Responsive image
博碩士論文 etd-0612101-142904 詳細資訊
Title page for etd-0612101-142904
論文名稱
Title
增進數位浮水印技術影像品質與應用領域之研究
The Research of Improving the Image Quality of Digital Watermarking Technique and Its Applications
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
99
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2001-06-05
繳交日期
Date of Submission
2001-06-12
關鍵字
Keywords
數位浮水印技術、影像容錯、金鑰分配、影像品質、影像隱藏學
Digital Watermarking Technique, Image Quality, Image Steganography, Key Distribution, Image Refining
統計
Statistics
本論文已被瀏覽 5678 次,被下載 3836
The thesis/dissertation has been browsed 5678 times, has been downloaded 3836 times.
中文摘要
本文主要探討主題為:如何增進數位浮水印技術的影像品質進而擴展其應用領域。現今大部分的數位浮水印技術的重點大都放在”隱藏技術(Embedding Algorithm)”的研究與改進上,但是較少有人注意到數位浮水印技術的影像品質(Image quality)不甚理想的問題,同時現今數位浮水印技術大都只應用在智慧財產權的保護(Copyright Protection)之上,侷限了數位浮水印技術的應用領域(Application Field)。基於此,本文提出了增進傳統數位浮水印技術的影像品質與應用領域之技術。
增進數位浮水印技術影像品質之技巧的基本觀念,不同於傳統數位浮水印技術需藉由直接修改影像中的特徵值(Feature)以將數位浮水印嵌入影像之中,而是利用影像中的特徵值間之特性來嵌入數位浮水印。這樣的方式能夠有效的減少特徵值被改變的機率,進而提升影像被嵌入數位浮水印後的影像品質。此技巧運作的方式為一個前處理程序,因此無須改變傳統數位浮水印技術的嵌入與粹取程序(Embedding and Extracting Process),便可以將此技巧應用在現有數位浮水印技術之上。
增進傳統數位浮水印技術的應用領域的部分則包含兩個技術,第一個技術是利用數位浮水印技術提供”影像容錯(Image Refining)”的功能。因為影像一旦發生失真的情形時,數位浮水印能提供容錯的能力要比能提供智慧財產權的保護的能力來的重要。因此藉著將影像的Reed-Solomon Code (RS Code)當作數位浮水印,並配合頻率域(Frequency Domain)的數位浮水印技術將之嵌入影像之中。萬一影像遭人破壞或是竄改時,不需要使用到原始的影像,便能夠順利的還原(Recover)原始的影像。
第二個技術則是將數位浮水印技術用於付費電視系統(Pay-TV System)中的金鑰分配(Key Distribution)之上。在所提出的技術中,我們將金鑰視為數位浮水印,並將它嵌入要被保護的影片之中。由於我們所提出的嵌入程序並不會增加原始影片的大小(Size),因此不會對被保護的影片造成任何影響。藉由利用數位浮水印技術來分配金鑰,可以有效地提高金鑰分配的效率,同時也可以節省網路的頻寬。
藉著補足傳統數位浮水印技術不夠完善之處,同時延伸數位浮水印技術的實用性與應用範圍。讓傳統數位浮水印技術將不只侷限在傳統智慧財產權的保護之上,而是能夠成為數位時代尋求問題的解決之道時的新選擇。
Abstract
The major topic of this dissertation is how to improve the image quality and application of digital watermarking techniques. Most traditional digital watermarking techniques focus on the development and improvement of embedding algorithm. But fewer people really care about the degradation of the image quality of digital watermarking techniques. Meanwhile, the application of digital watermarking technique seems to be limited in the copyright protection. Therefore, the techniques used to improve the image quality and to expand the application of digital watermarking technique are proposed in this dissertation.
The concept of the proposed technique used to improve the image quality of digital watermarking technique is different from the concept of traditional watermarking techniques which directly modify the features of image to embed digital watermark. Dissimilarly, the proposed technique uses the relation between the features to embed the digital watermark. In this way, the probability of modifying the feature can be efficiently reduced. Therefore, the image quality of watermarked image can be improved. Besides, the proposed technique works like a pre-process. The proposed technique can be easily applied to present traditional digital watermarking techniques without changing the original embedding and extracting process.
The expansion of digital watermarking techniques application consists of two techniques. The first one uses the digital watermarking technique to provide the “Image Refining” function for digital images. In the proposed technique, the RS (Reed-Solomon) codes of original image are used as a watermark and are embedded in the original image. The watermarking information can provide the error correction capability while the original image is distorted (refining function). If there is some alterations made to the watermarked image and they are within the error correction capability of the RS parities, the alterations will be corrected by the RS decoding to restore the original image.
The second one applies the digital watermarking techniques on the Pay-TV system. Conventional key distribution methods used in Pay-TV system emphasize on the method’s refinement in order to reduce the frequency of the keys distributed over network. The proposed method uses the digital watermarking technique to hide the cryptographic keys into routine encrypted video program without any increasing of video program size for the economy of network bandwidth and degradation in perceptual quality.
The purpose of this thesis is to improve the practicability of digital watermarking techniques. The proposed techniques could supplement the incompleteness of the traditional digital watermarking techniques with additional functions and applications. In this way, traditional digital watermarking techniques can not only be used for copyright protection but also be the new choice of resolving problem in the future digital environment.
目次 Table of Contents
Content
Chapter 1 Introduction…………1
1.1 Motivation and Recent Related Research………1
1.2 Summary of the Dissertation…………3
1.3 Organization of the Dissertation…………5
Chapter 2 Background Knowledge of Digital Watermarking Techniques……7
2.1 The Researches of Digital Watermarking Techniques……………7
2.1.1 Spatial Domain…………………………………………………………9
2.1.2 Frequency Domain……………………………………………………11
2.1.3 Particular Issue………………………………………………………13
2.2 The Requirements for Digital Watermarking Techniques………………15
Chapter 3 The Improvement of Image Quality of Digital Watermarking Technique………………………………………………………………………………17
3.1 Deficiencies of Traditional Watermarking Techniques………………17
3.2 Efficient Method to Improve the Quality of Watermarked Cover Image……19
3.2.1 Embedding Process of Traditional Watermarking Techniques………19
3.2.2 The Proposed (n+1)/n Method………………………………………20
Chapter 4 The Expansion of Application of Digital Watermarking Technique……29
4.1 Image Refining Technique Using Digital Watermarking Technique………30
4.2 Digital Watermarking Based Key Distribution for the Pay-TV system……39
4.2.1 Key Distribution of Pay-TV system…………………………………39
4.2.2 Digital Watermarking Based Key Distribution……………………41
Chapter 5 Experimental Results and Discussion…………………56
5.1 Experimental Results for the Improvement of Image Quality of Digital Watermarking Techniques…………………56
5.1.1 The Watermark Techniques Chosen for Performance Measurement……………57
5.1.2 The Simulation Results of Performance Measurement……………66
5.2 Experimental Results for the Expansion of Application of Digital Watermarking Techniques…………………70
5.2.1 The Performance Simulation Results of "Image Refining Technique Using Digital Watermarking Techniques"…………………………………70
5.2.2 The Performance Simulation Results of " Digital Watermarking Based Key Distribution for the Pay-TV system"…………………………………77
Chapter 6 Conclusion and Future Work…………………83
6.1 Conclusion…………………83
6.2 Future Work…………………86
Chapter 7 References…………………89
Appendix…………………97

List of Figures
Figure 2.1: Concept of digital watermarking techniques …………………………8
Figure 2.2: The example of visible digital watermark ……………………………9
Figure 3.1: Embedding process of the traditional watermarking techniques ……20
Figure 3.2: The concept of proposed method ……………………………………21
Figure 3.3: Embedding Process of Traditional Watermarking
with Proposed (n+1)/n Method ……………………………………………………26
Figure 3.4: Extracting Process of Traditional Watermarking Technique with Proposed (n+1)/n Method ……………………………………………………………27
Figure 3.5: Example of embedding process of proposed 3/2 method ………………28
Figure 3.6: Example of extraction process of proposed 3/2 method ………………28
Figure 4.1: Block diagram of watermark embedding process ……………………35
Figure 4.2: Block diagram of watermark extraction process ………………………37
Figure 4.3: The process of hiding encrypting key into MPEG video program…….41
Figure 4.4: The process of extracting encrypting key from encrypted video program ……………………………………………………………42
Figure 4.5: Scramble ordering with key refresh ……………………………………44
Figure 4.6: Definition the middle frequency subband ………………………………46
Figure 4.7: Process of watermark embedding ……………………………………47
Figure 4.8: Process of watermark extraction ………………………………………48
Figure 4.9: An 8 ×8 DCT coefficient block ………………………………………49
Figure 4.10: Watermarked 8 ×8 DCT coefficient block ……………………………53
Figure 5.1: Block diagram of watermark embedding process …………………58
Figure 5.2: Procedure of watermark embedding ……………………………………59
Figure 5.3: Block diagram of watermark extraction process ……………………59
Figure 5.4: Procedure of watermark extraction ……………………………………60
Figure 5.5: Parent-child dependencies of subbands ………………………………62
Figure 5.6: The block diagram of watermark embedding process …………………62
Figure 5.7: The block diagram of watermark extraction process …………………65
Figure 5.8: Cover image of “Lena” with size 256x256 ……………………………67
Figure 5.9: The monochromic watermark image with size 32x32 …………………67
Figure 5.10: The watermarked image processed by the original
“JPEG Hiding Technique” …………………………………………………………68
Figure 5.11: The watermarked image processed by the original “Digital Watermarking Using Zerotree of DCT” ……………………………………68
Figure 5.12: The watermarked image processed by the “JPEG Hiding Technique” to which the proposed (n+1)/n method is applied ……………………………………69
Figure 5.13: The watermarked image processed by the “Digital Watermarking Using Zerotree of DCT” to which the proposed (n+1)/n method is applied………69
Figure 5.14: The original image “Lena” with size 256x256 ………………………72
Figure 5.15: The watermarked image processed by the
“Image Refining Technique Using Digital Watermarking Techniques”…………72
Figure 5.16: The 1% Noise Alteration made to figure 5.15 ………………………73
Figure 5.17: The corrected image from figure 5.16 …………………………………73
Figure 5.18: The 2% Noise Alteration made to figure 5.15…………………………74
Figure 5.19: The corrected image from figure 5.18 …………………………………74
Figure 5.20: The 3% Noise Alteration made to figure 5.15 …………………………75
Figure 5.21: The corrected image from figure 5.20 …………………………………75
Figure 5.22: The 4% Noise Alteration made to figure 5.15…………………………76
Figure 5.23: The corrected image from figure 5.22 ………………………………77
Figure 5.24: The frame 1 of Miss America sequence ………………………………79
Figure 5.25: The watermarked frame 1 of Miss America sequence,
The amount of embedded information bits is 6402 ……………………………… 79
Figure 5.26: The frame 1 of Foreman sequence ……………………………………80
Figure 5.27: The watermarked frame 1 of Foreman sequence,
The amount of embedded information bits is 11553 ………………………………80
Figure 5.28: The frame 48 of Table Tennis sequence ……………………………81
Figure 5.29: The watermarked frame 48 of Table Tennis sequence,
The amount of embedded information bits is 12795 ………………………………81
Figure 5.30: The frame 12 of Football sequence …………………………………82
Figure 5.31: The watermarked frame 12 of Football sequence,
The amount of embedded information bits is 9898…………………………………82

List of Tables
Table 3.1: All possible conditions to embed Y in X…………………………………22
Table 3.2: All conditions of 4/3 method……………………………………………60
Table 3.3: The reduction rate of the feature modification for (n+1)/n method………………………………………………………………………………24
Table 4.1: The comparison example for the VLC codes……………………………54
Table 5.1: The values of PSNR of the watermarked images………………………66
Table 5.2: The values of PSNR for the Altered and Corrected Watermarked images………………………………………………………………………………71
Table 5.3: Capacity of an intra frame………………………………………………78
Table 5.4: The values of PSNR of the watermarked intra frame……………………78
參考文獻 References
[1] D. Kahn, "The history of steganography", First Workshop of Information Hiding Proceedings, pp. 1-5, Lecture Notes in Computer Science, Vol. 1174 (Springer-Verlag) , May 30 - June 1, 1996, Cambridge, U.K.
[2] N. F. Johnson and S. Jajodia, , "Steganography: seeing the unseen", IEEE Computer , pp. 26-34, February 1998
[3] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data embedding and watermarking technologies", Proceedings of the IEEE, 86(6), pp. 1064-1087 , 1998
[4] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, , "Techniques for data hiding", IBM System Journal, 35(3&4), pp. 313-336, 1996
[5] Stegano Software, http://www.demcom.com/english/steganos/index.htm
[6] MP3Stego Software, http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/
[7] B. Pfutzmann, "Trials of Traced Traitors", First Workshop of Information Hiding Proceedings, pp. 49-64, Lecture Notes in Computer Science, Vol. 1174 (Springer-Verlag) , May 30 - June 1, 1996, Cambridge, U.K.
[8] M. M. Yeung, and F. C. Mintzer, "Invisible watermarking for image verification", Journal. of Electronic Imaging, 7(3), pp. 578-591 , 1998
[9] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, , "Information hiding - a survey", Proceeding of IEEE, pp. 1062-1078 , 1999, 87(7)
[10] Pfutzmann, "Information hiding terminology", First Workshop of Information Hiding Proceedings, pp. 347-350, Lecture Notes in Computer Science, Vol. 1174 (Springer-Verlag) , May 30 - June 1, 1996, Cambridge, U.K.
[11] Y. K. Lee, and L. H. Chen, "A high capacity image steganographic model", submitted to IEE Proceedings Vision, Image and Signal Processing. (1999)
[12] Y. K. Lee, and L. H. Chen, "An adaptive image steganographic model based on minimum-error LSB replacement", Proceedings of the Ninth National Conference on Information Security, pp. 8-15 , May. 14-15, 1999, Taiwan
[13] S-Tools Shareware,ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip (Version 4)
[14] R. Machado, Stego Software, http://www.stego.com/
[15] J. Fridrich, "A New Steganographic Method for Palette-Based Images", submitted to The IS&T PICS Conference, Savannah, Georgia, April 25-28, 1999.
[16] ISO/IEC ITU-T Rec. T.18, Information technology - Digital compression and coding of continuous-tone still images: Requirements and guidelines, 1994.
[17] R. Tinsley, Jsteg Software,ftp://ftp.funet.fi/pub/crypt/steganography/jsteg-v4. diff.gz
[18] "WSQ Gray-scale Fingerprint Image Compression Specification", 1993
[19] H. K. Ratha, J. H. Connell, and R. M. Bolle, "Secure data hiding in wavelet compressed fingerprint images", submitted to Fourth Asian Conference on Computer Vision, Taipei. Taiwan, Jan. 8-11, 2000
[20] L. M. Marvel, C. G. Jr. Boncelet, and C. T. Retter, "Spread spectrum image steganography", IEEE Trans. on Image Processing, pp. 1075-1083, 1999, 8(8).
[21] A. K. Jain, "Fundamentals of Digital Image Processing" Englewood Cliffs, NJ: Prentice-Hall, 1989
[22] I. J. Cox, J. Ki1ian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, Vol.6, No.12, pp.1673-1687, 1997.
[23] F. Hartung, and B. Girod, "Watermarking of Uncompressed and compressed video", Signal Processing, 66(3), pp. 283-301, May 1998.
[24] J. B. Bednar, and T. L. Watt, "Alpha-trimmed means and their relationship to the median filters", IEEE Trans. Acoust., Speech, Signal Processing, vol. ASSP-32, pp.145-153, Feb. 1984
[25] S. Lin, and D. J. Costello, Jr., "Error Control Coding: Fundamentals and Applications", Englewood Cliffs, NJ: Prentice-Hall, 1983
[26] E. Adelson, “Digital Signal Encoding and Decoding Apparatus,” U.S. Patent, No. 4939515,1990.
[27] Van Schyndel, R. Tirkel, A. and Osbourne, ”A digital watermark,” ICIP 94.
[28] Matsui, K, and Tanaka, K, ”Video-steganography:How to embed a signature in a picture,” IMA Interllectual property project processing, pp.187-206, Jan, 1994.
[29] A. H. Tewfik and M. Swanson, ”Data hiding for multimedia personalization, interaction and protection,” IEEE Signal Processing Magazine, Vol. 2, pp. 86-90, 1994.
[30] I. Pitas, ”A method for signature casting on digital images,” Proceedings of IEEE International Conference on Image Processing,” Vol. 3, pp.215-318 ,1996.
[31] R. Wolfgang and E. Delp, ” A watermark for digital images,” Proceeding of IEEE International Conference on Image Processing, Vol. 2, pp.319-222, 1996.
[32] G. Voyatzis and I. Pitas, "Chaotic mixing of digital images and applications to watermarking," in Proceedings of European Conference on Multimedia Applications, Services and techniques (ECMAST '96), Vol.2, pp.687-695, May, 1996.
[33] G. Voyatzis and I. Pitas , "Embedding robust watermarks by chaotic mixing,” in Proceedings of 13th International Conference on Digital Signal Processing (DSP’97), Vol. 1, pp.213-216, 1997.
[34] G. C. Langelaar, J. C. A. van der Lubbe, and R.L. Lagendijk, ”Robust labeling methods for copy protection of images,” in Proceedings of SPIE Electronic Imaging'97, Storage and Retrieval for Image and video Database V, pp.298-309,San Jose(CA) Feb1997.
[35] K. I. Hashida and A. Shiozaki, ”A method of embedding robust watermarks into digital color images,” IEICE Transactions on Fundamentals of Electronics, Vol. E81-A, pp.2133-2137, Oct, 1998.
[36] M. Kutter, F. Jordan, and F. Bossen, “Digital watermarking of color image using amplitude modulation,” Journal of Electronic Imaging, vol.7, no.2, pp.326-332, 1998.
[37] T. S. Chen, C. C. Chang, and M.S. Hwang, ”A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, Vol. 7 No.10, pp.1485-1488, Oct, 1998.
[38] H. Inoue, A. Miyazaki and A. Yamamoto, "A digital watermarking based on the wavelet transform and its robustness on image compression," Proceeding of IEEE International Conference on Image Processing, Vol. 2, pp.391-395, 1998.
[39] Mitchell D. Swanson, Bin Zhu, Ahmed H. Tewfik, and Laurence Boney, “Robust audio watermarking using perceptual masking,” Signal Processing, vol. 66, pp.337.355, May 1998. European Association for Signal Processing (EURASIP)
[40] S. Craver, N. Memon, B.L. Yeo, and M. Yeung, “Can invisible watermarks resolve rightful ownership?,” in Proc. SPIE Storage and Retrieval for Still Image and Video Database V, vol. 3022, pp. 310-321, 1997.
[41] A. H. Tewfik, M. D. Swanson, B. Zhu, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Special Areas in Communications, vol. 16, pp. 540-550, May 1998.
[42] P. C. Su, C. C. J. Kuo, and H. J. M Wang, "Blind digital watermarking for cartoon and map images," in Proceedings of SPIE Security and watermarking of multimedia contents, vol. 3657, pp.296-306, January1999.
[43] C. T. Hsu and J. L. Wu, ”Hidden digita1 watermarks in images," IEEE Transactions on Images Processing, Vo1.8, pp.58-68, Jan, 1999.
[44] C. F. Wu and W. S. Hsieh, “Digital watermarking Using Zerotree of DCT,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp.87-94, Feb 2000.
[45] P. Wayner, “Disappearing Cryptography: Being and Nothingness on the Net,” AP Professional, 1996.
[46] G. C. Langelaar, J. C. A. van der Lubbe, and R.L. Lagendijk, ”Robust labeling methods for copy protection of images,” in Proceedings of SPIE Electronic Imaging'97, Storage and Retrieval for Image and video Database V, pp.298-309, San Jose(CA) Feb 1997.
[47] N. Y. Bai, J. Y. Chiang, “Data Hiding Using Binocular Fusion of Stereo Pairs,” Proceeding of the eighth national conference in information security, pp.245-254, May 1998.
[48] D. C. Lou, T. L. Yin, J. H. Chen, and R. Lee, “An Efficient Image Cryptosystem Based Upon Inequalization Quantization,” Proceeding of the eighth national conference in information security, pp.255-264, May 1998.
[49] D. C. Wu, and W. H. Tsai, “Data Hiding in Images via Multiple-Bases Number Conversion and Lossy Compression,” IEEE transaction on Consumer Electronics, vol. 44, pp. 1406-1421, November 1998.
[50] J. Huang and Y. Q. Shi, “Adaptive image watermarking scheme based on visual masking,” IEE Electronics Letters, vol. 34, No. 8, pp. 748-750. April 1998.
[51] T. Y. Chung, M. . Hong, Y. N. Oh, D. H. Shin, and S. H. Park, “Digital Watermarking for Copyright Protection of MPEG2 Compressed Video,” IEEE transaction on Consumer Electronics, vol. 44, No. 3, pp. 895-901, August 1998.
[52] C. T. Hsu, and J. L. Wu, “DCT-Based Watermarking for Video,” IEEE transaction on Consumer Electronics, vol. 44, No. 1, pp. 206-216, February 1998.
[53] K. K. Wong, C. H. Tse, K. S. Ng, T. H. Lee and L. M. Cheng, “Adaptive Water Marking,” IEEE transaction on Consumer Electronics, vol. 43, pp. 1003-1009, Nov. 1997.
[54] Z. H. Wei, P. Qin, and Y. Q. Fu, “Perceptual Digital Watermark of Images Using Wavelet Transform,” IEEE transaction on Consumer Electronics, vol. 44, pp. 1267-1273, November 1998.
[55] Y. A. Jeong, C. K. Cheong, “A DCT Embedded Image Coder Using Wavelet Structure Of DCT for Very Low Bit Rate Video Codec,” IEEE transaction on Consumer Electronics, vol. 44, pp. 500-508, August 1998.
[56] D. M. Baylon and J. S. Lim, “Transform/subband analysis and synthesis of signals,” MIT Research Laboratory of Electronics Technical Report, June 1990.
[57] M. Vetterli, J. Kovacevic, “Wavelets and subband Coding”. Englewood Cliffs, NJ: prentice-Hall, 1995.
[58] M. Rabbani and P. W. Jones, “Digital Image Compression Technique”. SPIE Tutorial Text Series vol. TT7: SPIE Optical Engineering Press, 1991.
[59] Jerome M. Shapiro, “Embedded Image Coding Using Zerotree of Wavelet Coefficients,” IEEE Transaction on Signal Processing, vol.41, pp.3445-3462, December 1993.
[60] C. F. Wu, and W. S. Hsieh, “Image Refining Technique Using Digital Watermarking,” IEEE transaction on Consumer Electronics, vol. 46, No. 1, pp. 1-5, Feb. 2000.
[61] Y. H. Ke, C. F. Wu and W. S. Hsieh, “Economical Key Distribution Method Based on Digital Watermarking Technique for the Pay TV system”, Proceeding of 2000 Workshop on Internet and Distributed Systems, pp. 422-428. May 2000.
[62] Y. K. Lee and L. H. Chen, “JPEG Hiding Technique,” http://debut.cis.nctu.edu.tw/~yklee/Research/DataHiding/DataHiding5.htm.
[63] M. M. Yeung, and F.C. Mintzer, “Invisible watermarking for image verification,” Journal of Electrical Image, 7, (3), pp. 578-591, 1998.
[64] Stephen B. Wicker and Vijay K. Bhargava, “Reed-Solomon Codes and Their Application”, Institute of Electrical and Electronics Engineering, June 1994.
[65] I. S. Reed and G. Solomon, “Polynomial Codes over Certain Finite Fields,” SIAM journal of Applied Mathematics, vol. 8, pp. 300-304, 1960.
[66] Barry A. Cipra, “The ubiquitous Reed Solomon Codes”, SIAM News, vol. 6-1, January 1993.
[67] ITU Rec.810 , 1992.
[68] F.K. Tu, C.S. Laih, and S.H. Toung, “On Key Distribution Management for Conditional Access System on Pay-TV system”, IEEE Transactions on Consumer Electronics, Feb. 1999,Vol.45, No. 1, pp. 151-158.
[69] W. Lee. “Key Distribution and Management for Conditional Access System on DBS”, Proceedings of international conference on Cryptology and information security, pp.82-86, 1996
[70] Douglas R. Stinson. “Cryptography Theory and Practice”, CRC Press, 1995
[71] LeGall, “MPEG Video Compression Standard”, 1996 Michael Orzessek, Perter Sommer.
[72] M. Rabbani and P. W. Jones, “Digital Image Compression Technique”, SPIE Tutorial Text Series vol. TT7: SPIE Optical Engineering Press, 1991.
[73] Joan L. Mitchell, William B. Pennebaker, Chad E. Fogg, and Didier J. LeGall, “MPEG VIDEO COMPRESSION STANDARD”, pp. 94-98, ChAPMAN & HALL, 1997.
[74] A. N. Skodras, C. A. Christopoulos, T. Ebrahimi, “ JPEG2000: The Upcoming Still Image Compression Standard,” Proceedings of the 11th Portuguese Conference on Pattern Recognition, pp. 359-366, May 2000.
[75] M. J. Gormish, D. Lee, M. W. Marcellin, “JPEG2000: Overview, Architecture, and Applications,” In Proceedings of ICIP2000, Sep. 2000.
[76] “ JPEG2000 Part 1 Final Committee Draft Version 1.0” ISO/IEC/JTC1/SC29/WG1 N1646R, Mar. 2000.
[77] I. Moccagatta, S. Soudagar, J. Liang, H. Chen, “Error-Resilient Coding in JPEG-2000 and MPEG-4”, IEEE Journal on Selected Areas in Communications, vol.18, no.6, pp.899-914, Jun 2000.
[78] S. Lin, Daniel J. and Costello Jr., “Error Control Coding: Fundamentals and Applications”, Prentice Hall, Englewood Cliffs, N.J., 1983.
[79] P. K. Chande, A. K. Ramani, and P. C. Sharma, “Modular TMR Multiprocessor System,” IEEE Trans. Industrial Electronics, vol. 36, no.1, pp34-41, Feb 1989.
[80] M. Kameyama and T. Higuchi, “Design of Dependent-Failure-Tolerant Microcomputer System Using Triple-Module Redundancy,” IEEE Trans. Computers, vol.29, no.2, pp.202-205, Feb 1980.
[81] D.W. Davies and W.L. Price “Security of Computer Networks”, John Wiley & Sons, 1989.
[82] L. J. Hughes, Jr. “The security technology of Internet ”, published by New Rider.
[83] C. S. Laih, Lein Harn and C.C. Chang “Contemporary Cryptography and Its Applications” published by Unalis Corporation, Sep. 1995.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code