Responsive image
博碩士論文 etd-0617115-133745 詳細資訊
Title page for etd-0617115-133745
論文名稱
Title
影像驗證及竄改復原之適應性易碎浮水印技術
Adaptive Fragile Watermarking for Image Authentication and Tamper Restoration
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
78
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2015-07-13
繳交日期
Date of Submission
2015-07-22
關鍵字
Keywords
差分編碼、復原、定位、易碎型浮水印、影像驗證、位元率失真最佳化
rate-distortion optimization, adaptive encoding, localization, image authentication, recovery, fragile watermarks
統計
Statistics
本論文已被瀏覽 5704 次,被下載 336
The thesis/dissertation has been browsed 5704 times, has been downloaded 336 times.
中文摘要
數位科技的日新月異,對於日常生活帶來許多便利,這些便利也見諸在資料的處理及保存,數位化的影像、視訊、音訊等多媒體資料具有易於創造、複製、傳遞、修改等特性。然而,由於這樣的進步,許多數位資料的嚴重問題也伴隨而來,這類問題包括未經授權的使用、非法複製、惡意竄改,這些問題再再突顯了數位內容驗證技術的重要性,也帶動了這類技術的需求。對於數位影像內容的完整性,精確型驗證技術能提供有力的保護,這類技術在影像當中嵌入易碎的浮水印,一旦影像遭受竄改,藏在其中的浮水印也隨著損毀,藉由確認影像特徵及浮水印,可辨識出細微程度的竄改,對於被辨識出的竄改區域,甚至可以進一步復原其內容。
  本論文專注於探討數位影像的精確型驗證技術並提出二種方法。第一種方法用於保護灰階影像,作法是先對影像區塊做離散餘弦轉換,轉換後的係數用數種樣式進行編碼,一種最佳化方法被用來替各個區塊挑選出最理想的樣式,如此,可在固定資料量的前提下,良好的保存影像內容。第二種方法保護的對象是彩色影像,用以表達亮度及彩度資料的近似值首先被計算出來,為了保存亮度資料的細節,一種差分編碼方法會根據區塊內容特性而採用不同資料量來保存細節資料,錯誤更正編碼及複製多份的技術被用來保護重要資料,加諸保護的資料會嵌入到影像當中。這二種方法都可以辨別出竄改攻擊並定位出竄改發生的區域,除此之外,受保護影像及復原後的影像畫質都可以有效保持。
Abstract
With the revolution of digital technologies, many conveniences have been brought to our daily lives. For example, it becomes very easy to create, duplicate, transmit, or modify digital products. Accompanying such advance, however, unauthorized use, illegal copying, and malicious modification of digital products become serious problems. These problems highlight the importance of image content authentication and grew the demand of that. For image authentication, one of the solutions called exact authentication offers effective protection of the integrity of the image content. Exact image authentication embeds a fragile watermark in the image and the inserted watermark is destroyed as soon as the protected image is tampered with, hence the name fragile. This kind of techniques allow the detection of any change or tampering of a protected image, which may also have the additional capabilities to localize and restore the tampered regions in the image. In this research, the problem of image authentication is addressed and two fragile watermarking techniques are proposed. The first technique is developed specifically for grayscale images. The image is divided into blocks and each of them is DCT-transformed and then encoded with certain predefined patterns. An optimal selection is adopted to find the best pattern for each block. The second technique focuses on color images. The color image is also divided into blocks and the approximations of the luminance and chromatic channels of each block are calculated. In order to reduce the data size, a differential coding is used to encode the details of the luminance channel with variable sizes according to the characteristic of the block. The more important data are well protected by using the error correction coding (ECC) technique and the results are duplicated for the purpose of redundancy. Both of the above two techniques can identify and localize the tampered regions in the image. In addition, both of them can achieve very high image quality for the watermarked and recovered images.
目次 Table of Contents
1. Introduction 1
1.1 Motivation 1
1.2 Research Scope 1
1.3 Organization of the Dissertation 2
2. Related Works 3
2.1 Functional Classification of Watermarking Technologies 3
2.2 Elements of a Fragile Watermarking for Image Authentication 5
2.3 Requirements of Fragile Watermarking for Image Authentication 7
2.4 Authentication Techniques for Grayscale Images 9
2.4.1 Extracting Features in the Spatial Domain 9
2.4.2 Extracting Features in the Frequency Domain 11
2.5 Authentication Techniques for Color Images 14
2.6 Metrics for Evaluating Fragile Watermarking Techniques 16
2.6.1 Image Quality 16
2.6.2 Tamper Detection 18
2.7 Attacks on Fragile Watermarking Techniques 19
2.7.1 Vector Quantization Attack 19
2.7.2 Oracle Attack 21
2.7.3 Four-scanning Attack 21
2.7.4 Some Security Flaws 22
3. The Proposed Methods 24
3.1 Grayscale Image Authentication and Recovery Through Optimal Selection of Block Types 24
3.1.1 Watermark Embedding 25
3.1.2 Authentication and Recovery 31
3.2 Color Image Authentication and Recovery via Adaptive Encoding 32
3.2.1 Watermark Embedding 33
3.2.2 Authentication and Recovery 41
4. Experimental Results 44
4.1 Grayscale Image Authentication and Recovery Through Optimal Selection of Block Types 44
4.2 Color Image Authentication and Recovery via Adaptive Encoding 51
5. Conclusion 56
Bibliography 58
Vita 64
List of Publications 65
參考文獻 References
[Bayer76] Bayer, B.E. (1976), “Color imaging array,” U.S. Patent, No. 3971065.
[Chang08] Chang, C.C., Fan, Y.H., and Tai, W.L. (2008), “Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, Vol. 41, No. 2, pp. 654–661.
[Coppersmith99] Coppersmith, D., Mintzer, F., Tresser, C., Wu, C.W., and Yeung, M.M. (1999), “Fragile imperceptible digital watermark with privacy control,” SPIE Security and Watermarking of Multimedia Contents, pp. 79–84.
[De Vleeschouwer02] De Vleeschouwer, C., Delaigle, J.F., and Macq, B. (2002), “Invisibility and application functionalities in perceptual watermarking–an overview,” Proceedings of the IEEE, Vol. 90, No. 1, pp. 64–77.
[Dougherty92] Dougherty, E.R. (1992), An introduction to morphological image processing, SPIE Press, Bellingham, WA.
[Forgy65] Forgy, E. (1965), “Cluster analysis of multivariate data: efficiency versus interpretability of classifications,” Biometrics, Vol. 21, No. 3, pp. 768–769.
[Fridrich02a] Fridrich, J. (2002), “Security of fragile authentication watermarks with localization,” SPIE Security and Watermarking of Multimedia Contents IV, pp. 691–700.
[Fridrich02b] Fridrich, J., Goljan, M., and Memon, N. (2002), “Cryptanalysis of the Yeung-Mintzer fragile watermarking technique,” Journal of Electronic Imaging, Vol. 11, No. 2, pp. 262–274.
[Gersho92] Gersho, A. and Gray, R.M. (1992), Vector quantization and signal compression, MA: Kluwer Academic, Boston.
[Gonzalez06] Gonzalez, R.C., Woods, R.E., and Eddins, S.L. (2006), Digital Image Processing Using MATLAB, 2nd Ed., Pearson Education, London.
[Haouzia08] Haouzia, A. and Noumeir, R. (2008), “Methods for image authentication: a survey,” Multimedia Tools and Applications, Vol. 39, No. 1, pp. 1–46.
[He06] He, H.J., Zhang, J.S., and Tai, H.M. (2006), “A wavelet-based fragile watermarking scheme for secure image authentication,” International Workshop on Digital Watermarking, pp. 422–432.
[He09] He, H.J., Zhang, J.S., and Chen, F. (2009), “Adjacent-block based statistical detection method for self-embedding watermarking techniques,” Signal Processing, Vol. 89, No. 8, pp. 1557–1566.
[Holliman00] Holliman, M. and Memon, N. (2000), “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” IEEE Transactions on Image Processing, Vol. 9, No. 3, pp. 432–441.
[Kerckhoffs83] Kerckhoffs, A. (1883), “La cryptographie militaire,” Journal des sciences militaires, Vol. 9, pp. 5–33, pp. 161–191.
[Lee08] Lee, T.Y. and Lin, S.D. (2008), “Dual watermark for image tamper detection and recovery,” Pattern Recognition, Vol. 41, No. 11, pp. 3497–3506.
[Li11] Li, C., Wang, Y., Ma, B., and Zhang, Z. (2011), “A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure,” Computers & Electrical Engineering, Vol. 37, No. 6, pp. 927–940.
[Lin99] Lin, E.T. and Delp, E.J. (1999), “A review of fragile image watermarks,” ACM Multimedia and Security Workshop, pp. 25–29.
[Lin05] Lin, P.L., Hsieh, C.K., and Huang, P.W. (2005), “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, Vol. 38, No. 12, pp. 2519–2529.
[Lin13] Lin, C.H., Chen, T.H., and Chiu, C.W. (2013), “Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern,” Displays, Vol. 34, No. 1, pp. 59–68.
[Linde80] Linde, Y., Buzo, A., and Gray, R.M. (1980), “An algorithm for vector quantizer design,” IEEE Transactions on Communications, Vol. 28, No. 1, pp. 84–95.
[Liu12] Liu, K.C. (2012), “Colour image watermarking for tamper proofing and pattern-based recovery,” IET Image Processing, Vol. 6, No. 5, pp. 445–454.
[MacQueen67] MacQueen, J. (1967), “Some methods for classification and analysis of multivariate observations,” Fifth Berkeley Symposium on Mathematical Statistics and Probability, Vol. 1, pp. 281–297.
[Nyeem13] Nyeem, H., Boles, W., and Boyd, C. (2013), “Counterfeiting attacks on block-wise dependent fragile watermarking schemes,” International Conference on Security of Information and Networks, pp. 86–93.
[Petitcolas99] Petitcolas, F.A.P., Anderson, R.J., and Kuhn, M.G. (1999) “Information Hiding–A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062–1078.
[Petitcolas00] Petitcolas, F.A.P. (2000), “Watermarking schemes evaluation,” IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 58–64.
[Qian11] Qian, Z.X., Feng, G.R., Zhang, X.P., and Wang, S.Z. (2011), “Image self-embedding with high-quality restoration capability,” Digital Signal Processing, Vol. 21, No. 2, pp. 278–286.
[Qin12] Qin, C., Chang, C.C., and Chen, P.Y. (2012), “Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism,” Signal Processing, Vol. 92, No. 4, pp. 1137–1150.
[Reed60] Reed, I.S. and Solomon, G. (1960), “Polynomial codes over certain finite fields,” Journal of the Society for Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300–304.
[Rey02] Rey, C. and Dugelay, J.L. (2002), “A survey of watermarking algorithms for image authentication,” EURASIP Journal on Applied Signal Processing, Vol. 2002, No. 6, pp. 613–621.
[Sklar01] Sklar, B. (2001), Digital Communications: Fundamentals and Applications, 2nd Ed., Prentice Hall, Englewood Cliffs, NJ.
[Taubman00] Taubman, D. (2000), “High performance scalable image compression with EBCOT,” IEEE Transactions on Image Processing, Vol. 9, No. 7, pp. 1158–1170.
[Voyatzis96] Voyatzis, G. and Pitas, I. (1996), “Chaotic mixing of digital images and applications to watermarking,” European Conference on Multimedia Application, Service, and Techniques, Vol. 2, pp. 687–694.
[Wallace92] Wallace, G.K. (1992), “The JPEG Still Picture Compression Standard,” IEEE Transactions on Consumer Electronics, Vol. 38, No. 1, pp. xviii–xxxiv.
[Wang04] Wang, Z., Bovik, A.C., Sheikh, H.R., and Simoncelli, E.P. (2004), “Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, Vol. 13, No. 4, pp. 600–612.
[Wang07] Wang, M.S. and Chen, W.C. (2007), “A majority-voting based watermarking scheme for color image tamper detection and recovery,” Computer Standards & Interfaces, Vol. 29, No. 5, pp. 561–570.
[Wang08] Wang, S.S. and Tsai, S.L. (2008), “Automatic image authentication and recovery using fractal code embedding and image inpainting,” Pattern Recognition, Vol. 41, No. 2, pp. 701–712.
[Wang13] Wang, X., Zhang, D., and Guo, X. (2013), “Authentication and recovery of images using standard deviation,” Journal of Electronic Imaging, Vol. 22, No. 3, 033012.
[Wong98] Wong, P.W. (1998), “A watermark for image integrity and ownership verification,” IS&T Image Processing, Image Quality, Image Capture, Systems Conference, pp. 374–379.
[Wong01] Wong, P.W. and Memon, N. (2001), “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1593–1601.
[Wu03] Wu, M. and Liu, B. (2003), “Data Hiding in Image and Video: Part I–Fundamental Issues and Solutions,” IEEE Transactions on Image Processing, Vol. 12, No.6, pp. 685–695.
[Wu04] Wu, J.H., Zhu, B.B., Li, S.P., and Lin, F.Z. (2004), “Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes,” IEEE International Conference on Multimedia and Expo, Vol. 2, pp. 921–934.
[Zhang08] Zhang, X. and Wang, S. (2008), “Fragile watermarking with error-free restoration capability,” IEEE Transactions on Multimedia, Vol. 10, No. 8, pp. 1490–1499.
[Zhong02] Zhong, H., Liu, F., and Jiao, L.C. (2002), “A New Fragile Watermarking Technique for Image Authentication,” International Conference on Signal Processing, Vol. 1, pp. 792–795.
[Zhu04] Zhu, B.B., Swanson, M.D., and Tewfik, A.H. (2004), “When seeing isn't believing–Current multimedia authentication technologies and their applications,” IEEE Signal Processing Magazine, Vol. 21, No. 2, pp. 40–49.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code