Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/24227
標題: 一種植基於正規化隨機矩陣固定點的影像認證技術研究
A Study of Image Authentication Technique Based on Fixed Point of Regular Stochastic Matrix
作者: 黃暐程
Haung, Wei-Cheng
關鍵字: Image authentication
影像認證
watermarking technique
Markov chain
tamper detection
image manipulation
浮水印
馬可夫鏈
竄改偵測
影像操作
出版社: 資訊管理學系所
引用: 參考文獻 [1] G.I. Friedman, “The trustworthy digital camera: restoring credibility to the photographic image,” Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, 1998, pp. 409-413. [2] J. Dittmann, A. Steinmetz, R. Steinmetz, “Content-based digital signature for motion pictures authentication and content-fragile watermarking,” IEEE International Conference on Multimedia Computing and Systems, vol. II, Italy, 1999, pp. 209-213. [3] C.Y. Lin, S.F. Chang, “A robust image authentication method surviving JPEG lossy compression,” SPIE Storage and Retrieval of Image/Video Databases, 1998, pp. 296-307. [4] C.Y. Lin, S.F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Trans. Circuits Syst. Video Technol, vol. 11, no. 2, 2001, pp. 153-168. [5] M.U. Celik, G. Sharma, E. Saber, A.M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Trans. Image Process, vol. 11, no. 6, 2002, pp. 585-594. [6] M.U. Celik, G. Sharma, A.M. Tekalp, “Lossless watermarking for image authentication: a new framework and an implementation,” IEEE Trans. Image Process, vol. 15, no. 4, 2006, pp. 1042-1049. [7] Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, and Bin-Yuan Huang “A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter,” ATC ''08 Proceedings of the 5th international conference on Autonomic and Trusted Computing, Verlag Berlin Heidelberg, 2008, pp. 626-640. [8] J. Fridrich, M. Goljan, A.C. Baldoza, “New fragile authentication watermark for images,” Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, 2000, pp. 10-13. [9] C.S. Lu, H.Y.M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Trans. Image Process, vol. 10, 2001, pp. 435-439. [10] K. Maeno, Q. Sun, S.F. Chang, “New semi-fragile images authentication watermarking techniques using random bias and nonuniform quantization,” IEEE Trans. Multimed, vol. 8, no. 1, 2006, pp. 32-45. [11] P.W. Wong, “A public key watermark for image verification and authentication,” Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, 1998, pp. 455-459. [12] P.W. Wong, N. Memon, “Secret an public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Process, vol. 10, no.10, 2001, pp. 1593-1601. [13] C.Y. Lin, S.F. Chang, “Semi-fragile watermarking for authenticating JPEG visual content,” SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, no. 13, EI ’00, San Jose, USA, January 2000. [14] J. Fridrich, “A hybrid watermark for tamper detection in digital images,” International Symposium on Signal Processing and Its Applications, vol. 1, 1999, pp. 301-304. [15] Lin ET, Christine I, Podilchuk B, Delp EJ, “Detection of image alterations using semi-fragile watermarks,” Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol. 3971, San Jose, CA, USA, 2000. [16] Z.M. Lu, C.H. Liu, D.G. Xu, “Semi-fragile image watermarking method based on index constrained vector quantization,” Electron Letters, vol. 39, no. 1, 2003, pp. 35-36. [17] H.C. Huang, F.H. Wang and J.S. Pan, “Efficient and robust watermarking algorithm with vector quantization,” Electronics Letters, vol. 37, no. 13, 2001, pp. 826-828. [18] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, no. 3, 1998, pp. 385-403. [19] X. Kang, J. Huang, Y. Q. Shi and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, 2003, pp. 776-786. [20] W. Y. Chen and C. H. Chen, “A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection,” Pattern Recognition, vol. 38, no. 4, 2005, pp. 587-598. [21] Hoel, P., Port, S., Stone, C.,《Introduction to Stochastic Processes》, Houglition Mifflin, 1972. [22] Chun-Wei Yang, Jau-Ji Shen, “Recover the Tampered Image Based on VQ Indexing,” Signal Processing, 2010, pp. 331-343. [23] P.L. Lin, P.W. Huang, A.W. Peng, “A fragile watermarking scheme for image authentication with localization and recovery,” IEEE Sixth International Symposium on Multimedia Software Engineering, 13-15 December 2004, pp. 146–153. [24] P.L. Lin, C.K. Hsieh, P.W. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, vol. 38, 2005, pp. 2519-2529. [25] C.L. Wang, R.H. Hwang, T.-S. Chen, H.-Y. Lee, “Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding,” 19th International Conference on Advanced Information Networking and Applications, 2005. [26] T.Y. Lee, S.F. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, 2008, pp. 3497-3506. [27] S.S. Wang, S.L. Tsai, “Automatic image authentication and recovery using fractal code embedding and image inpainting,” Pattern Recognition, vol. 41, 2008, pp. 701-712. [28] 陳同孝、張真誠及黃國峰,數位影像處理技術(Digital Image Processing Techniques),旗標出版股份有限公司,2003 年5月。 [29] R.M. Gray, “Vector Quantization,” IEEE ASSP Magazine, 1984, pp. 4-29. [30] Y. Linde, A. Buzo and R.M. Gray, “An algorithm for vector quantizer design,” IEEE Trans. on Communication, vol. 28, no. 1, pp. 84-95, Jan. 1980.
摘要: 近年來,全世界已逐漸邁向資訊化的社會,資訊技術及影像處理技術也不斷的成熟與進步,生活中常用的電子產品,例如:電腦、手機、數位相機等等,都帶大量的數位影像,甚至現實生活中有許多既有的相片、圖形、標誌等等的實體圖片,都可以藉由數位設備轉換成數位影像,所以可以想見,大量的數位影像充斥在我們的日常生活中。隨著網路普及與蓬勃發展,透過網路分享自己的相片或影像作品變得更加快速且容易,然而,也可能引發數位影像是否在未經過原創作者的同意之下遭到有心人士惡意或非惡意的竄改的疑慮,因為這些行為嚴重地損害到原創作者的權益及作品的正確性。 在此,於對數位影像在網路傳輸過程中的安全性應用的需求,本論文以馬可夫鏈 (Markov chain)理論中隨機矩陣所產生的固定點為基礎,來發展一套具有判斷數位影像的正確性,以及進一步地定位出影像中被竄改的區域或物件的易碎型的浮水印技術,若影像很不幸地被竄改,我們也能夠評估影像被竄改後的完整性,來決定影像內容的真實度。影像認證的主要概念是從原始數位影像產生影像的認證資料作為浮水印,藏匿至原始的數位影像中,往後接收方收到這張已藏匿浮水印的影像時時,就可以根據取出來的浮水印來對數位影像做認證,確保所收到的數位影像是原創的,此外,由於本論文方法具有影像的認證資料非常小的特性,不僅可以增加認證資料的藏匿至原始影像的次數,達到提升影像中竄改區域偵測的成功機率,還可以藏匿高品質的影像特徵至原始影像,作為回復竄改區域的回復資料,進一步地還原出數位影像的原始樣貌,在實驗的部分,我們係結合楊等學者的竄改還原技術,達到偵測竄改及重建竄改區域的目的。 影像認證的主要目的是為了偵測影像是否被變造,然而,有時候為了增加數位影像的可見度,我們會對影像做明亮度調整的影像操作,若明亮度調整的幅度不是太大,人類的眼睛很是難察覺與原始影像有何不同,基於這個原因對影像亮度做些微的調整,並不算竄改或變造影像,但是,若將本論文影像認證方法對於經過明亮化影像而言,驗證後的結果往往會被認為整張影像皆被竄改,由此,我們提出一套調整原有的影認證方法的策略,來達到做影像認證時,對於經由適度明亮化的影像,可以具有部分的強韌性。
In the recently years, the whole world has gradually toward the IT society , the rapid development of network technology and image processing also are getting mature, the electronic products is commonly used in daily life, such as: computers, mobile phones, digital cameras, etc., those device are all with a lot of digital images, even in the real life, there exist many established photographs, graphics, pictures, logos, etc., also can be transformed by digital device into digital images, so that many digital media such as image, audio, video...etc., becomes easy to obtain or exchange over the Internet. As the result, the digital images may be tampered for specific purposes without the permission from original authors by attacker. So, this kind of behavior seriously to hurt the ownership of original authors and the accuracy of digital image. Therefore, based on the security requirements of digital image during the transmission time in the network, this paper, we proposed a fragile watermarked technique based on the fixed point of regular stochastic matrices in Markov chain to achieve the purpose of image authentication that not only can determine the correctness of digital image, but also to locate the tampered region in the image. If the digital image is tampered, we also can evaluate the integrity of tampered region to judge the truthfulness of image content. The concept of image authentication is to generate authentication data from the original image as a watermark, and then it is embedded into the original image for ensure the originality of image. Besides, in our method with the property of produce an amount of authentication data, so not only can verify the digital image integrity, but also can to locate the tampered region of the image to protect and identify the image originality, and with our image authentication method, the high quality image feature data can be embedded into image more times for recover the tampered region to make the possibility of recover tampered region is increased. In our experiment, we will show you some instance about how to combine feature extraction technique for recover tampered region in whole image. The main purpose of image authentication is that to detect whether an image has been altered or not, but sometimes, in order to increase the visibility of digital images, adjusted the brightness of image is necessary approach at sometimes, if the brightness adjustment is not too large, human eyes is difficult to aware the differences among with original image, for this reason, brightness adjustment is a legal manipulation for us, so we should improve our image authentication method and make some adjustments to develop a strategy for increase some tolerate ability for adjusted brightness situation in our image authentication method.
URI: http://hdl.handle.net/11455/24227
其他識別: U0005-2108201118050700
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-2108201118050700
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.