透過您的圖書館登入
IP:3.142.255.18
  • 學位論文

數位浮水印技術用於積體電路矽智產與多媒體系統之設計與實現

Design and Implementation of Digital Watermarking for SOC IP Identification, Multimedia Protection and Authentication

指導教授 : 曹恆偉
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


數位浮水印與數位智產管理的設計是本論文的研究主題。我們以三個主要的數位浮水印-積體電路矽智產浮水印,可視型小波浮水印,與脆弱型小波浮水印為研究實例,針對各種浮水印的特性,分別提出新的演算法、硬體架構或電路,並提出數位智產管理平台的建立。 在積體電路矽智產浮水印上,我們提出以測試電路為基礎的積體電路矽智產認證技術,我們將預先設計好的浮水印,嵌入積體電路矽智產的測試電路之中,並建立積體電路矽智產的管理平台,當客戶使用矽智產時,透過浮水印認證技術,即可獲得設計者或矽智產提供者所授與的積體電路。在這個方法中,結合了矽智產浮水印認證技術與密碼技術,並藉由積體電路矽智產管理平台的協助,達到積體電路矽智產保護的目的,這是一個創新且實用的設計方法。 在可視型小波浮水印上,我們提出以數位小波轉換為基礎的可視型浮水印,我們根據小波轉換的特性,將小波影像分成亮度特性與空間特性做處理,並將人類視覺系統考慮於浮水印的設計中,得到良好的視覺效果。接著,我們採用係數近似、數值化簡技術及硬體電路共享技術以降低電路架構複雜度,整個電路採用聯華電子0.18um的製程技術加以實現,經由實驗證明後,我們提出的方法確實可大量簡少硬體複雜度,並提供高品質的可視型浮水印。 在脆弱型小波浮水印上,我們提出以數位小波轉換為基礎的脆弱型浮水印,我們依據小波係數的分佈,將係數加以重新編碼後,設計出具有影像特徵的脆弱型浮水印,並將浮水印嵌入小波係數之中,當影像被篡改時,脆弱型浮水印可偵測出影像的篡改,並找出篡改的位置,由於所提出的脆弱型浮水印,具有原始影像的特徵,利用倒傳式類神經網路,可分析出影像受到何種篡改方式。經由實驗證明後,所提出的脆弱型浮水印有很好的視覺品質,並可偵測大部份的影像篡改,這個方法確實具新穎性及實用性。 數位浮水印技術及數位智產管理平台是目前很重要的研究領域,本論文提出的三種數位浮水印技術及相關的數位智產管理平台,成功解決了許多現今的一些重要問題,對於日益重要的智產保護與管理領域,提供了可行的方法。

並列摘要


In this dissertation, the algorithm and architecture design and implementation of digital watermarking coding system are presented. The research focuses on three watermarking system: SoC IP watermarking for IP identification and digital right management framework, wavelet-based visible watermarking and fragile watermarking. Advances in semiconductor processing technology have led to rapid increases in integrated circuit (IC) design complexity. Intellectual property (IP)-based design methodologies have become a major concern in IC industries. Design reuse leads to the development of intellectual property identification techniques. A novel testing-based watermarking scheme for intellectual property (IP) identification is proposed. The principles are established for development of new watermarking IP identification procedures that depend on current IP-based design flow. Then, the digital right management framework for IP release is developed according IP identification technology. IP vendor or designer can protect and manage IPs adopting this method. The proposed scheme provides IP identification and digital right management complete solution. Visible watermarking schemes are important intellectual property right protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Efficient hardware architecture of wavelet-based adaptive visible watermarking is presented that adopts approximate technique, numerical reduction and resource sharing technique to reduce hardware complexity. Luminance characteristics are calculated to estimating the effect of background luminance. Local spatial characteristics are analyzed to characterize the activity level of pixels. The watermark image is embedding by modifying the coefficients of the host image according to scaling factor. According to experimental results, our method reduces the hardware complexity and holds high image quality. The experimental results have proven the proposed architecture is indeed hardware-effective. A fragile watermark is useful in image authentication applications. A novel wavelet-based fragile watermarking scheme is designed according to the wavelet coefficients of the host image. This fragile watermark records the characteristics of the original image and is extracted without original image. After the fragile watermark is extracted, the approximate host image can be reconstructed. Then a modified image can be detected according to the fragile watermark and the reconstructed image. Afterward, an artificial neural network is used to analyze the tampering of the host image, locate where the tampering has occurred, and identify what kind of alteration has occurred. The fragile watermark provides sufficient authentication evidence. This method is novel and efficient. In this dissertation, a testing-based IP watermarking, wavelet-based visible watermarking and fragile watermarking are designed and implemented. Solving remaining open problems related to digital watermarking and DRM developments are future research direction of the author.

參考文獻


[1]W. J. Mitchell, “When is Seeing Believing?” Scientific American, pp. 68-73, Feb 1994.
[2]B. B. Zhu, M. D. Swanson, A. H. Tewfik, “When seeing isn't believing,” IEEE Signal Processing Magazine, vol 21, no 2, pp. 40-49, March 2004.
[5]C. S. Lu, Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, IDEA Group Publishers, June 2004.
[6]C. H. Huang, and J. L. Wu, “Attacking visible watermarking schemes,” IEEE Transactions on Multimedia, vol.: 6, no. 1, pp: 16-30, Feb. 2004.
[7]I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol.: 6, pp. 1673-1687, Dec. 1997.

延伸閱讀