透過您的圖書館登入
IP:3.135.183.187
  • 學位論文

植基於尺度不變特徵轉換之強韌型浮水印技術之研究

The Study on SIFT-Based Robust Watermarking Technology

指導教授 : 洪國龍
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


本論文提出一個以特徵點為基礎的強韌型浮水印方法,其方法使用SIFT技術在原始影像中尋找特徵點,再根據特徵點所形成的局部特徵區域(Local Feature Region, LFR)做影像正規化成一個固定大小和方向的正規化影像(Normalized Image),最後再對Normalized Image進行浮水印的嵌入和偵測。本篇提出的方法,不僅可抵抗全域變形,還可抵抗區域變形,根據實驗數據顯示,本方法優於Lu學者的方法。在本方法中,是利用統計的方式驗證浮水印的存在性,所以不需使用原始影像,因此,我們提出一個有效的浮水印方法。

並列摘要


This paper presents a feature-based robust watermarking scheme. The proposed method is to discover the feature from original image against SIFT technique and then proceed with image normalization based on local feature region (LFR) to create one normalized image with fixative size and direction. Afterwards, proceed with the embedding and detection process toward the normalized image. In this proposed method, it can counteract not only the global transformation but local transformation. According to the experimental data, the proposed method is better than Lu’s method; furthermore, the existence of watermark can also be verified by only using the statistic method without any requirement of original image. Therefore, our proposed method is an efficient and effective watermarking method.

參考文獻


[18] M. S. Hwang, C. C. Chang, and K. F. Hwang(1999), “A watermark technique based on one-way hash coding functions,” IEEE Transactions on Image Processing, Vol. 45, No. 2, pp. 286-294.
[21] W. N. Lie, G. S. Lin, C. L. Wu, and T. C. Wang(2000), “Robust image watermarking on the DCT domain,” ISCAS 2000 - IEEE International Symposium on Circuits and Systems, Vol. 1, pp. 228-231.
[5] A. Piva, M. Bartolini, and V. Cappellini(1997), “DCT-based watermark recovering without resorting to the uncorrupted original image,” In. Conf. Image Processing, Vol. 1, pp. 520-523.
[6] C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai(2007), “Reversible hiding in DCT-based compressed image,” Information Sciences, Vol. 177, No. 13, pp. 2768-2786.
[7] C. C. Thien and J. C. Lin(2003), “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, Vol. 36, pp. 2875-2881.

延伸閱讀