Responsive image
博碩士論文 etd-0710106-142349 詳細資訊
Title page for etd-0710106-142349
論文名稱
Title
數位影像浮水印技術用於抵抗幾何攻擊與訊號處理之研究
Color Image Watermarking Technique Robust to Geometric attacks and Signal Processing
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
119
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2006-06-20
繳交日期
Date of Submission
2006-07-10
關鍵字
Keywords
幾何攻擊、浮水印、智慧財產權
Geometric attacks, watermarking, robustness
統計
Statistics
本論文已被瀏覽 5832 次,被下載 2026
The thesis/dissertation has been browsed 5832 times, has been downloaded 2026 times.
中文摘要
由於科技的數位化,網際網路的普及化與網路頻寬的驚人成長,使得透過網際網路傳遞大量資料或訊息已成為目前最普遍之傳輸工具。但卻造成數位資料過於容易取得與複製。對於數位資料之智慧財產權而言,如何確保該數位資料之所有權就成為近年來一個研究的熱門問題。為了解決這個問題,在本論文中提出了藏入數位影像中以保護該影像所有權之數位影像浮水印技術,並且這個數位浮水印技術能夠抵抗各種惡意或非惡意之攻擊。
在論文中第一、兩章的部分,是針對本研究主題背景與動機作簡介,並介紹五大類已提出之抗幾何攻擊浮水印技術。而第三章部分,提出了一個基於直方圖特性且不須原圖就能粹取浮水印的方法。藉由定義原始影像彩色空間的晶狀結構來藏匿浮水印的資料。並且計算出影像中不同特性之直方圖,並依照其像素數量與分佈作等份切割為眾多動態區間。透過調整各個區間中像素的分佈來達到藏匿浮水印的工作。並利用StirMark3.1中所提供之各種對於影像之攻擊法。來測試所提出之浮水印技術對於訊號處理攻擊、幾何攻擊或是高比例之影像壓縮的抵抗能力。在本論文第四章部分,我們提出了新一代的影像浮水印技術之演算法。不但保有浮水印技術強韌與高承載之特性並克服了輕微幾何攻擊對浮水印功能之破壞。
最後,也對本研究主題目前的研究作一個結論。並對於未來所要繼續加以努力的方向提出願景。
Abstract
Developing a robust method of image watermarking that resists rotation, scaling and/or translation (RST) transformations is widely considered to be a more challenging task than developing a method resistant to other attacks. Altering the orientation or size of the image, even only slightly, reduces the receiver’s ability to retrieve the watermark. Protecting against both geometric distortion and signal processing with blind detection is even more problematic. This investigation proposes a novel approach, based on the properties of histograms to measure the numerous global features of all pixels in a cover image and to construct the three-dimensional feature space. The feature space is dynamically partitioned to identify several blocks used to embed the watermark. One feature of the pixels is modified to form a specially distributed histogram for embedding the watermark in a blind digital watermarking method that can be applied to color images. Experimental results demonstrate the robustness of the proposed method against common geometric attacks and signal processing.
目次 Table of Contents
中文摘要------------------------------------------------------------------------------------------6
List of Figures -----------------------------------------------------------------------------------7
List of Tables ------------------------------------------------------------------------------------9
Chapter 1 Introduction ----------------------------------------------------------------------10
1.1 Motivation and Recent Related Research --------------------------------------10
1.2 Main Contributions of the Proposal ---------------------------------------------17
1.3 Organization of the Proposal -----------------------------------------------------18
Chapter 2 Relational Literature Review -------------------------------------------------20
2.1 Invariant Domain Watermarking Scheme------------------------------------------20
2.1.1
參考文獻 References
[1] D. C. Lou, J. L. Liu, “Fault Resilient and Compression Tolerant Digital Signature for Image Authentication”, IEEE Trans. Consumer Electronics, vol. 46, no. 1, pp. 31-39, Feb. 2000.
[2] J. Lee, C. S. Won, ”A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction”, IEEE Trans. Consumer Electronics, vol. 46, no. 2, pp. 313-317, May. 2000.
[3] M. U. Celik, G. Sharma, E. Saber, A. M. Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization”, IEEE Trans. Image Processing, vol. 11, no. 6, pp. 585-595, Jun. 2002.
[4] M. Holliman and N. Memon, ”Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes”, IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, Mar. 2000.
[5] J. Eggers, B. Girod, “Blind Watermarking Applied to Image Authentication”, in. Proc. IEEE ICASSP, Salt Lake City, UT, vol. 3, pp. 1977- 1980, May. 2001.
[6] Bartolini, F., Tefas, A., Barni, M., Pitas, I., “Image Authentication Techniques for Surveillance Applications”, in Proc. IEEE , vol. 89, no. 10, pp. 1403- 1418, Oct. 2001.
[8] Nopporn Chotikakamthorn and Wasin Sangiamkun, “Digital Watermarking Technique for Image Authentication by Neighboring Block Similarity Measure”, Electrical and Electronic Technology, TENCON, Proceeding of IEEE Region 10 International Conference on, vol. 2, pp. 743-747, 2001.
[9] Christian Rey and Jean-Luc Dugelay, “Blind Detection of Malicious Alterations on Still Image Using Robust Watermarks”, IEE, Savoy Place, London WC2R, pp. 7/1-7/6, 2000.
[10] Kostopoulos, S. A. M. Gilani, and A. N. Skodras, “Colour Image Authentication Based on A Self-Embedding Technique”, in IEEE Conf. DSP, pp. 733-736, 2002.
[11] C. T. Li, F. M. Yang, and C. S. Lee, “Oblivious Fragile Watermarking Scheme for Image Authentication”, in Proc. IEEE, pp. 3445-3448, 2002.
[12] H. Zhong, F. Liu, and L. C. Jiao, “A New Fragile Watermarking Technique for Image Authentication”, in Proc. IEEE, pp. 792-795, 2002.
[13] J. D. Ferrer, and F. Sebe, “Invertible Spread-Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images”, Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC’02), 2002.
[14] Liehua Xie, Gonzalo R. Arce, and Richard F. Graveman, “Approximate Image Message Authentication Codes”, IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242-252, Jun 2001.
[15] C. S. Collberg, and C. Thomborson, “Watermarking, Tamper-Proofing, and Obfuscation – Tools for Software Protection”, IEEE Trans. Software Engineering, vol. 28, no. 8, pp. 735-746, Aug 2002.
[16] J. Lee, and C. S. Won, “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction”, IEEE Consumer Electronics Contributed Paper, pp. 313-317, Mar 2000.
[17] C. Y. Lin and S. F. Chang, “A Robust Image Authentication Method Distinguish JPEG Compression from Malicious Manipulation”, IEEE Trans. Circuits and Systems of Video Technology, vol. 11, no. 2, pp. 153-168, Feb 2001.
[18] A. H. Paquet, and R. K. Ward, “Wavelet-Based Digital Watermarking for Image Authentication”, Proc. of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering, pp. 879-884, 2002.
[19] J. Hu, J. Huang, D. Huang, and Y. Q. Shi, “Image fragile watermarking based on fusion of multi-resolution tamper detection”, IEE Electronics Letters, vol. 38, no. 24, pp. 1512-1513, Nov 2002.
[20] C. S. Lu, and H. Y. Mark Liao, “Multipurpose Watermarking for Image Authentication and Protection”, IEEE Trans. Image Processing, vol. 10, no. 10, pp. 1579-1592, Oct 2001.
[21] R. Radhakrishman, and Nasir Memon, “On the Security of the Digest Function in the SARI Image Authentication System”, IEEE Trans. Circuits and Systems for Video Technology, vol. 12, no. 11, pp. 1030-1033, Nov 2002.
[22] P. W. Wong, N. Memon, “Secret and Public key Watermarking Schemes for Image Authentication and Ownership Verification”, IEEE Trans. Image Processing, vol. 10, no. 10, pp. 1593-1601, Oct. 2001.
[23] P.S.L.M Barreto, H.Y. Kim, and V. Rijmen, “Toward Secure Public-Key Blockwise Fragile Authentication Watermarking”, IEE Proc.–Vis. Image Signal Process., vol. 149, no. 2, pp. 57-62, Apr 2002.
[24] P. W. Wong, “A Public Key Watermark for Image Verification and Authentication”, Proceedings of IEEE International Conference on Image processing, 1998, vol. 1, pp. 455-459, Oct. 1998.
[25] H. A. Wen, C. M. Lo, and T. Hwang, “Publicly Verifiable Authenticated Encryption”, IEE Electronics Letters, vol. 39, no. 19, pp. 1382-1383, Sep 2003.
[26] D. C. Lou, and J. L. Liu, “Fault Resilient and Compression Tolerant Digital Signature for Image Authentication”, IEEE Consumer Electronics Contributed Paper, pp. 31-39, 2000.
[27] J. J. Eggers, and B. Girod, “Blind Watermarking Applied to Image Authentication”, in Proc. IEEE, pp. 1977-1980, 2001.
[28] LU, Z.M., LIU, C.H., XU, D.G., and SUN, S.H.: ‘Semi-fragile image watermarking method based on index constrained vector quantization’, Electron. Lett., 39, (1), pp. 36-37, 2003
[29] S. N. E. Din, and M. Moniri, “Fragile and Semi-Fragile Image Authentication Based on Image Self-Similarity”, in ICIP Proc. IEEE, pp. 897-900, 2002.
[30] Q. Sun, and S. F. Chang, “Semi-Fragile Image Authentication Using Generic Wavelet Domain Features and ECC” , in ICIP Proc. IEEE, pp. 901-904, 2002.
[31] R. Sun, H. Sun, and T. Yao, “A SVD- and Quantization Based Semi-Fraile Watermarking Technique for Image Authentication”, in ICSP Proc. IEEE, pp. 1592-1595, 2002.
[32] Q. Sun, S. F. Chang, M. Kurato, and M. Suto, “A Quantitive Semi-Fragile JPEG2000 Image Authentication System”, in ICIP Proc. IEEE, pp. 921-924, 2002.
[33] Q. Sun, S. F. Chang, M. Kurato, and M. Suto, “A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructures”, in Proc. IEEE, pp. 440-443, 2002.
[34] J. Fridrich, and M. Goljan, “Image with Self-Correcting Capabilities”, in Proc. IEEE, pp. 792-796, 1999.
[35] Gonzalez, R.C., and Woods R.E.: ‘Digital image processing’, Addison-Wesley, pp. 413-443, 1992.
[36] J.O’Ruanaidh and T. Pun, “Rotation, scale, and translation invariant digital image watermarking,” Signal Processing, vol. 66, no. 3, pp. 303-317,May 1998.
[37] C. Lin, M. Wu, J. Bloom, I. Cox, M. Miller, and Y. Lui, ”Rotation, scale, and translation resilient watermarking for images,” IEEE Trans. Image Processing, vol. 10, pp. 767-782, May 2001.
[38] D. Zheng, J. Zhao, and Abdulmotaleb El Saddik, “RST-invariant digital image watermarking based on log-polar mapping and phase correlation,” IEEE Trans. Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 753-765, August 2003.
[39] S. Pereira and T. Pun, “Robust template matching for affine resistant image watermarks,” IEEE Trans. Image Processing, vol. 9, pp. 1123-1129, June 2000.
[40] X. Kang, J. Huang, Y. Q. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Trans. Circuits and Systems for Video Technology, vol 13, no. 8, pp. 776-786, August 2003.
[41] P. Bas, N. V. Boulgouris, F. D. Koravos, J.-M. Chassery,M. G. Strintzis, and B. Macq, “Robust watermarking of video objects for MPEG-4 applications,” in Proc. SPIE, Applications of Digital Image Processing XXIV, vol. 4472, pp. 85–94, Dec 2001.
[42] P. Bas, J.-M. Chassery, and B. Macq, “Image watermarking: an evolution to content based approaches,” Pattern Recognit., vol. 35, no. 3, pp. 545–561, Mar. 2002.
[43] M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi, “Toward second generation watermarking schemes,” in Proc. IEEE Int. Conf. Image Processing, vol. 1, Kobe, Japan, pp. 320–323, Oct. 1999.
[44] N. Nikolaidis and I. Pitas, “Robust watermarking of facial images based on salient geometric pattern matching,” IEEE Trans. Multimedia, vol. 2, pp. 172–184, Sept. 2000. Signal Processing, vol. 2002, no. 4, pp. 418–431, Apr. 2002.
[45] C. W. Tang, and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Trans. Signal Processing, vol. 51, no 4, pp. 950-959, April 2003.
[46] M. Kutter, “Watermarking resistance to translation, rotation, and scaling, ” in Proc. SPIE Multimedia Systems and Applications, vol. 3528, pp.423-431, 1998.
[47] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Content adaptive watermarking
based on a stochastic multiresolution image modeling,” in Proc. 10th European Signal Processing Conf. (EUSIPCO’2000), Tampere, Finland, Sept. 2000.
[48] H. J. Shim and B. Jeon, “Rotation, scaling, and translation robust image watermarking using Gabor kernels,” in Proc. SPIE: Security and Watermarking of Multimedia Contents IV, vol. 4675, San Jose, CA, pp. 563–571, Jan 2002.
[49] S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun,
“Generalized watermark attack based on watermark estimation and perceptual
remodulation,” in Proc. SPIE: Electronic Imaging 2000, Security and Watermarking of Multimedia Content II, vol. 3971, San Jose,CA, 2000.
[50] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Multibit digital watermarking
robust against local nonlinear geometrical distortions,” in Proc. IEEE Int. Conf. Image Processing, vol. 3, Thessaloniki, Greece, pp. 999–1002, 2001.
[51] D. Coltuc and Ph. Bolon, “Robust Watermarking by Histogram Specification”, 6th IEEE Conf. on Image Processing(ICIP’99), Vol. 2, Kobe, Japan, pp.236-239, October 1999.
[52] G. Chareyron, B. Macq and A. Tremeau, “Watermarking of Color Images Based on Segmentation of the XYZ Color Space”, CGIV 2004 – Second European Conference on Color in Graphics, Imaging and Vision, Aachen, Germany, pp. 178-182; ISBN/ISSN: 0-89208-250-X, April 2004.
[53] S. Roy and E. C. Chang, “Watermarking Color Histogram”, Proc. IEEE International Conference on Image Processing, Singapore, 2004.
[54] Vinicius Licks, Ramiro Jordan, "Geometric Attacks on Image Watermarking Systems," IEEE MultiMedia, vol. 12, no. 3, pp. 68-78, Jul-Sept, 2005.
[55]. P. Loo and N.G. Kingsbury, “Watermarking Using Complex Wavelets with Resistance to Geometric Distortion,” Proc. 10th European Signal Processing
Conf. (EUSIPCO 2000), European Assoc. for Signal, Speech, and Image Processing, vol. 3, pp. 1677-1680, 2000.
[56]. M. Barni et al., “Geometric-Invariant Robust Watermarking through constellation Matching in the Frequency Domain,” Proc. 7th IEEE Int’l Conf. Image
Processing (ICIP 2000), vol. II, IEEE Press, pp. 65-68, 2000.
[57]. M. Alghoniemy and A.H. Tewfik, “Geometric Distortions Correction in Image Watermarking,” Proc. SPIE Conf. Security and Watermarking of Multimedia
Contents II, vol. 3971, Int’l Soc. for Optical Eng. (SPIE), pp. 82-89, 2000.
[58] Jae S. Lim. Two-Dimensional Signal and Image Processing. Prentice-Hall International, 1990.
[59] D.J. Fleet and D.J. Heger, “Embedding Invisible Information in Color Images,” Proc. IEEE Int’l Conf. Image Processing (ICIP 1997), vol. 1, IEEE CS Press, pp. 532-535, 1997.
[60] S. Pereira and T. Pun, “An Iterative Template-Matching Algorithm Using the Chirp-z Transform for Digital Image Watermarking,” Pattern Recognition, vol. 33, no. 1, pp. 173-175, Jan. 2000.
[61] S. Pereira et al., “Template-Based Recovery of Fourier-Based Watermarks Using Log −Polar and Log −Log Maps,” IEEE Multimedia Systems 99, Int’l Conf. Multimedia Computing and Systems, vol. 1, IEEE CS Press, pp. 870-874, 1999.
[62] P. Bas, J.-M. Chassery, and B. Macq, “Robust Watermarking Based on the Warping of Predefined Triangular Patterns,” Proc. SPIE, Int’l Soc. for Optical Eng. (SPIE), vol. 3971, pp. 99-109, 2000.
[63] P.M.J. Rongen, M.J. Maes, and C.W. van Overfeld, “Digital Image Watermarking by Salient Point Modification Practical Results,” Proc. SPIE, vol. 3657, Int’l Soc. for Optical Eng. (SPIE), pp. 273-282, 1999.
[64] C. Harris and M. Stephen, “A combined corner and edge detector,” in Proc. 4th Alvey Vision Conf., pp. 147-151, 1988.
[65] J. Devars, C. Achard-Rouquet, and E. Bigorgne, “Un detecteur de point carateristiques sur des images multispectrals. Extension vers un detecteur sub-pixellique, “in Proc. GRETSI 99, pp. 627-630, September 1999.
[66] S. M. Smith and J. M. Brady, “Susan- A new approach to low level image processing,” Int. J. Comput. Vis., vol.23, no. 1, pp. 45-78, May 1997.
[67] F. Hartung , J.K. Su, and B. Girod, “Spread Spectrum Watermarking: Malicious Attacks and Counterattacks,” Proc. SPIE: Security and Watermarking of Multimedia Contents, vol. 3657, Int’l Soc. For Optical Eng. (SPIE), pp. 147-158, 1999.
[68] D. Delannay and B. Macq, “Generalized 2D Cyclic Patterns for Secret Watermark Generation,” Proc. IEEE Int’l Conf. Image Processing (ICIP 2000), vol. II,
IEEE Press, pp. 72-79, 2000.
[69] F. Deguillaume, S. Voloshynovskiy, and T. Pun,“Method for the Estimation and Recovering from General Affine Transforms in Digital Watermarking Applications,” Proc. SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, SPIE, vol. 4675, pp. 313-322, 2002.
[70] S.Voloshynovskiy, F. Deguillaume and T. Pun, “Content adaptive watermarking based on a stochastic multiresolution image modeling”, EUSIPC02000, X European Signal Processing Conference, Tampere, Finland, September 2000.
[71] L.J. Wang, W.S. Hsieh, T.K. Truong, I. S. Reed and T. C. Cheng, ” A Fast Efficient Computation of Cubic-Spline Interpolation in Image Codec”, IEEE Transactions On Signal Processing, VOL. 49, NO. 6, pp. 1189-1197, June 2001.
[72] Stirmark. [Online]. Avaiable: http://www.petitcolas.net/fabien/watermarking/stir-
mark/
[73]D. Simitopoulos, D. E. Koutsonanos, and M. G. Strintzis, ”Robust Image Watermarking Based on Generalized Radon Transformations”, IEEE Transactions On Circuits and Systems for Video Technology, VOL. 13, NO. 8, pp. 732-745, August 2003.
[74]J. F. Canny, “A computational approach to edge detection”, IEEE Trans. Pattern Analysis and Machine Intelligence, VOL. 8, NO. 6, pp. 679-698. 1986.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code