Please use this identifier to cite or link to this item:
DC FieldValueLanguage
dc.contributor.authorKen-Tzu Liuen_US
dc.identifier.citation[1] C. Rey and J.-L. Dugelay, 'A survey of watermarking algorithms for image authentication,' EURASIP Journal on Applied Signal Processing, vol. 2002, pp. 613-621, 2002. [2] C.-Y. Lin and S.-F. Chang, 'A robust Image authentication method distinguishing JPEG compression from malicious manipulation,' Circuits and Systems for Video Technology, IEEE Transactions on, vol. 11, pp. 153-168, 2001. [3] L. Dong, X. Kong, B. Wang, and X. g. You, 'A robust JPEG image tampering detection method using GLCM features,' Advances in Information Sciences and Service Sciences, vol. 3, pp. 384-391, 2011. [4] M. I. Khan and V. Jeoti, 'A blind watermarking scheme using bitplane of DC component for JPEG Compressed images,' in Emerging Technologies (ICET), 2010 6th International Conference on, pp. 150-154, 2010. [5] S. D. Lin, S.-C. Shie, and J. Y. Guo, 'Improving the robustness of DCT-based image watermarking against JPEG compression,' in Consumer Electronics, 2005. ICCE. 2005 Digest of Technical Papers. International Conference on, pp. 343-344, 2005. [6] J. C. Patra, J. E. Phua, and C. Bornand, 'A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,' Digital Signal Processing, vol. 20, pp. 1597-1611, Dec 2010. [7] Y. Huo, H. He, and F. Chen, 'Alterable-capacity fragile watermarking scheme with restoration capability,' Optics Communications, vol. 285, pp. 1759-1766, 2012. [8] P. W. Wong and N. Memon, 'Secret and public key image watermarking schemes for image authentication and ownership verification,' Image Processing, IEEE Transactions on, vol. 10, pp. 1593-1601, 2001. [9] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, 'Information hiding-a survey,' Proceedings of the IEEE, vol. 87, pp. 1062-1078, 1999. [10] F. Deguillaume, S. Voloshynovskiy, and T. Pun, 'Secure hybrid robust watermarking resistant against tampering and copy attack,' Signal Processing, vol. 83, pp. 2133-2170, 2003. [11] B. Gunsel, U. Uludag, and A. Murat Tekalp, 'Robust watermarking of fingerprint images,' Pattern Recognition, vol. 35, pp. 2739-2747, 2002. [12] W.-Y. Chen and C.-H. Chen, 'A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection,' Pattern Recognition, vol. 38, pp. 587-598, 2005. [13] H. Hsiang-Cheh, W. Feng-Hsing, and P. Jeng-Shyang, 'Efficient and robust watermarking algorithm with vector quantisation,' Electronics Letters, vol. 37, pp. 826-828, 2001. [14] M. U. Celik, G. Sharma, and A. M. Tekalp, 'Lossless watermarking for image authentication: A new framework and an implementation,' Ieee Transactions on Image Processing, vol. 15, pp. 1042-1049, Apr 2006. [15] S.-L. Hsieh, P.-D. Wu, I. J. Tsai, and B.-Y. Huang, 'A recoverable semi-fragile watermarking scheme using cosine transform and adaptive median filter,' Lecture Notes in Computer Science, vol. 5060, pp. 629-640, 2008. [16] R. O. Preda, 'Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain,' Measurement, vol. 46, pp. 367-373, 1/ 2013. [17] Z. Wenyin and F. Y. Shih, 'Semi-fragile spatial watermarking based on local binary pattern operators,' Optics Communications, vol. 284, pp. 3904-3912, 8/1/ 2011. [18] P. Sidiropoulos, N. Nikolaidis, and I. Pitas, 'Invertible chaotic fragile watermarking for robust image authentication,' Chaos, Solitons & Fractals, vol. 42, pp. 2667-2674, 2009. [19] F. Di Martino and S. Sessa, 'Fragile watermarking tamper detection with images compressed by fuzzy transform,' Information Sciences, vol. 195, pp. 62-90, 2012. [20] C.-S. Chan, 'An image authentication method by applying Hamming code on rearranged bits,' Pattern Recognition Letters, vol. 32, pp. 1679-1690, 2011. [21] A. Haouzia and R. Noumeir, 'Methods for image authentication: a survey,' Multimedia Tools Appl., vol. 39, pp. 1-46, 2008. [22] R. Tiwari, S. Buse, and C. Herstatt, 'Mobile Banking as Business Strategy: Impact of Mobile Technologies on Customer Behaviour and Its Implications for Banks,' in Technology Management for the Global Future, 2006. PICMET 2006, 2006, pp. 1935-1946. [23] P. Chuchaisri and R. E. Newman, 'Multi-resolution elliptic curve digital signature,' in Local Computer Networks (LCN), 2012 IEEE 37th Conference on, pp. 93-101, 2012. [24] B.-j. Gao and M. Du, 'A Binary Text Image Authentication Algorithm Based on Short Digital Signature,' in Photonics and Optoelectronic (SOPO), 2010 Symposium on, 2010, pp. 1-6. [25] R. Saadi, J. M. Pierson, and L. Brunie, 'Morph Digital Signature A New Signature Framework for e-Documents in Pervasive Environments,' in Pervasive Services, IEEE International Conference on, pp. 185-188, 2007. [26] R. Kaur and A. Kaur, 'Digital Signature,' in Computing Sciences (ICCS), 2012 International Conference on, pp. 295-301, 2012. [27] T. Y. Lee and S. F. D. Lin, 'Dual watermark for image tamper detection and recovery,' Pattern Recognition, vol. 41, pp. 3497-3506, Nov 2008. [28] C.-W. Yang and J.-J. Shen, 'Recover the tampered image based on VQ indexing,' Signal Process., vol. 90, pp. 331-343, 2010. [29] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, 'A hierarchical digital watermarking method for image tamper detection and recovery,' Pattern Recognition, vol. 38, pp. 2519-2529, 2005. [30] C.-C. Chang, Y.-S. Hu, and T.-C. Lu, 'A watermarking-based image ownership and tampering authentication scheme,' Pattern Recognition Letters, vol. 27, pp. 439-446, 2006. [31] G. K. Wallace, 'The JPEG still picture compression standard,' Consumer Electronics, IEEE Transactions on, vol. 38, pp. xviii-xxxiv, 1992. [32] D. Singh, S. Shivani, and S. Agarwal, 'Self-embedding Pixel Wise Fragile Watermarking Scheme for Image Authentication,' in Intelligent Interactive Technologies and Multimedia. vol. 276, A. Agrawal, R. C. Tripathi, E.-L. Do, and M. D. Tiwari, Eds., ed: Springer Berlin Heidelberg, 2013, pp. 111-122. [33] S. Jau-Ji and H. Wei-Cheng, 'The First Robust Image Tamper Detection Scheme under Brightness,' in Genetic and Evolutionary Computing (ICGEC), 2011 Fifth International Conference on, pp. 200-203, 2011. [34] J.-J. Shen and P.-W. Hsu, 'A robust associative watermarking technique based on similarity diagrams,' Pattern Recognition, vol. 40, pp. 1355-1367, 2007. [35] J. Dittmann, A. Steinmetz, and R. Steinmetz, 'Content-based digital signature for motion pictures authentication and content-fragile watermarking,' in Multimedia Computing and Systems, 1999. IEEE International Conference on, pp. 209-213 vol.2, 1999. [36] N. Zhicheng, Y. Q. Shi, N. Ansari, and S. Wei, 'Reversible data hiding,' in Circuits and Systems, 2003. ISCAS '03. Proceedings of the 2003 International Symposium on, pp. II-912-II-915 vol.2, 2003. [37] T. Jun, 'Reversible data embedding using a difference expansion,' Circuits and Systems for Video Technology, IEEE Transactions on, vol. 13, pp. 890-896, 2003. [38] P. G. Hoel, S. C. Port, and C. J. Stone, Introduction to stochastic processes: Houghton Mifflin, 1972. [39] N. Ahmed, T. Natarajan, and K. R. Rao, 'Discrete Cosine Transform,' Computers, IEEE Transactions on, vol. C-23, pp. 90-93, 1974. [40] A. G. Marrugo, M. S. Millan, G. Cristobal, S. Gabarda, and H. C. Abril, 'Anisotropy-based robust focus measure for non-mydriatic retinal imaging,' Journal of Biomedical Optics, vol. 17, pp. 0760211-0760219, 2012. [41] J.-J. Shen and W.-C. Huang, 'A novel image authentication technique based on fixed point of regular stochastic matrix,' in Proceedings of the IASTED International Conference on Computational Photography, CPhoto 2011, Vancouver, BC, Canada, pp. 138-143, 2011.zh_TW
dc.description.abstractIn this paper, we propose a novel method of robust, high accuracy image tampering detection. By using the idea of fixed points extracted from a DCT (Discrete Cosine Transform) coefficient matrix from the field of stochastic matrices, we can modify this fixed point and render it an image's authentication code. The authentication code can be used to detect tampering and locate the suspected region under our cross-examination procedure. Moreover, when the image is modified, even by slight brightness adjustment and widely used, lossy JPEG compression, our method is significantly good at detecting the tampered image regions. In this experiment, the results show that our proposed method is able to detect and locate the tampered image regions precisely and robustly against brightness adjustments and the JPEG compressions. Our method works quite well even when the watermarked image has been JPEG-compressed twice. Besides, a new idea of digital document authentication is proposed. We apply the characteristics of the Markov chain to document authentication. This concept which combines document authentication and image processing is able to authenticate the document and also remain the same document size.en_US
dc.description.abstract在本論文中,我們提出一個新穎的方法,利用馬可夫鏈的概念從DCT(Discrete Cosine Transform)係數矩陣中產生特徵值,並加以修改後當成是影像的認證碼,接著利用這些認證碼在我們特別設計的兩階段式檢查機制下,能有效的偵測出遭到竄改的區域。本文提出的方法不僅能察覺到影像被竄改,更能標示出遭到竄改的區域。此外亦針對在實際應用中的情境,即使影像經過些微的亮度調整或失真壓縮,也能順利地標示出遭到竄改的區域。我們在實驗中利用一些常見的攻擊方式來測驗我們的方法。同時,我們也顯示在亮度調整及失真壓縮下的結果,此外在論文中也進一步討論兩次失真壓縮的問題,而在亮度調整及失真壓縮下的認證結果,顯示此影像驗證方法能準確標示出竄改區,而且具有很好的強韌性。另外,我們將馬可夫鏈之特性應用於文件認證之上。結合文字檔案與影像處理的概念,在不需要增加檔案尺寸的前提之下達到文件認證和找出被修改過之文字。zh_TW
dc.description.tableofcontents摘要 i Abstract ii 目錄 iv 圖目錄 v 表目錄 vi 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機與目的 2 1.3 研究架構 5 第二章 文獻探討 6 2.1 浮水印技術 6 2.2 馬可夫鏈 7 2.3 離散餘弦轉換 8 第三章 本文方法 12 3.1 階段一 產生認證碼 13 3.2 階段二 將認證碼嵌入原始影像 15 3.3 階段三 驗證影像 18 第四章 實驗結果 25 4.1 實驗環境與實驗用圖 25 4.2 認證影像竄改實驗 29 4.3 明亮化影像處理下的影像認證實驗 33 4.4 影像壓縮後的影像認證實驗 36 第五章 結合馬可夫鏈於文件認證之方法 42 5.1 簡介 42 5.2 方法 43 5.2.1 產生認證碼 43 5.2.2 藏入認證碼 44 5.2.3 認證過程 45 5.3 實驗結果 47 5.4 小結 49 第六章 結論與未來展望 50 參考文獻 51zh_TW
dc.subjectDiscrete cosine transformen_US
dc.subjectImage authenticationen_US
dc.subjectJPEG compressionen_US
dc.subjectMarkov chainen_US
dc.subjectTamper detectionen_US
dc.titleA Study of Image Authentication Technique by Applying Fixed Point of Regular Stochastic Matrix on DCTen_US
dc.typeThesis and Dissertationen_US
item.openairetypeThesis and Dissertation-
item.fulltextwith fulltext-
Appears in Collections:資訊管理學系
Files in This Item:
File Description SizeFormat Existing users please Login
nchu-103-7100029001-1.pdf6.18 MBAdobe PDFThis file is only available in the university internal network    Request a copy
Show simple item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.