透過您的圖書館登入
IP:3.146.255.127
  • 學位論文

結合小波轉換與視覺密碼在數位浮水印上之應用

Watermarking Scheme based on wavelet and visual cryptography

指導教授 : 侯永昌

摘要


近年來,由於電腦與網際網路發展持續進步,使得人們取得各方面資訊越來越方便,大量的數位化資料在網際網路間公開的流通。不過由於數位化資訊太容易取得,導致不肖人士利用電腦及網際網路竊取、修改他人資訊也變得比以往簡單太多,因此如何將數位資產的智慧財產權保護就顯得非常重要。而數位浮水印技術即是一種用來保護數位影像的智慧財產權的一種方法。其目的為將個人資訊加入到欲保護的數位資產中的方法,日後受保護的數位資產發生爭議時,便可取出以證明其所有權,達到保護資產與驗證所有權目的。而Naor 及Shamir於1994年提出視覺密碼後,陸續有研究以結合視覺密碼與浮水印技術進行影像所有權的保護方案。本研究以視覺密碼及頻率域小波轉換的資訊為基礎,不論是灰階影像或全彩影像皆發展出一個數位浮水印的技術,利用統計學的中位數來產生視覺密碼所需要的分享影像,以期不需要利用大量的統計複雜理論及運算也能得到相同的良好結果。實驗結果得知,本研究在經過各種影像攻擊都能有良好的抵抗性。

並列摘要


In recent era, with the continuous advancement of computer and internet technology, it becomes much easier for common folks to obtain various information. Enormous amount of digital data are roaming in public access. As great convenience often came with price, it also becomes much easier for malicious third party members to steal, forge information. Therefore it becomes evidently important to protect the digital intellectual property, and the digital watermark technology is one of the many methods. The sole purpose of digital watermark technology is to inject personal data to the intellectual property that ones want to protect, and when the protected intellectual property faces controversy, one will be able to prove ownership from the injected information. Since Naor and Shamir published the idea of visual encryption in 1994, many researches on the same topic start to broom over the years. This purposed research will be based on visual encryption and frequency transfer, to develop a brand new digital watermark technology, whether it is a full color or gray scale image, and use statistical median to obtain the actual visual encryption so that in the absence of complex statistical theory and calculation, one can still achieve well-accepted result. As result of this research, the outcome has great resistance to various visual attacks.

參考文獻


[3] 黃培修,〈結合非擴展式視覺密碼與機率理論於數位影像之保護〉,淡江大學資訊管理學系碩士論文,九十六年六月。
[4] 劉馨茹,〈應用統計特性於智慧財產權保護〉,淡江大學資訊管理學系碩士論文,九十八年六月。
[6] Lee S.J. and Jung S.H., “A Survey of Watermarking Techniques Applied to Multimedia”, Proceedings of IEEE International Symposium on Industrial Electronics vol. 1 (2001), pp. 272-277.
[8] Blundo, C. and De Santis, A., “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels”, Computer & Graphics (12:4), 1998: pp. 449-455.
[11] Y.C. Hou, C.Y. Chang, and C.S. Hsu, “Visual Cryptography for Color Images Without Pixel Expansion,” in Proceeding of CISST'2001, Vol. I, 2001,pp. 239-245, Las Vegas, Nevada.

延伸閱讀