Responsive image
博碩士論文 etd-1013105-134834 詳細資訊
Title page for etd-1013105-134834
論文名稱
Title
基於碎形正交基底之資訊隱藏技術
Data Hiding Technique based on Fractal Orthonormal Basis
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
94
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2005-10-10
繳交日期
Date of Submission
2005-10-13
關鍵字
Keywords
資訊隱藏、碎形正交基底、碎形、浮水印
fractal, watermark, data hiding, fractal orthonormal basis
統計
Statistics
本論文已被瀏覽 5695 次,被下載 21
The thesis/dissertation has been browsed 5695 times, has been downloaded 21 times.
中文摘要
現今因為資料壓縮技術進步,壓縮後各種有版權的數位化影像、音樂或軟體在網路上傳輸十分容易,而增加了被大量非法複製或散播的機會。為了解決著作權保護的問題,資訊隱藏技術是目前最常被採用的方法之一。資訊隱藏技術將特別的資訊-浮水印(如所有人簽章、使用者資訊),嵌入多媒體資料之中,而不被使用者察覺,可以用來保護資料內容或驗證所有權。但資訊隱藏技術同樣面臨了一些挑戰,例如有心人士的蓄意破壞或一般正常處理資料(如壓縮),都可能會對所隱藏的資訊造成傷害。
本論文使用碎形正交基底編碼(Fractal orthonormal bases)技術來做資訊隱藏。碎形(Fractal)使用在影像壓縮上,已被證實有良好效果,其壓縮方法是先將原影像分割成數個Range方塊,對於每一個方塊,在事先訓練出之正交基底Domain方塊集中找出數個方塊及一個轉換函數,使得這數個方塊經過轉換函數之線性組合係數調整後,會與較小之Range方塊相似。因為各Domain方塊間有其正交獨立性,因此調動各個係數並不會對其他係數造成影響,所以本研究對其係數加以調整以將浮水印資訊隱藏在其碎形碼中,並且利用擴充位元及多數決來增加浮水印擷取後的相似度,最後將每張影像轉換函數集之係數及亂數種子存入資料庫中。
另外本研究將與其他兩個應用在DCT、DFT頻率域之浮水印資訊隱藏技術,進行效能、容量、訊雜比、等之比較,並且透過經由剪裁、縮放、中值濾波、均化、雜訊及JPEGS、SPIHT、EZW影像壓縮等破壞,來比較三者間之強韌性。實驗結果說明,本研究所提出之方法,僅需存取部分壓縮碼以及其亂數種子,不需大量儲存空間,並可以此做為密鑰;另外對於各類一定程度之破壞,皆能有可靠強韌性,且擁有較大資料嵌入空間。
Abstract
Digital multimedia can be distributed via the internet efficiently with superior compression technologies. The chance of distributing digital intellectual properties, such as image, music, films, and software, being large-scale unauthorized copied and distributed are much increasing one possible and practical solution for the copyright protection is information hiding technology. Information hiding technology embeds a special data into multimedia data for copyright protection. However, the embedded data may be damaged by malicious attacks or common signal processing.
In this thesis, an information hiding technique based on Fractal Orthonormal Basis is proposed. First, the original image is divided into NxN Range blocks, each range block is substituted by several Domain blocks (Fractal Orthonormal Basis), then the watermark information is embedded into the coefficients of the fractal orthonormal basis.
Besides, our technique will be compare with the other two watermarking algorithm (using DCT and DWT). After the attacks of cropping, down-scaling, median filter, smoothing, noise, JPEG, SPIHT and EZW compression, the Fractal Orthonormal Basis watermarking technique shows better result of capacity, transparency and robustness. In addition, we only store parts of compression fractal codes and the permutation seed, and these can be the secret key for the security.
目次 Table of Contents
目錄
第一章 浮水印簡介與相關研究……………………………………………………1
1.1前言… …………………………………………………………………………… 1
1.2數位浮水印… …………………………………………………………………… 2
1.3浮水印分類與相關研究… ……………………………………………………… 4
1.3.1 可見式浮水印(visible watermark)…………………… ……………………4
1.3.2 不可見式浮水印(invisible watermark) …………………………………… 5
1.3.3易碎式浮水印(fragile watermark) ………………………………………… 5
1.3.4強健式浮水印(Robust watermark)………………………………………… 6
1.3.5 空間域… ………………………………………………………………… 6
1.3.6 頻率域……………………………………… …………………………… 7
1.3.6.1 離散餘弦轉換域(DCT Domain)……………………………………7
1.3.6.2離散小波轉換域(DWT Domain)………………………… ……… 14
1.3.6.3離散傅利葉轉換域(DFT Domain)…………………………………25
1.3.6.4複合式浮水印技術 ………………………………………………27

第二章 碎形基礎理論與相關浮水印研究……………………………………… 28
2.1前言………………………………………………………………………………28
2.2轉換之收斂性……………………………………………………………………31
2.3碎形影像壓縮……………………………………………………………………32
2.4基於碎形壓縮之浮水印應用……………………………………………………37
2.4.1區域尋找法… ……………………………………………………………37
2.4.2區域尋找改良式………………………………………………………… 39
2.4.3旋轉轉換二分法………………………………………………………… 40
2.4.4亮度偏移量量化法……………………………………………………… 42

第三章 碎形正交基底與浮水印… …………………………………………… 44
3.1 Orthogonal Basis IFS……………………………………………………………44
3.2嵌入演算法…………………………………………………………………… 48
3.3擷取演算法… …………………………………………………………………49
3.4碎形正交基底浮水印之實作… ………………………………………………51

第四章 研究結果 ……………………………………………………………… 55
4.1 評比標準………………………………………………………………………55
4.1.1 信號訊雜比(PSNR,Peak Signal to Noise Ratios) ………………… … 55
4.1.2 正規化相似性(Normalized Correlation tatio,NC) …………………… 56
4.2 實驗結果與效能比較…………………………………………………………56
4.3 幾合轉換破壞(Geometrical transformation attacks)……………………………60
4.3.1 剪裁(cropping)………………………………………………………… 60
4.3.2 縮放(down-scaling) …………………………………………………… 62
4.4 影像處理破壞(Image processing attacks) ………… ………………………… 65
4.4.1 均化(smoothing) ……………………………………………………… 65
4.4.2 中值濾波(median filter)… …………………………………………… 67
4.4.3 加入高斯雜訊破壞(Gaussian noise) ………… ……………………… 69
4.5 影像壓縮破壞(Image compression attacks)……………………………………71
4.5.1 JPEG壓縮………………………………………………………………71
4.5.2 SPIHT壓縮 ……………………………………………………………73
4.5.3 EZW壓縮………………………………………………………………76

第五章 結論…………………………………………………………………… 79
參考文獻 …………………………………………………………………………81
參考文獻 References
參考文獻
[1] http://www.asianpacific.com.tw/html/posession.htm
[2] P.Bassia, and I.Pitas, “Robust audio watermarking in the time domain,” EUSIPCO, pp.25-28, 1998.
[3] Chiou-Ting Hsu and Ja-Ling Wu, “DCT-Based Watermarking for Video,” IEEE Trans. on Consumer Electronics, Vol.44, No.1, pp.206-216, Feb.1998.
[4] Chiou-Ting Hsu and Ja-Ling Wu, "Hidden Digital Watermarks in Image," IEEE Trans. Image Processing, vol.8 pp.58-68, Jan. 1999.
[5] Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, Hong-Yuan Mark Liao, “Cocktail Watermarking for Digital Image Protection,” IEEE Trans. on Multimedia, vol.2, no.4, pp.209-224, Dec. 2000.
[6] Stéphane Bounkong, Borémi Toch, David Saad, David Lowe, "ICA for Watermarking Digital Images," Journal of Machine Learning Research 4, pp.1471-1498, 2003
[7] R.G. van Schyndel, A.Z. Tirkel, C.F. Osbome, “A Digital Watermark,” in Proc ICIP94, IEEE Int. Conf. Image Processing, vol.2, pp.86-90, 1994.
[8] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for Data Hiding,” IBM System Journal, Vol.35, No.3 and 4, pp.313-336, 1996.
[9] T.-S. Chen, C.-C. Chang, M.-S. Hwang, “Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Trans. on Image Processing, vol.7, No.10, pp.1485-1488, Oct. 1998.
[10] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol.6, pp. 1673-1687, 1997.
[11] Eckhard Koch and Jian Zhao, “Towards robust and hidden image copyright labeling,” in IEEE international Workshop on Nonlinear Signal and Image Processing, pp.452-455, Marmaras, Greece, Jun. 1995.
[12] Chuan-Fu Wu, Wen-Shyong Hsieh,“Image refining technique using digital watermarking,” IEEE Trans. on. Consumer Electronics, vol 46, Issue 1, pp.1-5, Feb. 2000.
[13] C.T. Hsu, J.L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. on Circuits and Systems II: Analog and Digital Signal Processing, vol. 45, Issue 8, pp.1097-1101, Aug. 1998.
[14] Houng-Jyh Wang, Po-Chyi Su, and C.-C. Jay Kuo, “Wavelet-based digital image watermarking,” Optics Express,vol.3, No.12, pp.491-496, Dec. 1998.
[15] Xiang-Gen Xia, Charles G. Boncelet and Gonzalo R. Arce, “Wavelet transform based watermark for digital images,” Optics Express, vol.3, No.12, pp.497-507, Dec. 1998.
[16] Liehua Xie and Gonzalo R. Arce., “Joint wavelet compression and authentication watermarking,” on Image Processing, ICIP '98, Chicago, IL, USA, 1998.
[17] C.S. Lu, S.K. Huang, C.J. Sze, and H.Y.M. Liao., “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, pp.209-224, Dec. 2000.
[18] Shih-Hao Wang; Yuan-Pei Lin, “Wavelet tree quantization for copyright protection watermarking,” IEEE Tran. on Image Processing ,pp.154- 165, vol.13, Issue: 2, Feb. 2004.
[19] Lei Shi, Fan Hong, Guo-Hua Cui,”A quantization-based digital watermarking robust to geometrical transformation,” IEEE 2003 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 5, pp.2826-2830, Nov. 2003.
[20] X. Kang, J. Huang, YQ Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Trans.on CSVT, vol 13, no. 8, pp. 776-786, Aug. 2003.
[21] B. Mandelbrot, “The Fractal Geometry of Nature,” San Francisco, CA: Freeman, 1982.
[22] M. F. Barnsley, “Fractals Everywhere,” Academic Press, San Diego, 1988.
[23] M. F. Barnsley and A. Sloan "A better way to compress images," BYTE Magazine, pp.215~223,Jan 1998.
[24] Yuval Fisher, E. W. Jacobs, and R.D. Boss, “Iterated Transformation image compression,” NOSC Thec. Rep. TR-1408, Naval Oceans Systems Center, San Diego, CA, 1991.
[25] A.E. JACQUIN, “Image Coding based on a fractal theory of iterated contractive image transformation,” IEEE Trans. on Image Process, 1992.
[26] Dušan Levický, Peter Foriš, ”Some Modification of Fractal Image Coding and Digital Watermarking,” IEEE ICIT, Maribor, Slovenia, pp. 946, 2003.
[27] Y. Fisher, ”Fractal Image Compression: Theory and Application,” Springer – Verlag New York, 1995.
[28] Puate, J. and Jordan, F. ”Using Fractal Compression Scheme to Embed a Signature into an Image.” Proceedings of the SPIE Photonics East’96 Symposium, 108–118, 1996.
[29] Yao Zhao, Qiang Ma, Baozong Yuan, “Digital Watermark Based on LIFS,” Proceedings of the IEEE International Conference on Image Processing ICIP'00, pp. 1281-1284, 2000.
[30] Hsien-Chu Wu, Chin-Chen Chang, “Hiding digital watermarks using fractal compression technique,” Fundamenta Informaticae, vol.58, no.2, pp.189-202, Nov. 2003.
[31] G. Li, Y. Zhao, and B. Yuan, “Using the fractal code to watermark images,” 2002 6th International Conference on Signal Processing, vol. 1, pp.829-832, 2002.
[32] Arnaud E. Jacquin, “A Fractal Theory of Iterated Markov Operators with Applications to Digital Image Coding,” Ph.D. Thesis, Georgia Institute of Technology, 1989.
[33] Gaurav Aggrwal, Ashwin T. V., ans Sugata Ghosal, “An Image Retrieval System With Automatic Query Modification,” IEEE Trans. on Multimedia, Vol. 4, NO. 2, Jun. 2002.
[34] Young Deok Chum, “Image retrieval using BDIP and BVLC moments,” IEEE Trans. on circuits and systems for video technology, vol. 13, no. 9, 2003.
[35] John Y. Chiang, Z. Z. Tsai, “Image based on Fractal Signatures,” National Computer Symposium in Taichung, 2003.
[36] O. Maron and T. Lozano-P´erez, “A framework for multiple-instance learning,” in Advances in Neural Information Processing Systems, Vol. 10, pp. 570-576, 1997.
[37] http://www.ulead.com.tw/pi/runme.htm
[38] http://ict.ewi.tudelft.nl/vcdemo
[39] Ya-Ling Wang,”Multiple-Instance Learning Image Database Retrieval employing Orthogonal Fractal bases,” Master’s Thesis, Department of Computer Science and Engineering, National Sun Yat-sen University, Jul. 2004
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內一年後公開,校外永不公開 campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 18.216.186.164
論文開放下載的時間是 校外不公開

Your IP address is 18.216.186.164
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code