Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/8155
DC FieldValueLanguage
dc.contributor.advisor歐陽彥杰zh_TW
dc.contributor.advisorY. C. Ouyangen_US
dc.contributor.author許孝成zh_TW
dc.contributor.authorHsu, Hsiao-Chengen_US
dc.date2003zh_TW
dc.date.accessioned2014-06-06T06:41:05Z-
dc.date.available2014-06-06T06:41:05Z-
dc.identifier.urihttp://hdl.handle.net/11455/8155-
dc.description.abstract在本篇論文中,小波轉換、展頻PN-Code與多層偵測技術將被運用來完成數位浮水印嵌入程序。首先,原始影像利用小波轉換將影像從空間域轉換到頻域。之後,我們為了保護這嵌入的浮水印,所以我們再利用展頻PN-Code與Modulo-2 運算子來加以保密。在我們的方法上,我們是將浮水印輕微的嵌入到三階小波轉換後的LL3 sub-band。為了有效提升取出浮水印的效能,我們提出一種多層偵測技術的方法。從實驗結果上可以佐證,我們的方法是具有強韌度,不管是嚴重的影像破壞或是大壓縮比的JPEG 與 JPEG 2000的壓縮破壞,浮水印都能存活下來。zh_TW
dc.description.abstractThe digital watermarks should be hided and invisible by the human visual system. The spread spectrum techniques are used to achieve the goal. The original image is transformed form spatial domain to frequency domain by using discrete wavelet transform (DWT). We insert the spread spectrum PN-code and use modulo-2 operator to secure the watermark. The watermark is embedded into the LL3 sub-band after 3 times DWT. A multilevel detection is proposed to effectively watermark which can increase the retrieval performance. Form the experimental result, the proposed method is robust even under heavy attacks. For example, big compression ratio for JPEG and JPEG 2000, the retrieval watermarks still survive.en_US
dc.description.tableofcontentsChapter 1 Introduction 1.1 Motivation.........……………………………………..….……..………………...1 1.2 Characterization of digital watermarking……………...….……..….…………...2 1.3 Organization of this thesis…….……..….………………...…………….……..6 Chapter 2 Review of Digital Watermarking 2.1 The kind of digital watermarking........................................................................7 2.2 Base digital watermarking principle………….……………………………….9 2.3 Spread Spectrum Based Watermarking…….…………………………….....10 Chapter 3 Background Techniques 3.1 Definition digital image quality………….………………………………....13 3.2 Digital image format in frequency domain 3.2.1 Discrete Cosine Transform……………….………..............................14 3.2.2 Discrete Wavelet Transform……………….…………………………16 3.3 Overview Former digital Image watermark technique 3.3.1 Watermark embedded.......................................................................………....19 3.3.2 Watermark detection………………………………………………………….24 Chapter 4 A Digital Watermark Techniques Based On Wavelet Transform, Spread Spectrum and Multilevel Detection 4.1 Embedding Method………………………………………………………….….27 4.2 Retrieving Method……………………………………..........................................32 Chapter 5 Experiment Results 5.1 Similarity……………………………………………………………………….37 5.2 Image processing attacks………………………………………………………..41 5.3 JPEG and JPEG 2000 compression attacks…………………………………..…55 5.4 Comparison…………………………………………………………………….58 Chapter 6 Conclusion………………………………………………….61 Reference……………………………………………………………….62zh_TW
dc.language.isoen_USzh_TW
dc.publisher電機工程學系zh_TW
dc.subjectwavelet transformen_US
dc.subject小波轉換zh_TW
dc.subjectdigital image watermarkingen_US
dc.subjectspread spectrumen_US
dc.subjectPN-Codeen_US
dc.subject數位影像浮水印zh_TW
dc.subject展頻zh_TW
dc.subject隨機碼zh_TW
dc.title基於小波轉換之安全性展頻數位浮水印zh_TW
dc.titleWavelet Base Secure Spread Spectrum Image Watermarkingen_US
dc.typeThesis and Dissertationzh_TW
item.languageiso639-1en_US-
item.openairetypeThesis and Dissertation-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.fulltextno fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:電機工程學系所
Show simple item record
 
TAIR Related Article

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.