp. 121-124
[29] S. Kaengin, S. Airphaiboon, S. Pathoumvanh, “New Technique for Embedding Watermark Image into an Audio Signal,” IEEE International Symposium on Communications and Information Technology, Sep.2009, pp. 29-32
[30] J.M. Guo, T. Kao, Y.F. Liu, J.T. Wang, “Alteration Detection and Recovery for Medical and Surveillance Systems,” IEEE International Conference on Machine Learning and Cybernetics (ICMLC), Vol. 6, July 2010, pp. 3021-3025