透過您的圖書館登入
IP:3.138.124.40
  • 學位論文

可逆式數位影像認證技術之研究

The Study of Reversible Authentication Techniques for Digital Images

指導教授 : 張真誠
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


影像認證是一種偵測圖片遭竄改區域的技術。此外,可逆式影像認證可以讓沒有遭到竄改的圖片無失真地復原成原始的版本。 “優良影像品質的可逆式數位影像之認證方法”是我們在此論文中提出的第一個可逆式認證方法。這個方法將目標影像分成平滑影像區塊以及複雜影像區塊,根據影像區塊種類的不同,用不同的藏入方法將驗證碼藏入影像區塊中,以供之後的驗證之用。 第二個可逆式影像認證方法是“基於菱形預測和區域複雜度的有效可逆式影像認證”。在這個方法中,我們使用差值擴張和菱形預測來藏入驗證碼。在擁有高精準度之竄改偵測的同時,這個方法也維持良好的偽裝影像品質,以及影像的可復原性。

並列摘要


The authentication scheme is a technique that detects tampered areas in images. Additionally, reversible authentication allows images to be reconstructed to their original version without any distortion if these images had not been tampered. “A Reversible Authentication Scheme for Digital Images with High-Quality Images” is first proposed scheme of reversible authentication in this thesis. This scheme classifies the host image into smooth blocks and complex blocks, and then authentication codes are embedded adaptively into each image block for afterward verifying. The experimental results demonstrated that the scheme obtained good tamper detection and preserved the high image quality of the embedded image The second reversible authentication scheme is “Effective reversible image authentication based on rhombus prediction and local complexity”. In this scheme, difference expansion and rhombus prediction are used for embedding the authentication code. With high accuracy of tamper detection, it maintains good quality of stego images and reversibility at the same time.

參考文獻


[1] C.C. Chang, Y.H. Fan, W.L. Tai, Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition 41 (2) (2008) 654–661.
[2] P.Y. Lin, J.S. Lee, C.C. Chang, Dual digital watermarking for internet media based on hybrid strategies, IEEE Transactions on Circuits and Systems for Video Technology 19 (8) (2009) 1169–1171.
[4] L. Xie, G.R. Arce, R.F. Graveman, Approximate image message authentication codes, IEEE Transactions on Multimedia 3 (2) (2001) 242–252.
[5] S. Ababneh, R. Ansari, A. Khokhar, Iterative compensation schemes for multimedia content authentication, Journal of Visual Communication and Image Representation 20 (5) (2009) 303–311.
[6] A. Swaminathan, M. Wu, K.J.R. Liu, Digital image forensics via intrinsic fingerprints, IEEE Transactions on Information Forensics and Security 2(3) (2008) 101–117.

延伸閱讀