Responsive image
博碩士論文 etd-0701106-215719 詳細資訊
Title page for etd-0701106-215719
論文名稱
Title
浮水印特徵影像攻擊法
Eigen-Image-Based Watermarking Attack
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
98
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2006-06-16
繳交日期
Date of Submission
2006-07-01
關鍵字
Keywords
浮水印攻擊、特徵影像、浮水印
watermark, watermarking attack, Eigen-Image
統計
Statistics
本論文已被瀏覽 5680 次,被下載 1156
The thesis/dissertation has been browsed 5680 times, has been downloaded 1156 times.
中文摘要
有在網際網路蓬勃發展的資訊時代?堙A數位資料的傳遞以及複製的速度可說是相當地快速,因此為了防止數位媒體的智慧財產權受到侵害,尤其是具有商業價值的影像及音樂,是目前需要正視的問題之一;因此許多數位浮水印和資訊隱藏的技術被廣泛提出,以保護或驗證擁有者的版權資訊;隨著電子商務的興起,網路上進行的商業行為也愈來愈頻繁,網路侵權事件日益增加使,得數位媒體的智慧財產權問題愈來愈受到重視;許多影音處理軟體也加入了浮水印功能來保護使用者的心血創作;但是道高一尺,魔高一丈,既然有保護的技術,當然也就有惡意的攻擊方法,嘗試將保護智慧財產權的浮水印資訊移除;浮水印攻擊是將浮水印由偽裝媒體移除之後,被攻擊後的媒體還能夠保有原媒體之商業價值,才算是成功的達到攻擊目的;因此本論文中,我們將提出一種基植於特徵影像分解的浮水印攻擊方法,是目前浮水印攻擊測試工具中所沒的攻擊方式,除了可將將隱藏的浮水印資訊移除之外,還能夠保有被攻擊媒體之品質,以彌補目前浮水印攻擊測試工具的不足之處。
Abstract
The rapid development of Internet introduces a new set of challenging problem regarding security. To prevent unauthorized copying of digital production from distributing is one of the significant problems. Digital watermarking is a potential method for protecting the ownership rights on digital audio, image and video data. An attack succeeds in defeating a watermarked article if it impairs the watermarking information beyond acceptable limits while maintaining the perceptual quality of the attacked article. Namely, attacks on digital watermarked article must consider both watermarking information survival and the distortion of the attacked stego-media.
Current attack benchmarks do not exploit as much knowledge of the watermarked image as possible, also they do not consider the distortion of the attacked stego-media. In this paper, various attacks on digital watermarking have been investigated, and a categorization of different attacks was roughly given; Besides, an Eigen-image-based (ED-based) attack is proposed to deliberately impair the watermarking information without excessively distorting the attacked stego-media, that is not currently included in those benchmark tools.
目次 Table of Contents
中文摘要 ………………………………………………………………… i
Abstract ……………………………………………………………… ii
List of Figures .……………………………………………………………… vi
List of Table ………………………………………………………………… x
Content ………………………………………………………………… iii
Chapter 1 Introduction……………………………… 1
1-1 Background…………………………… 1
1-2 Motivation and Objectives 3

Chapter 2 Relative Works …………………… 4
2-1 Watermark Attack Method… 4
2-1-1 Removal Attack…………………………………… 4
2-1-2 Geometrical Attack…………………………… 5
2-1-3 Ambiguity Attack…………………………………… 6
2-1-4 Cryptographic Attack…………………………… 6
2-1-5 Estimation-Based Attack…………………… 7
2-2 The Tools of Watermarking Attacking …… 8
2-2-1 Stirmark……………………………………………… 8
2-2-2 Checkmark………………………………………… 9
2-2-3 Optimark…………………………………………… 10
2-3 Just Noticeable Distortion……………………………… 13
2-4 Singular Value Decomposition………………………… 16
2-5 Watermark Embedding Methods…………………… 20
2-5-1 Spatial ………………………………………………21
2-5-1-1 HOWA watermark embedding algorithm… 21
2-5-1-2 HOWA watermarking extracting algorithm 27
2-5-2 Frequency Domain…………………………………29
2-5-2-1 Discrete Cosine Transform …29
2-5-2-2 Discrete Wavelet Transform 30

Chapter 3 Eigen-image-Based Watermark Attack Algorithm……33
3-1 Eigen-image Decomposition ……………………………… 33
3-1-1 Use Eigen-image to Compose the Approximate Image 35
3-2 Eigen-image-Based watermarking attack…………… 39
3-2-1 Eigen-image-Based Watermarked Attack With Brute Force…………39
3-2-2 Eigen-image-Based Watermarked Attack With JND_Based………………39

Chapter 4 Experiment Result………………………………………………45

Chapter 5 Conclusion and Future work………………………82

Reference ……………………………………………………83
參考文獻 References
[1] F. Peticolas, R. J. Anderson, “Attacks on copyright marking systems,” in Second International Information Hidig workshop, Portland, Oregon, USA, pp. 219-239, April 1998.
[2] S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun, “Attack modeling: Towards a second generation watermarking benchmark,” Signal Processing, vol. 81 , pp. 1177-1214, 2001.
[3] V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, A. nikolaidis, I. Pitas, “ A benchmarking protocol for watermarking methods,” IEEE Int. Conf on Image Processing, Page(s):1023 - 1026 vol.3 , Oct. 2001.
[4] S. Craver, N. Memon, B.-L. Yeo, and M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in communications, vol. 16 , pp. 573-586, May, 1998.
[5] M. Kutter, S. Voloshynovskiy, A. Herrigel, “Watermark copy attack”, IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, SPIE Proc., vol. 3971, San Jose, CA, USA, pp. 23-28, January 2000.

[6] S. Voloshynnovskiy, S. Pereira, A. Herrigel, N. Baumgartner, T. Pun, “Generalized watermarking attack based on watermark estimation and perceptual remodulation ”, In Proceedings of SPIE: Security and Watermarking of Multimedia Content II, San Jose, CA, USA, January 2000.
[7] Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueño, Stéphane Marchand-Maillet and Thierry Pun, Second generation benchmarking and application oriented evaluation, In Information Hiding Workshop, Pittsburgh, PA, USA, April 2001.
[8] V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, A. Nikolaidis, I.Pitas, ``A benchmarking protocol for watermarking methods’’, 2001 IEEE Int. Conf. on Image Processing (ICIP'01), pp. 1023-1026, Thessaloniki, Greece, 7-10 October, 2001
[9] C. H. Chou and Y. C. Li, “A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile,” IEEE Transactions on Circuits Syst. Video Technol., vol. 5, no. 6, pp. 467-476, Dec. 1995.
[10] R. J. Safranek and J. D. Johnston, “A perceptually tuned sub-band image coder with image dependent quantization and post-quantization data compression,” in Proc. IEEE Int. Conf. On Acoustics, Speech, and Signal Processing, Glasgow, U.K., vol. 3, pp. 1945-1948, 1989
[11] N.Nikolaidis and I.Pitas, “Robust image watermarking in the spatial domain”, Signal Processing vo1.66, 1998, pp.385-403.
[12] Da-Chun Wu and Wen-Hsiang Tasi, “Image Hiding in Spatial Domain Using An Image Differencing Approach”, Proc. Of 1998 Workshop on Computer
Vision, Graphics, and Image Processing, Taipei,Taiwan, pp. 280-287, 1998.
[13] R. Wolfgang and E.J. Delp, ”A Watermark for Digital Image,” IEEE int. Conf on Image Processing,Lausanne, Switzerland, September 1996, vol. 111,pp2 19-222.
[14] Chiou-Ting Hsu and Ja-Ling Wu, “Multiresolution Watermarking for Digital Images”, IEEE Trans.Circuits and System II, August 1998, vol. 45, no. 8,pp. 1097-1101.
[15] Chiou-Ting Hsu and Ja-Ling Wu, “Hidden Digital Watermarks in Images”, in IEEE Trans. Image Processing, Volume 8, Issue 1, Jan. 1999 Page(s):58 - 68, Jan. 1999.
[16] Chih-Hsueh Lin, Din-Yuen Chan, Hung Su, and Wen-Shyong , ” Histogram-Oriented Watermarking Algorithm: Color Image Watermarking Scheme Robust Against Geometric Attacks and Signal Processing” , IEE Proceedings Vision, Image & Signal Processing
[17] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia” , IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec, 1997.
[18] Jiwu Huang, Yun Q. Shi, Yi Shi, “Embedding image watermarks in DC components,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 10, no. 6, pp. 974-979, Sep. 2000.
[19] Maity, S.P. ; Nandy, P.; Das, T.S.; Kundu, M.K.; “Robust image watermarking using multiresolution analysis” India Annual Conference, 2004. Proceedings of the IEEE INDICON 2004. First 20-22 Dec. 2004 Page(s):174 – 179
[20] L.J. Wang, W.S. Hsieh, T.K. Truong, I.S. Reed and T.C. Cheng, “A Fast Efficient Computation of Cubic-Spline Interpolation in Image Codec”, IEEE Transactions On Signal Processing, VOL.49, NO.6, JUNE 2001, pp.1189-1197
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code