Please use this identifier to cite or link to this item:
標題: A breakthrough for robust blind image watermarking techniques based on features classification forest
作者: 張家菘
Chia-Sung Chang
關鍵字: 數位浮水印技術
引用: [1] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography: Morgan Kaufmann, 2007. [2] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' Image Processing, IEEE Transactions on, vol. 6, pp. 1673-1687, 1997. [3] A. B. Watson, 'DCT quantization matrices visually optimized for individual images,' in IS&T/SPIE's Symposium on Electronic Imaging: Science and Technology, 1993, pp. 202-216. [4] G. K. Wallace, 'The JPEG still picture compression standard,' Communications of the ACM, vol. 34, pp. 30-44, 1991. [5] R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital image processing using MATLAB vol. 2: Gatesmark Publishing Knoxville, 2009. [6] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su, 'Attacks on digital watermarks: classification, estimation based attacks, and benchmarks,' Communications Magazine, IEEE, vol. 39, pp. 118-126, 2001. [7] Y. Wang and A. Pearmain, 'Blind image data hiding based on self reference,' Pattern Recognition Letters, vol. 25, pp. 1681-1689, 2004. [8] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, 'Techniques for data hiding,' IBM systems journal, vol. 35, pp. 313-336, 1996. [9] I. J. Cox, M. L. Miller, and A. L. McKellips, 'Watermarking as communications with side information,' Proceedings of the IEEE, vol. 87, pp. 1127-1141, 1999. [10] G. Bhatnagar, Q. M. J. Wu, and B. Raman, 'A new robust adjustable logo watermarking scheme,' Computers & Security, vol. 31, pp. 40-58, 2012. [11] L. Blum, M. Blum, and M. Shub, 'A simple unpredictable pseudo-random number generator,' SIAM Journal on computing, vol. 15, pp. 364-383, 1986. [12] C. Song, S. Sudirman, and M. Merabti, 'Recent Advances and Classification of Watermarking Techniques in Digital Images,' School of Computing and Mathematical Sciences, Liverpool John Moores University, 2009. [13] N. Nikolaidis and I. Pitas, 'Robust image watermarking in the spatial domain,' Signal processing, vol. 66, pp. 385-403, 1998. [14] M.-S. Hwang, C.-C. Chang, and K.-F. Hwang, 'A watermarking technique based on one-way hash functions,' Consumer Electronics, IEEE Transactions on, vol. 45, pp. 286-294, 1999. [15] H. Kii, J. Onishi, and S. Ozawa, 'The digital watermarking method by using both patchwork and DCT,' in Multimedia Computing and Systems, 1999. IEEE International Conference on, 1999, pp. 895-899. [16] E. Yen and K. Tsai, 'HDWT-based grayscale watermark for copyright protection,' Expert Systems with Applications, vol. 35, pp. 301-306, 2008. [17] C. Song, S. Sudirman, and M. Merabti, 'A robust region-adaptive dual image watermarking technique,' Journal of Visual Communication and Image Representation, vol. 23, pp. 549-568, 2012. [18] S.-J. Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo, and M. K. Khan, 'A blind image copyright protection scheme for e-government,' Journal of Visual Communication and Image Representation, vol. 24, pp. 1099-1105, 2013. [19] N. M. Makbol and B. E. Khoo, 'Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition,' AEU - International Journal of Electronics and Communications, vol. 67, pp. 102-112, 2013. [20] J. C. Patra, J. E. Phua, and C. Bornand, 'A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,' Digital Signal Processing, vol. 20, pp. 1597-1611, 2010. [21] Q. Su, Y. Niu, H. Zou, and X. Liu, 'A blind dual color images watermarking based on singular value decomposition,' Applied Mathematics and Computation, vol. 219, pp. 8455-8466, 2013. [22] Q. Su, Y. Niu, G. Wang, S. Jia, and J. Yue, 'Color image blind watermarking scheme based on QR decomposition,' Signal Processing, vol. 94, pp. 219-235, 2014. [23] H. Modaghegh and R. Khosravi, 'A new adjustable blind watermarking based on GA and SVD,' in Innovations in Information Technology, 2009. IIT'09. International Conference on, 2009, pp. 6-10. [24] A. Savasere, E. R. Omiecinski, and S. B. Navathe, 'An efficient algorithm for mining association rules in large databases,' 1995. [25] R. Srikant and R. Agrawal, 'Mining generalized association rules,' Future Generation Computer Systems, vol. 13, pp. 161-180, 1997. [26] L. Feng, T. Dillon, and J. Liu, 'Inter-transactional association rules for multi-dimensional contexts for prediction and their application to studying meteorological data,' Data & Knowledge Engineering, vol. 37, pp. 85-115, 2001. [27] G. Chen, Q. Wei, D. Liu, and G. Wets, 'Simple association rules (SAR) and the SAR-based rule discovery,' Computers & industrial engineering, vol. 43, pp. 721-733, 2002. [28] P.-N. Tan, Introduction to data mining: Pearson Education India, 2007. [29] S. W. Zucker and D. Terzopoulos, 'Finding structure in co-occurrence matrices for texture analysis,' Computer graphics and image processing, vol. 12, pp. 286-308, 1980. [30] D. A. Clausi and M. E. Jernigan, 'A fast method to determine co-occurrence texture features,' IEEE Transactions on Geoscience and Remote Sensing, vol. 36, pp. 298-300, 1998. [31] M.-H. Tsai, Y.-K. Chan, A.-M. Hsu, C.-Y. Chuang, C.-M. Wang, and P.-W. Huang, 'Feature-Based Image Segmentation,' Journal of Imaging Science and Technology, vol. 57, pp. 1-12, 2013. [32] C.-C. Lai and C.-C. Tsai, 'Digital image watermarking using discrete wavelet transform and singular value decomposition,' Instrumentation and Measurement, IEEE Transactions on, vol. 59, pp. 3060-3063, 2010. [33] E. Ganic and A. M. Eskicioglu, 'Robust DWT-SVD domain image watermarking: embedding data in all frequencies,' in Proceedings of the 2004 Workshop on Multimedia and Security, 2004, pp. 166-174.
摘要: A novel watermarking scheme is proposed to highly improve current watermarking techniques, especially for those cases which use modification method by altering mathematical properties in host image. The proposed scheme exploits the features of micro images from watermark to build the association rules, and embeds the rules into host image instead of real bit stream of watermark. And subsequently the similar micro images in the same rules from host image will be collected or even created to simulate the watermark. This method, named as features classification forest, can achieve the blind extraction and is adaptable to any watermarking scheme based on mathematical property modification mechanism. Furthermore, the capacity is enlarged without the impact on imperceptibility, which means larger sized watermark but no worse effect on host image quality. The experiments demonstrate successful simulation of watermark and application of the proposed scheme to four different watermarking techniques. One of them is slightly adjusted from references to especially resist JPEG compression. And others show native advantages to resist different attacks including noise attack, geometrical attack and several image processing attacks.
數位多媒體在網路蓬勃發展之下,已成為世界訊息溝通的主流,而數位影像乃除了文字以外最廣泛使用之媒體,網路上易於取得數位影像的便利性,也同時產生了智慧財產權的議題;網路上的使用者,在未經著作權者的授權之下,可能進行竄改、拷貝、販賣等侵權的非法商業行為,在這樣的時空背景之下,數位影像之智慧財產權保護也就應運而生,數位浮水印技術即為此解決方案。 本論文提出一技術-影像特徵分類樹集,能針對採用統計或其他數學特徵值修改之嵌入技術,使得數位浮水印技術的三個準則,包括不可察覺性、強韌性與浮水印容量,達到全面性的提升。 影像特徵分類樹集乃借用資料探勘中關聯性規則的概念,對影像與影像間進行特徵值上的分析與分類;於分析結果中,我們得知當每一微小影像區塊擁有相同之關聯性規則,其紋理與外貌即會非常相似,因此我們大膽了設定了一個假設:藉由關聯性規則來建立一演算法,也就是影像特徵分類樹集,將浮水印透過此演算法取得關聯性規則,並將規則嵌入至欲保護影像中,未來宣告智慧財產權時,萃取演算法將會取得藏入之關聯性規則,並且使用此關聯性規則擷取保護影像中之影像區塊,進行浮水印的模擬與拼裝。 於設計實驗時,我們使用了四個不同之浮水印技術,來實證此假設之可行性,以及展示不同浮水印技術中其原始抵抗各種攻擊之能力,此四技術中包含了一個改善後之浮水印技術,特別針對JPEG影像壓縮之攻擊。實驗結果顯示,影像特徵分類樹集不僅證實其移植能力,能應用於基於數學特徵值修改之浮水印技術,也同時達到擴大浮水印容量卻不影響不可察覺性與強韌性之重大突破。
其他識別: U0005-0707201415280200
文章公開時間: 10000-01-01
Appears in Collections:資訊管理學系



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.