透過您的圖書館登入
IP:18.188.40.207
  • 學位論文

應用統計特性於智慧財產權保護

Protecting Intellectual Property Rights Based on Features of Statistics

指導教授 : 侯永昌

摘要


隨著電腦與網際網路持續的發展創新,科技帶給人們的便利就不斷的衝擊人類社會,人與人之間資訊的交流比早期電腦還未發展時來的更加的容易且頻繁。但也因為如此,竊取、修改他人資訊也變得比以往簡單太多,不肖人士利用電腦及網路即可非法取得資料,因此如何防堵資料被偷竊與竄改就顯得非常重要。數位浮水印技術是一種將個人資訊加入到欲保護的媒體中的方法,日後受保護的媒體產生爭議時,便可取出以證明其所有權,達到保護資產與驗證所有權目的。本研究以視覺密碼為基礎,應用統計學中大數法則所帶來的守恆特性產生視覺密碼所需要的分享影像。本研究的優點有三個:一,我們的方法以頻率域的方式嵌入浮水印,產生不擴展的分享影像,降低了像素值易受攻擊的影響。二,驗證所有權的過程不需要原圖的輔助即可取出浮水印。三,解決了保護影像被攻擊後的浮水印強韌性不佳的問題。實驗結果證明,本研究對於dark、light、blur、sharpen、noise、distort、jitter、jpeg、crop等攻擊有優異的抵抗性。

並列摘要


Because computer technology is developed so fast, people enjoy the convenience it brings to us everyday. On the other hand, hackers may access the confidential data illegally and easily by the computer and the Internet. Therefore, how to protect these important data against being stolen or modified is an essential issue. Digital watermark is a method which is to add a personal information into an intellectual property to protect its’ ownership right. When someday the intellectual property is disputed, the owner can retrieve the watermark and prove their ownership right. Our study based on the properties of visual cryptography and statistics to generate the shares during the processes of embedding and verifying the hidden watermark. There are three advantages of our study. 1. We embedded the watermark by frequency domain and created unexpanded shares, which reduced the impact of pixel modification effectively. 2. Our method does not require the help of the original image during the verification process. 3. We solve the robustness problem when protected image suffered from attack. Experimental results indicated that our method had a good robustness on dark, light, blur, sharpen, noise, distort, jitter, jpeg, and crop attacks.

參考文獻


[9] 黃培修,《結合非擴展式視覺密碼與機率理論於數位影像之保護》,碩士論文,淡江大學資訊管理所,九十六年六月。
[2] 杜淑芬,侯永昌,《像素不擴展之彩色視覺密碼技術》, Journal of Information, Technology and Society, 2004(1), 頁95-110。
[5] 官振宇,《有意義分享影像之漸進式視覺密碼》,碩士論文,淡江大學資訊管理研究所,民國九十八年六月。
[13] Chang C.C., Hsiao J.Y., and Yeh J.C., “A Colour Image Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform,” Imaging Science Journal, vol. 50, 2002, pp.133-140.
[14] Fang W.P., “Friendly Progressive Visual Secret Sharing,” Pattern Recognition, Vol. 41, 2008, pp. 1410-1414.

被引用紀錄


楊智堯(2014)。結合小波轉換與視覺密碼在數位浮水印上之應用〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2014.00263

延伸閱讀