簡易檢索 / 詳目顯示

研究生: 李立得
Li-Te Lee
論文名稱: 基於直接序列分碼多重存取技術之低能量消耗且高安全性浮水印演算法設計
An Energy Efficient and High Security Watermarking Algorithm Based on DS-CDMA
指導教授: 阮聖彰
Shanq-Jang Ruan
口試委員: 陳維美
Wei-Mei Chen
林昌鴻
Chang Hong Lin
郭景明
Jing-Ming Guo
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 55
中文關鍵詞: 浮水印技術直接序列分碼多重存取盲解式浮水印演算法低功率高容量
外文關鍵詞: Watermark, DS-CDMA, blind watermarking, high capacity, low power
相關次數: 點閱:318下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 數位浮水印是一個可藏匿私密資料至影像之技術,對於一般影像而言,將一像素值輕微地改變並不容易被人眼視覺所發現,因此數位浮水印可以被用來保護影像作者的智財權,成為防止非法盜版的重要機制。近年來浮水印技術開發蓬勃發展,但以嵌入式系統作為平台的應用卻很少見。由於在手持式裝置上電池容量是有限的,如何降低在裝置上執行程式運算時所造成的功率消耗變成了應用程式設計者一項重要的課題。為了實現可應用在嵌入式系統上的浮水印機制,在本論文中,我們提出一個基於直接序列分碼多重存取技術之低功率消耗、高容量與高強健性的浮水印演算法。
    在本論文所提出的方法中,多組正交的展延碼被利用來展延多張待嵌入的浮水印影像,並將展延後的浮水印訊號嵌入至頻域係數中。其中,我們以離散餘弦轉換的方式來取得頻域係數。如此一來浮水印演算法所需具備之資料嵌入量、強健性、與安全性等特性可同時獲得提升。此外在降低功率消耗方面,我們根據離散餘弦轉換與直接序列分碼多重存取技術兩者的特性來設計一個低運算複雜度之頻域轉換機制,並將此機制應用於以直接序列分碼多重存取技術為基礎之浮水印嵌入程序。更精確而言,我們提出一個全新的以直接序列分碼多重存取技術為基礎之浮水印嵌入架構。
    由實驗結果我們可以清楚地發現,相較於一般傳統基於直接序列分碼多重存取技術之浮水印演算法,所提出的方法可省下82.2%之能量消耗。而在強健度方面,透過進行取出浮水印品質檢測的實驗可知,所提出的浮水印機制即使在JPEG影像壓縮或多種不同的影像處理攻擊下,還是能成功地取出具鑑別度之浮水印影像以成功地保護智財權。


    Recently, digital watermarking is an active technique for the copyright protection. Since the battery life of portable device is restricted, reducing the energy consumption in an embedded system is a crucial goal. In order to implement watermarking scheme for embedded systems, we present an energy efficient, secure and robust watermarking algorithm based on DS-CDMA technique in this master thesis.
    In this proposed method, multiple watermark patterns are spread with multiple orthogonal spreading codes and then embedded to DCT domain coefficients. In this way, all the capacity, security, and robustness can be improved simultaneously. For power saving, according to the properties of DCT and DS-CDMA technique, we propose a low computational complexity frequency domain transformation for the DS-CDMA embedding. More precisely, we proposed a new architecture for the DS-CDMA based watermarking.
    Experimental results show that our approach can reduce 82.2% energy consumption. Moreover, the quality measuring results demonstrate that the proposed DS-CDMA watermarking algorithm is robust enough against several signal distortions such as JPEG compression, sharpening, blurring, intensity adjusting, cropping and random noise adding.

    Table of Contents iv List of Tables vi List of Figures vii Abstract ix 1 Introduction 1 1.1 Observation and Motivation 1 1.2 Major Contribution of This Thesis 3 1.3 Organization of This Thesis 4 2 DS-CDMA Technique Background 5 2.1 DS-CDMA Communication 6 2.2 DS-CDMA Watermarking 7 2.2.1 Fang’s DS-CDMA Watermarking Algorithm 7 2.2.2 Mandhani’s DS-CDMA Watermarking Algorithm 10 2.2.3 Samee’s DS-CDMA Watermarking Algorithm 12 3 Energy Efficient Watermarking Algorithm 16 3.1 Spreading Code: Zero Mean Code 17 3.2 Embedding Algorithm 17 3.3 Extraction Algorithm 21 3.4 Computational Complexity Analysis 23 4 Experimental results 27 4.1 Power Simulation 28 4.2 Quality Measurement 30 4.2.1 Similarity Judgement 32 4.2.2 Ideal Extraction 33 4.2.3 JPEG Compression Attack 36 4.2.4 Spatial-Domain Attacks 41 5 Conclusion 52 Bibliography 53

    [1] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, vol. 6, pp. 1673–1687, 1997.
    [2] C.-T. Hsu and J.-L. Wu, “Hidden digital watermarks in images,” IEEE Trans. On Image Processing, vol. 8, pp. 58–68, Jan. 1999.
    [3] C.-S. Lu, S.-K. Huang, C.-J. Sze, and H.-Y. Mark Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, vol. 2, pp. 209–224, Dec. 2000.
    [4] P. H. W. Wong, O. C. Au, and Y. M. Yeung, “Novel blind multiple watermarking technique for images,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 813 – 830, Aug. 2003.
    [5] C.-F.Wu andW.-S. Hsieh, “Digital watermarking using zerotree of dct,” IEEE Trans. on Consumer Electronics, vol. 46, pp. 87–94, Feb. 2000.
    [6] S. Sun, P. Qiu, Y. Wang, and L.F. Yao, “Blind watermarking algorithm based on general gaussian model,” in 7th International Conference on Signal Processing, 2004, vol. 3, pp. 2302–2305.
    [7] L. Yu and F. Chen, “A novel watermark algorithm for blind extraction,” in International Conference on Computational Intelligence and SecurityWorkshops, Dec. 2007, pp. 664–667.
    [8] Y.Wang and A. Pearmain, “Blind image data hiding based on self reference,” Pattern Recognition Letters, vol. 25, no. 15, pp. 1681–1689, Nov. 2004.
    [9] S. Saryazdi and H. Nezamabadi-Pour, “A blind digital watermark in hadamard domain,” in Proceeding of world academy of science, engineering and technology, Jan. 2005, vol. 3, pp. 245–248.
    [10] C.-H. Huang, J.-L. Wu, and D.-Y. Chen, “A blind watermarking algorithm with semantic meaningful watermarks,” in Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers, Oct. 2000, pp. 1827–1830.
    [11] Y. Fang, J. Huang, and Y. Q. Shi, “Image watermarking algorithm applying cdma,” in Proceedings of the International Symposium on Circuits and Systems, ISCAS, May 2003, vol. 2, pp. II–948 – II–951.
    [12] F. Zhang, B. Xu, and X. Zhang, “Digital image watermarking algorithm based on cdma spread spectrum,” in 12th International Multi-Media Modelling Conference Proceedings, 2006, pp. 405–408.
    [13] N. Mandhani and S. Kak, “Watermarking using decimal sequences,” Cryptologia, vol. 29, pp. 50–58, Jan. 2005.
    [14] M. K. Samee and J. Gotze, “Increased robustness and security of digital watermarking using ds-cdma,” in IEEE International Symposium on Signal Processing and Information Technology, Dec. 2007, pp. 185–189.
    [15] S. P. Mohanty, N. Ranganathan, and R. K. Namballa, “Vlsi implementation of invisible digital watermarking algorithms towards the development of a secure jpeg
    encoder,” in IEEE Workshop on Signal Processing Systems, Aug. 2003, pp. 183–188.
    [16] Y.-T. Pai and S.-J. Ruan, “Low power block-based watermarking algorithm,” IEICE Trans. on Information and Systems, vol. E89-D, pp. 1507–1514, Apr. 2006.
    [17] R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, “Theory of spread-spectrum communications-a tutorial,” IEEE Trans. on communication, vol. COM-30, no. 5, pp. 855–884, May 1982.
    [18] E. H. Dinan and B. Jabbari, “Spreading codes for direct sequence cdma and wideband cdma cellular networks,” IEEE Communications Magazine, vol. 36, no. 9, pp. 48 – 54, Sep. 1998.
    [19] S. Kak and A. Chatterjee, “On decimal sequences,” IEEE Trans. on Information Theory, vol. 27, no. 5, pp. 647 – 652, Sep. 1981.
    [20] N. I. Cho and S. U. Lee, “Fast algorithm and implementation of 2-d discrete cosine transform,” IEEE Trans. on Circuit and Systems, vol. 38, pp. 297–305, 1991.
    [21] D. Brooks, V. Tiwari, and M. Martonosi, “Wattch: a framework for architecturallevel power analysis and optimizations,” in Proceedings of the 27th International Symposium on Computer Architecture, 2000, pp. 83–94.
    [22] G. K. Wallace, “The jpeg still picture compression standard,” IEEE Trans. on Consumer Electronics, vol. 38, pp. xviii–xxxiv, Feb. 1992.

    QR CODE