Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/8048
DC FieldValueLanguage
dc.contributor.advisor歐陽彥杰zh_TW
dc.contributor.author蘇勝中zh_TW
dc.contributor.authoramdyen_US
dc.date2003zh_TW
dc.date.accessioned2014-06-06T06:40:56Z-
dc.date.available2014-06-06T06:40:56Z-
dc.identifier.urihttp://hdl.handle.net/11455/8048-
dc.description.abstract摘 要 影像數位浮水印是利用人眼無法察覺影像細微變化的弱點,將特殊的資訊直接嵌入原數位影像中;縱使影像資料經過加解密、壓縮、非惡意的或其它攻擊性的影像處理,所嵌入的資訊依然可偵測出來 在本論文中,提出一種利用小波轉換之互補式浮水印技術做為數位影像資料的保護,在高頻與低頻部份,分別以兩種不同方式,隱藏兩個浮水印,使其在遭受攻擊時,至少有一個浮水印能存活。同時在偵測浮水印過程中不需要原始影像來輔助,因而可節省記憶體儲存空間,且在模擬測試中也證明,可減少原始影像因加入浮水印所造成之失真。 我們針對photoshop 常做之一般影像處理,來驗證加入浮水印之影像經過JPEG壓縮、模糊化、銳利化、雜訊化、圖形裁剪處理後其浮水印偵測結果,結果顯示我們的方法在遭受一般影像攻擊時,大部分都至少有一個浮水印能存活。zh_TW
dc.description.abstractAbstract Digital image watermark is a technique which takes advantage of the inability of human's eyes to differentiate the subtle change of images. It is a special information embedded and hidden in the original image. Even if the image data is encrypted and decrypted, compressed, unintentional or any other kind of attack, the embedded digital image watermark can still be detected. In this thesis,we propose a complementary watermark technique which uses the skill of wavelet transformation to protect image data. Two complementary watermarks are hidden in the high and low frequencies respectively in the transformed frequency domain. Using this technique , there will be at least one watermark can survive under attack .Besides, in the process of retriever the watermark, the original image isn't needed. Thus,save a lot of memory. The simulation results show that distortion of the original image caused by the insertion of watermark can be minimized. we also examine the outcome of watermark detection under JPEG compression, blurring, sharpening, noise and cutting based on the average image processing skills of Photoshop. The results show that our method can survive from most of the attack.en_US
dc.description.tableofcontents目 錄 第一章 緒論 1 1.1 簡介 1 1.2 動機與目的 4 1.3 論文架構 5 第二章 浮水印背景及小波函數 6 2.1 背景 6 2.1.1 數位浮水印 6 2.1.2 數位浮水印技術要求 7 2.2 小波函數及相關技術 8 2.2.1 小波函數 8 2.2.2 小波函數相關技術 8 2.2.2.1 Haar 8 2.2.2.2 JND 12 2.2.2.3 Quadtree 13 2.2.2.4 Cocktail Watermarking 14 第三章 互補式影像浮水印技術 18 3.1 概述 18 3.1.1 低頻數位浮水印 19 3.1.1.1 低頻數位浮水印加入演算法 19 3.1.1.2 低頻數位浮水印偵測演算法 22 3.1.2 高頻數位浮水印 22 3.1.2.1 高頻數位浮水印加入演算法 22 3.1.2.2 高頻數位浮水印偵測演算法 24 3.1.3 高頻加低頻數位浮水印 25 3.2 系統架構 26 第四章實驗步驟與結果分析實驗結果 28 4.1 軟體測試步驟 29 4.1.1 浮水印加入軟體測試 29 4.1.2 浮水印偵測軟體測試 31 4.2 實驗結果 34 4.2.1 失真壓縮 34 4.2.2 低通濾波模糊化 37 4.2.3 圖形裁剪 38 4.2.4 銳利化 43 4.2.5 雜訊化 44 4.2.6 反交錯式 48 4.2.7 紋理化、擴散光暈 49 4.2.8 雲彩化、鋸齒化 50 4.2.9 風動效果、多面體效果 51 4.2.10 馬賽克效果、去除斑點 52 第五章 結論與未來展望 55 5.1 結論 55 5.2 未來展望 55 參考文獻 56zh_TW
dc.language.isoen_USzh_TW
dc.publisher電機工程學系zh_TW
dc.subjectwatermarken_US
dc.subject數位浮水印zh_TW
dc.subjectwaveleten_US
dc.subjectcomplementary Watermarken_US
dc.subjectBlurringen_US
dc.subjectsharpeningen_US
dc.subjectnoiseen_US
dc.subjectrobustnessen_US
dc.subject小波轉換zh_TW
dc.subject互補式浮水印zh_TW
dc.subject模糊化zh_TW
dc.subject銳利化zh_TW
dc.subject雜訊化zh_TW
dc.subject強健性zh_TW
dc.title利用小波轉換技術之互補式數位浮水印zh_TW
dc.titleComplementary Digital Watermarking Technique Based on Wavelet Transformationen_US
dc.typeThesis and Dissertationzh_TW
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeThesis and Dissertation-
item.cerifentitytypePublications-
item.fulltextno fulltext-
item.languageiso639-1en_US-
item.grantfulltextnone-
Appears in Collections:電機工程學系所
Show simple item record
 
TAIR Related Article

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.