Please use this identifier to cite or link to this item:
DC FieldValueLanguage
dc.contributorJau-Ji Shenen_US
dc.contributor.authorZhao-Ru Chenen_US
dc.identifier.citation[1] F. Hartung and M. Kutter, 'Multimedia watermarking techniques,' Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999. [2] S. Ababneh, R. Ansari, and A. Khokhar, 'Iterative compensation schemes for multimedia content authentication,' Journal of Visual Communication and Image Representation, vol. 20, no. 5, pp. 303-311, 2009. [3] D.-C. Lou and J.-L. Liu, 'Fault resilient and compression tolerant digital signature for image authentication,' IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, 2000. [4] P. Tsai, Y. Hu, and C. Chang, 'Novel image authentication scheme based on quadtree segmentation,' The Imaging Science Journal, vol. 53, no. 3, pp. 149-162, 2005. [5] A. Umamageswari and G. R. Suresh, 'Secure medical image communication using roi based lossless watermarking and novel digital signature,' (in English), Journal of Engineering Research, Article vol. 2, no. 3, pp. 87-108, Sep 2014. [6] C. Das, S. Panigrahi, V. K. Sharma, and K. K. Mahapatra, 'A novel blind robust image watermarking in dct domain using. Inter-block coefficient correlation,' Aeu-International Journal of Electronics and Communications, vol. 68, no. 3, pp. 244-253, 2014. [7] A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, 'Optimized gray-scale image watermarking using dwt-svd and firefly algorithm,' Expert Systems with Applications, vol. 41, no. 17, pp. 7858-7867, Dec 2014. [8] S. A. Parah, J. A. Sheikh, N. A. Loan, and G. M. Bhat, 'Robust and blind watermarking technique in dct domain using inter-block coefficient differencing,' Digital Signal Processing, vol. 53, pp. 11-24, Jun 2016. [9] A. K. Singh, 'Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images,' Multimedia Tools and Applications, vol. 76, no. 6, pp. 8881-8900, Mar 2017. [10] A. K. Singh, B. Kumar, M. Dave, and A. Mohan, 'Robust and imperceptible dual watermarking for telemedicine applications,' Wireless Personal Communications, vol. 80, no. 4, pp. 1415-1433, Feb 2015. [11] A. Zear, A. K. Singh, and P. Kumar, 'A proposed secure multiple watermarking technique based on dwt, dct and svd for application in medicine,' Multimedia Tools and Applications, vol. 77, no. 4, pp. 4863-4882, Feb 2018. [12] X. Zhu, A. T. S. Ho, and P. Marziliano, 'A new semi-fragile image watermarking with robust tampering restoration using irregular sampling,' Signal Processing-Image Communication, vol. 22, no. 5, pp. 515-528, Jun 2007. [13] F. Peng, R. S. Guo, C. T. Li, and M. Long, 'A semi-fragile watermarking algorithm for authenticating 2d cad engineering graphics based on log-polar transformation,' Computer-Aided Design, vol. 42, no. 12, pp. 1207-1216, Dec 2010. [14] R. O. Preda, 'Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain,' Measurement, vol. 46, no. 1, pp. 367-373, Jan 2013. [15] H. M. Al-Otum, 'Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique,' Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1064-1081, Jul 2014. [16] X. J. Qi and X. Xin, 'A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization,' Journal of Visual Communication and Image Representation, vol. 30, pp. 312-327, Jul 2015. [17] T.-Y. Lee and S. D. Lin, 'Dual watermark for image tamper detection and recovery,' Pattern recognition, vol. 41, no. 11, pp. 3497-3506, 2008. [18] X. Zhang, S. Wang, and G. Feng, 'Fragile watermarking scheme with extensive content restoration capability,' in International Workshop on Digital Watermarking, 2009, pp. 268-278: Springer, 2009. [19] C.-W. Yang and J.-J. Shen, 'Recover the tampered image based on vq indexing,' Signal Processing, vol. 90, no. 1, pp. 331-343, 2010. [20] S. Yang, C. Qin, Z. Qian, and B. Xu, 'Tampering detection and content recovery for digital images using halftone mechanism,' in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on, 2014, pp. 130-133: IEEE, 2014. [21] C.-S. Hsu and S.-F. Tu, 'Image tamper detection and recovery using adaptive embedding rules,' Measurement, vol. 88, pp. 287-296, 2016. [22] D. Singh and S. K. Singh, 'Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability,' Journal of Visual Communication and Image Representation, vol. 38, pp. 775-789, 2016. [23] C. Qin, P. Ji, X. Zhang, J. Dong, and J. Wang, 'Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy,' Signal Processing, vol. 138, pp. 280-293, 2017. [24] C. Kim, D. Shin, and C.-N. Yang, 'Self-embedding fragile watermarking scheme to restoration of a tampered image using ambtc,' Personal and Ubiquitous Computing, vol. 22, no. 1, pp. 11-22, 2018. [25] Z. Qian, G. Feng, X. Zhang, and S. Wang, 'Image self-embedding with high-quality restoration capability,' Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011. [26] C.-C. Lo and Y.-C. Hu, 'A novel reversible image authentication scheme for digital images,' Signal processing, vol. 98, pp. 174-185, 2014. [27] Z. Yin, X. Niu, Z. Zhou, J. Tang, and B. Luo, 'Improved reversible image authentication scheme,' Cognitive Computation, vol. 8, no. 5, pp. 890-899, 2016. [28] C.-K. Chan and L.-M. Cheng, 'Hiding data in images by simple lsb substitution,' Pattern recognition, vol. 37, no. 3, pp. 469-474, 2004. [29] C.-C. Chang, Y.-S. Hu, and T.-C. Lu, 'A watermarking-based image ownership and tampering authentication scheme,' Pattern Recognition Letters, vol. 27, no. 5, pp. 439-446, 2006. [30] R. Keys, 'Cubic convolution interpolation for digital image processing,' IEEE transactions on acoustics, speech, and signal processing, vol. 29, no. 6, pp. 1153-1160, 1981. [31] F. A. Petitcolas and S. Katzenbeisser, Information hiding techniques for steganography and digital watermarking (artech house computer security series). Artech House, 2000.zh_TW
dc.description.abstractIn recent years, with the rapid development of the Internet as well as image processing technology, digital images on smart phones can be easily modified. Thus, criminal image modification has skyrocketed. In this paper, we propose an effective self-embedding authentication watermarking scheme for tampered image detection and recovery. The proposed method is classified into block-wise and pixel-wise detections. In block-wise detection, the authentication information and the recovery information are generated from each block and its mean value, respectively. According to the size of a block, the number of the authentication information and recovery information are adjusted. When the tampered pixel is detected, the corresponding block is marked; therefore, if the size of the block is small, the false positive rate (FPR) will be low. In pixel-wise detection, when the tampered pixel is detected, only the corresponding pixel area is marked. Therefore, the FPR will be lower than that the block-wise detection. The experimental results demonstrate that the proposed method is effective, and an accurate tamper detection and high-quality recovery can be realized even in highly tampered images.en_US
dc.description.tableofcontents摘要 i Abstract ii 目錄 iii 圖目錄 v 表目錄 vii 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機與目的 2 1.3 研究架構 3 第二章 文獻探討 4 2.1 符號定義 4 2.2 針對數位影像的新型可逆式影像認證技術(2014) 4 2.3 使用自適應藏入規則的影像竄改檢測及回復法(2016) 5 2.4 基於Hilbert Curve映射的改進式可逆式影像認證法(2016) 6 2.5 基於DCT的有效自我藏入及回復影像認證法(2016) 7 2.6 文獻特點比較 8 第三章 研究方法 10 3.1 符號定義 10 3.2 基於「區塊」檢測的影像認證技術 11 3.2.1 產生浮水印並藏入影像 11 3.2.2 竄改檢測及自我回復 13 3.3 基於「像素」檢測的影像認證技術 15 3.3.1 產生浮水印並藏入影像 15 3.3.2 竄改檢測及自我回復 18 第四章 實驗結果 20 4.1 實驗環境及實驗用圖 20 4.2 影像驗證竄改實驗 22 4.3 與其他方法之比較 30 第五章 結論與未來展望 33 5.1 結論 33 5.2 未來展望 33 參考文獻 34zh_TW
dc.subjectImage authentication schemeen_US
dc.subjectTamper detectionen_US
dc.subjectFragile watermarking methoden_US
dc.titleEffective Self-Embedding Authentication Watermarking for Image Tampered Detection and Recoveryen_US
dc.typethesis and dissertationen_US
Appears in Collections:資訊管理學系


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.