§ 瀏覽學位論文書目資料
系統識別號 U0002-1301200913143900
DOI 10.6846/TKU.2009.01276
論文名稱(中文) 半色調影像浮水印系統之研究
論文名稱(英文) Development of Watermarking Scheme for Halftone Images
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 電機工程學系博士班
系所名稱(英文) Department of Electrical and Computer Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 97
學期 1
出版年 98
研究生(中文) 吳業寬
研究生(英文) Yeh-Kuang Wu
學號 891350034
學位類別 博士
語言別 英文
第二語言別
口試日期 2009-01-05
論文頁數 99頁
口試委員 指導教授 - 謝景棠(hsieh@ee.tku.edu.tw)
委員 - 陳稔
委員 - 施國琛
委員 - 顏淑惠
委員 - 黃仁俊
委員 - 謝景棠
關鍵字(中) 浮水印
半色調
粒子群最佳化
支援向量機
人眼視覺系統
關鍵字(英) Watermark
Halftone image
Particle swarm optimization
Support vector machine
Human visual system
第三語言關鍵字
學科別分類
中文摘要
數位多媒體資訊被廣泛地運用於我們的日常生活當中,人們可以輕易地在未經擁有者同意的情況下,恣意地複製與傳播。數位浮水印技術正是一個解決此問題的好方法,實行數位多媒體版權的認證與智慧財產權的保護。數位浮水印技術中,根據嵌入浮水印的目的不同,可分為強健型與易碎型浮水印系統,每種系統都有其一定的限制與考量;本論文中,我們將分別針對此兩系統提出新的策略,應用於數位影像中,同時並將其擴展於數位半色調影像中。相較於灰階影像,數位半色調影像僅需使用極少的記憶體儲存空間,不僅利於網路上的傳輸,亦能產生近似灰階的效果,遂其廣泛地利用在網路與列印之相關應用中。
本論文中,我們將先簡介強健型與易碎型浮水印系統之特性。強健型浮水印可運用於智慧財產權之保護,而易碎型浮水印可運用於資料之保護與認證。
本論文的第二個主軸將探討應用於半色調影像中之浮水印系統。首先,我們提出了一個多目標之半色調影像浮水印系統,多目標即代表此浮水印系統同時擁有強健型浮水印及易碎型浮水印之特性。藏有浮水印之半色調影像必須能同時具有透視性與強健性,在本系統中,我們引用粒子群最佳化演算法,藉以找到最佳化之點陣式矩陣,並經由數個矩陣之選擇,嵌入強健型浮水印系統。同時為了不影響強健型浮水印之強健性,我們將易碎型浮水印嵌入於強健型浮水印之鎖鑰中。
經由模擬,我們發現上述之方法,並不能抵抗影像尺寸縮小放大之攻擊;有鑒於此,我們提出了第二種半色調影像浮水印系統,稱之為混合型浮水印系統,此系統結合了上述之多目標系統,並於嵌入了另一個浮水印於頻率域上,藉以增加浮水印系統之強健度。同時為了衡量半色調影像浮水印之品質,我們利用粒子群最佳化演算法,提出了人眼視覺濾波器,應用於PSNR-影像衡量法中,經由人眼視覺濾波器可以將半色調影像較為準確地近似至灰階影像。
然而,上述之方法,在其浮水印抽取步驟中,皆須使用此多個半色調矩陣。最後,我們試著提出一進階型浮水印系統,此系統將簡化浮水印抽取時所需要的事前資訊,以確保浮水印系統之隱密性,並避免竄改者恣意產生未經許可,確具有浮水印之半色調影像。同時,對於列印與掃描攻擊,我們提出一套自動化同步系統應用於浮水印抽取系統中,包含所有相關之前處理作業。
英文摘要
As audio, video, images and other works become available in digital form, the ease with which perfect copies can be made, may lead to large-scale unauthorized copying which might undermine the music, picture, book, and software publishing industries. Watermarking has been considered for many copy prevention and copyright protection applications. Watermarking is the practice of hiding a message about an image, audio chip or meaningful logo within that work itself for protecting copyright. Two types of watermarking can be identified depends on specific application-driven requirements: (a) robust watermarking, and (b) fragile watermarking. For the aforementioned schemes, each watermarking scheme has its own considerations and limitations. In this dissertation, we are trying to develop robust and fragile watermarking schemes respectively and explore the combined watermarking schemes for the halftone images. Halftone images are widely used in the printing of books, magazines, newspapers and computer printers. Although there are only 2 tones, halftone images look like the original multi-tone images when viewed from a distance. 
The first issue of this dissertation is to introduce the robustness and fragility of the watermarking system for digital gray-level image. The robust watermarking scheme is used for copyright protection and fragile watermarking scheme is used for content authentication. The second issue of this dissertation focuses on embedding the watermarks in the halftone images. The optimized watermarking scheme for halftone images based on dithering method is proposed. The multi-purpose watermarking is proposed for not only protecting copyright but also authenticating content. The optimized dither cells for watermarks embedding would be generated by the particle swarm optimization (PSO) with high transparency. However, in the experiments, we find that the proposed multi-purpose watermarking is not robust to the scaling attacks. 
In the third issue of the dissertation, we would try to find the more robust watermarking scheme and discuss the image quality criterion for halftone images. In the method, the frequency domain based watermarks would be embedded to the watermarked images in order to enhance the robustness for scaling attack and call it hybrid watermarking scheme. And the human visual filter for the image quality criterion in halftone images is generated by PSO.
The last issue of this dissertation is to explore the advanced method for the proposed robust watermarking system for halftone images. The section aims at enhancing the privacy of the watermarking scheme that only one dither cell is necessary in the watermark extracting system. The support vector machine is adopted as the classification function in the watermark extracting stage, and the automatic resynchronization procedure for the watermark extraction stage with print-and-scan attacks is proposed to resist scan-and-print attacks.
第三語言摘要
論文目次
CH 1 Introduction	1
1.1 Introduction of Watermarking	1
1.2 Watermarking Schemes for Halftone Images	4
1.3 The Organization of This Dissertation	6
CH 2 Related Watermarking Works	7
2.1 Related Robust Watermarking Works	7
2.2 Related Fragile Watermarking Works	8
CH 3 Watermarking Scheme in Halftoning Process	10
3.1 Introduction	11
3.2 Halftoning	14
3.3 Proposed watermarking schemes	17
3.3.1	Watermark Embedding	17
3.3.2	Watermark Extracting	19
3.3.2.1 Robust Watermark Extracting	19
3.3.2.2 Fragile Watermark Extracting	21
3.4 Dither Cell Generation	23
3.4.1 Particle Swarm Optimization	23
3.4.2 Dither Cell Generation Using Particle Swarm Optimization	25
3.5 Geometric Invariance	27
3.5.1 Zernike transform	28
3.5.2 Recovering	31
3.6 Simulations	33
3.6.1 Image Quality	33
3.6.2 Copyright Protection	34
3.6.3 Content Authentication	37
3.6.4 Comparison	39
3.6.5 Resistance geometric attacks	40
3.7 Summary	43
CH 4 Hybrid Watermarking Scheme For Halftone Images	44
4.1 Introduction	45
4.2 Binary Pseudo-wavelets Transform	47
4.3 Proposed Watermarking System	48
4.3.1 Watermark Embedding	49
4.3.2 Watermark Extracting	51
4.4 Quality Criterion	53
4.5 Robustness Enhancement	57
4.6 Simulations	58
4.6.1 Image Quality	58
4.6.2 Copyright Protection	59
4.6.3 Comparison	62
4.6.4 Discussion	63
4.7 Summary	66
CH 5 Improved Watermarking Scheme For Halftone Images . 67
5.1 Introduction ........................................................................................................... 68
5.2 Support Vector Machine ........................................................................................ 70
5.3 Proposed Watermarking Scheme........................................................................... 73
5.3.1 Watermark Embedding ............................................................................... 74
5.3.2 Watermark Extracting ................................................................................. 75
5.3.2.1 SVM Training .................................................................................. 77
5.3.2.2 Owner Watermarks Extracting ........................................................ 77
5.3.3 Watermark Extraction with Print-and-Scan Attack .................................... 78
5.4 Simulations ............................................................................................................ 81
5.4.1 Watermarked Image Quality and Its Capacity ............................................ 82
5.5 Summary ................................................................................................................ 87
CH 6 Conclusions And Future Works ......................................... 88
References ...................................................................................... 90

List of Figures
Figure 3.1 	The error diffusion algorithm.	14
Figure 3.2 	Error filters of different error diffusion methods.	15
Figure 3.3 	The proposed robust and fragile watermark embedding systems.	18
Figure 3.4 	The proposed robust and fragile watermark extracting systems.	18
Figure 3.5 	Sub-images (co-centric ring) of Lena image with difference width, w.	30
Figure 3.6 	(a) Original image (b) Halftone image (c) Robust watermark (d) Fragile watermark.	33
Figure 3.7 	Some attacks (a) Cropping (b) Drawing in black (c) Drawing in black and white (d) Rotating.	35
Figure 3.8 	Extracted robust watermarks from images under attack (a) to (p).	35
Figure 3.9 	DR of the extracted robust watermark under the attack (a) to (p).	35
Figure 3.10 	DR of robust watermark detector to 1000 random Keys. (The 500th key is the key S we actually obtained from embedded system.)	36
Figure 3.11 	DR of fragile watermark detector to 1000 random Keys. (The 500th key is the key, S_D, we actually obtained from embedded system.)	37
Figure 3.12 	Extracted fragile watermark under the attack (a) to (p).	38
Figure 3.13 	DR of the extracted fragile watermark under the attack (a) to (p).	38
Figure 3.14 	MPSNR value simulated by various sizes of dither cell.	39
Figure 3.15 	Examples of rotated images with other malicious attacks. (rotating angle = 30)	40
Figure 3.16 	Rotated Lena image with 10% and 20% cropping.	42
Figure 4.1 	BPWT coefficients’ position labeling.	48
Figure 4.2 	Proposed watermark embedding system.	49
Figure 4.3 	Proposed watermarks extracting system.	49
Figure 4.4 	PSO trained human visual filter of size 7×7.	56
Figure 4.5 	Extracted spatial domain based watermarks under malicious attacks.	60
Figure 4.6 	Extracted frequency domain based watermarks under malicious attacks.	61
Figure 4.7 	DR of extracted spatial and frequency domain based watermarks under malicious attacks.	63
Figure 4.8 	Correlation between the block halftoning image, H_(C_0)^n and H_(C_1)^n, without frequency domain based watermarks.	65
Figure 4.9 	Correlation between the block halftoning image, H_(C_0)^n and H_(C_1)^n, with frequency domain based watermarks.	65
Figure 5.1 	The basic theory of SVM.	70
Figure 5.2 	Structure of the improved watermarks embedding system.	73
Figure 5.3 	Structure of robust watermarks extracting system.	74
Figure 5.4 	The structure of print-and-scan model.	78
Figure 5.5 	The structure of the procedure against print-and-scan attacks model.	79
Figure 5.6 	(a-d) Cropped watermarked Lena image with 100x100, 150x150, 200x200, and 250x250 pixels respectively.	81
Figure 5.7 	(a-d) Boundary Cropped watermarked Lena image with 5x5, 10x10, 20x20, and 30x30 respectively.	83
Figure 5.8 	Tampering attack.	83
Figure 5.9 	(a-c) The watermarked image under 10%, 20%, 30% noise (salt and pepper) attacks respectively.	85  
 
List of Tables
Table 3.1 	Dither cell (Bayer-5).	16
Table 3.2 	Visual quality measured by MPSNR(dB)	38
Table 3.3 	Capacity tested by various sizes of dither cell.	39
Table 3.4 	Estimation errors of the multi-rings Zernike Transform tested by different widths.	40
Table 3.5 	Detecting angles estimated by the Zernike moment method and the proposed method.	40
Table 3.6 	Angle estimation of the rotated image in 30 degree under cropping attacks.	42
Table 3.7 	Scaling factor estimation of the scaled image under cropping attacks.	42
Table 4.1 	Binary pseudowavelet basis and its inverse basis.	48
Table 4.2 	Visual quality simulated by different human visual filter’s size.	55
Table 4.3 	Image quality of watermarked halftone image	58
Table 4.4 	Visual quality simulated by different human visual filter.	58
Table 4.5 	DR of spatial and frequency domain based watermarks under malicious attacks.	62
Table 4.6 	Visual quality comparisons measured by PPSNR.	63
Table 4.7 	Correlation between the halftoning sub-image and reference sub-image with or without frequency domain based watermarks.	66
Table 5.1 	Visual quality simulated by different human visual filter.	81
Table 5.2 	DR of the extracted watermark with cropping attacks simulated by various watermarking schemes.	81
Table 5.3 	DR of the extracted watermark attacked by boundary cropping.	83
Table 5.4 	DR of the extracted watermark under tampering attack.	84
Table 5.5 	DR of the extracted watermark under noise (salt and pepper) attacks.	84
Table 5.6 	DR of the extracted watermark with noise attack tested by various reference watermark lengths.	84
Table 5.7 	DR of the extracted watermark under print-and-scan attacks.	84
Table 5.8 	DR of the extracted watermark under scaling attack.	85
參考文獻
[1]	F. Hartung, M. Kutter, “Multimedia watermarking techniques”, Proceedings of IEEE, pp. 1079-1107, 1999.
[2]	I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Trans. on Image Processing, vol. 6, pp. 1673-1687, 1997.
[3]	M. Kutter, S. Winkler, “A vision-based masking model for spread-spectrum image watermarking”, IEEE Trans. on Image Processing, vol. 11, pp.16–25, 2002.
[4]	C.I. Podilchuk, W.J. Zeng, “Image-adaptive watermarking using visual models”, IEEE Trans. on Selected Areas in Communications, vol. 16, pp. 525–539, 1998.
[5]	Y.S. Kim, O.H. Kwon, R.H. Park, “Wavelet based watermarking method for digital images using the human visual system,” in Proc. IEEE Int. Conf. on Circuits and Systems, vol. 4, pp. 80 -83, 1999.
[6]	J.I. Shin and S.H. Park, “MTF and spatial anisotropy based image compression”, IEICE Trans. on Fundamentals, vol. E83-A, No.9, pp. 1862-1865, 2000.
[7]	C.S. Lu, S.K. Huang, C.J. Sze and H.Y. Mark Liao, “Cocktail watermarking for digital image protection”, IEEE Trans. on Multimedia, vol. 2, pp. 209-224, 2000.
[8]	F.A.P. Petitcolas, R.J. Anderson, G.K. Markus, “Attacks on copyright marking systems”, in Proc. Int. Conf. on Information Hiding, pp. 219-239, 1998.
[9]	F.A.P. Petitcolas, R.J. Anderson, “Evaluation of copyright marking systems”, in Proc. IEEE Int. Conf. on Multimedia Computing and Systems, vol. 1, pp. 574 –579, 1997.
[10]	A.B. Watson, G.Y. Yang, J.A. Solomon and J. Villasenor, “Visibility of wavelet Quantization noise”, IEEE Trans. on Image Processing, vol.6, pp.1164-1175, 1997.
[11]	M. Iwata, A. Shiozaki, “Watermarking method for embedding index data into image utilizing feature of wavelet transform”, IEICE Trans. on Fundamentals, vol. E84-A, pp.1772-1778, 2001.
[12]	D.C. Lou, T.L. Yin, “Adaptive digital watermarking using fuzzy clustering Technique”, IEICE Trans. on Fundamentals, vol. E84-A, pp.2052–2059, 2001.
[13]	X.M. Niu, Z.M. Lu, S.H. Sun, “Digital watermarking of still images with gray-level digital watermarks”, IEEE Trans. on Consumer Electronics, vol.46, pp.137–145, 2000.
[14]	C.S. Lu, H.Y. Mark Liao, “An oblivious and robust watermarking scheme using communications-with-side-information mechanism”, in Proc. Int. Conf. on Information Technology: Coding and Computing, pp.103–107, 2001.
[15]	D. Kundur, D. Hatzinakos, “Improved robust watermarking through attack characterization”, OPTICS EXPRESS, vol.3, pp. 485-490, 1998.
[16]	M. Barni, F. Bartolini, A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. on Image Processing, vol.10, pp. 783-791, 2001.
[17]	M. Barni, F. Bartolini, A. Piva, “Improved wavelet-based watermarking through pixel-wise masking”, IEEE Trans. on Image Processing, vol. 10, pp. 783–791, 2001.
[18]	S.D Lin, C.F. Chen “A robust DCT-based watermarking for copyright protection”, IEEE Trans. on Consumer Electronics, vol. 46, pp. 415 –421, 2000.
[19]	C.T. Hsieh and Y.K. Wu, “Digital image multi-resolution watermark based on human visual system using error correcting code”, Int. Journal of Tamkang Journal of Science and Engineering, vol. 4, pp. 201-208, 2001.
[20]	E.T. Lin and E.J. Delp, “A review of fragile image watermarks”, in Proc. of Multimedia and Security Workshop, pp. 25-29, 1999. 
[21]	C.Y. Lin and S.F. Chang, “Semi-fragile watermarking for authenticating JPEG    visual content”, in Proc. of SPIE, Security and Watermarking of Multimedia Contents, pp. 140-151, 2000. 
[22]	K. Maeno, Q. Sun, S.F. Chang, M. Suto “New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization”, in Proc. of SPIE, Security and Watermarking of Multimedia Contents, pp. 659-670, 2002.
[23]	Y. Nakai “Multivalue semi-fragile watermarking” in Proc. of SPIE, Security and Watermarking of Multimedia Contents, pp. 671-678, 2002.
[24]	D. Yu, F. Sattar, and B. Barkat, “Multi-resolution fragile watermarking using complex chirp signals for content authentication,” Pattern Recognition, vol. 39, pp. 935-952, 2006.
[25]	Q. Sun, S.F. Chang, K. Maeno and M. Suto, “A new semi-fragile image authentication framework combining ECC and PKI infrastructures”, in Proc. IEEE Int. Conf. on Circuits and Systems, pp. 440-443, 2000.
[26]	J. Fridrich, “A hybrid watermark for tamper detection in digital images”, in Proc. of Signal Processing and Its Applications, pp. 301-304, 1999. 
[27]	P. W Wong. “A Public key watermark for image verification and authentication.” in Proc. of ICIP, vol.2, pp. 427-431, 1998. 
[28]	D. Coppersmith, F. Mintzer, C. Tresser, CW. Wu, and M.M. Yeung, “Fragile imperceptible digital watermark with privacy control” in Proc. of SPIE, Security and    Watermarking of Multimedia Contents, pp. 79-84, 1999. 
[29]	J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-based digital signature for motion pictures authentication and content-fragile watermarking”, in Proc. of IEEE conf. on Multimedia Computing and Systems, vol.2, pp.209-213, 1999.
[30]	R.B. Wolfgang and E.J. Delp, “Fragile watermarking using the VW2D watermark”, in Proc. of SPIE, Security and Watermarking of Multimedia Contents, pp. 204-213, 1999. 
[31]	P. Yin and H. H. Yu, “A semi-fragile watermarking system for MPEG video authentication” in Proc. IEEE Conf. on ICASSP, pp. 3461-3464, 2002.
[32]	T. Chen, J. Wang and Y. Zhou, “Combined Digital Signature and Digital Watermark Scheme for Image Authentication”, in Proc. of Info-tech and Info-net, pp. 78-82, 2001.
[33]	G.J. Yu, C.S. Lu, H.Y.M. Liao and J.P. Sheu, “Mean quantization blind watermarking for image authentication”, in Proc. of Image Processing, pp. 706-709, 2000. 
[34]	P.W. Wang and N.D. Memon, “Image processing for halftones,” IEEE Signal Processing Magazine, pp. 59-70, 2003.
[35]	R. Ulichney, “The void-and-cluster method for dither array generation,” in Proc. of SPIE, pp. 332-343, 2004.
[36]	R. Ulichney, “Digital Halftoning,” The MIT Press, 1987.
[37]	M.S. Fu and O.C. Au, “A robust public watermark for halftone images,” in Proc. of Circuits and Systems, vol. 3, pp. 639 -642, 2002.
[38]	M.S. Fu and O.C. Au, “A multi-bit robust watermark for halftone images,” in Proc. of Multimedia and Expo, vol. 1, pp. 213-216, 2003.
[39]	M.S. Fu and O.C. Au, “Data hiding in halftone images by stochastic error diffusion,” in Proc. of Acoustics, Speech, and Signal Processing, vol. 3, pp. 1965-1968, 2001.
[40]	M.S. Fu and O.C. Au, “A novel self-conjugate halftone image watermarking technique,” in Proc. of Circuits and System, vol. 3, pp. 790 –793, 2003.
[41]	M.S. Fu and O.C. Au, “A novel method to embed watermark in different halftone images: data hiding by conjugate error diffusion (DHCED),” in Proc. of Multimedia and Expo, vol. 1, pp. 609 –612, 2003.
[42]	M.S. Fu and O.C. Au, “A set of mutually watermarked halftone images,” in Proc. of Image Processing, vol. 2, pp. 467 – 470, 2003.
[43]	S.C. Pei, J.M. Guo and H. Lee, “Novel robust watermarking technique in dithering halftone images,” IEEE Letter on Signal Processing, vol. 12, pp. 333-336, 2005.
[44]	D. Kacker, and J.P. Allebach, “Joint halftoning and watermarking,” IEEE Trans. on Signal Processing, vol. 51, pp.1054-1068, 2003.
[45]	C.Y. Hsu, and C.S. Lu, “Joint image halftoning and watermarking in high-resolution digital form,” in Proc. IEEE Int. Conf. Multimedia Expo, pp. 534-537, 2005.
[46]	Z. Baharav, and D. Shaked, “Watermarking of dither halftoned image,” in Proc. SPIE Int. Conf. Security Watermark, Multimedia Content 3657, pp. 307-316, 1999.
[47]	J.R. Goldschneider, E.A. Riskin, and P.W. Wong, “Embedded multilevel error diffusion,” IEEE Trans. on Image Processing, vol.6, pp. 956-964, 1997.
[48]	P. Bao, and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE Trans. on Circuits and Systems for Video Technology, vol.15, pp. 96-102, 2005.
[49]	H.O. Hagit, “Copyright labeling of printed images,” in Proc. of Image Processing, vol.3, pp. 702–705, 2000.
[50]	D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication”, Proceedings of IEEE, vol. 87, pp. 1167-1180, 1999.
[51]	C.S. Lu, L.Y. Mark Liao “Multipurpose watermarking for image authentication and protection” IEEE Trans. on image Processing, vol. 10, pp. 1579 –1592, 2001.
[52]	K.M. Hung, C.T. Hsieh and Y.K. Wu, “Multi-Purpose Watermarking Schemes for Color Halftone Image Based on Wavelet and Zernike Transform”, WSEAS Trans. on Computer, vol. 6, pp. 9-14, 2007.
[53]	C.T. Hsieh, Y.K. Wu and H.Y. Chen, “Semi-fragile Image authentication using real-symmetric matrix,” J. of Information Sciense and Engineering, vol. 22, pp. 701-712, 2006.
[54]	Z.M. Lu, D.G. Xu, and S.H. Sun, “Multipurpose image watermarking algorithm based on multistage vector quantization,” IEEE Trans. on Image Processing, vol. 14, pp. 822-831, 2005.
[55]	V. Aslantas, S. Ozer, S. Ozturk, “A novel fragile watermarking based on Particle Swarm Optimization,” in Proc. IEEE Int. Conf. Digital Object Identifier, pp.269-272, 2008
[56]	J. Kennedy, and R.C. Eberhart, “Particle swarm optimization,” in Proc. of IEEE Neural Networks, pp. 1942-1948, 1995.
[57]	Y.D. Valle, G.K. Venayagamoorthy, S. Mohagheghi, J.C. Hernandez, R.G. Harley, “Particle swarm optimization: basic concepts, variants and applications in power system,” IEEE Trans. on Evolutionary Computation, pp. 171-195, 2008.
[58]	N. Jin, and R.S. Yahya, “Advances in particle swarm optimization for antenna designs: real-number, binary, single-objective and multiobjective implementations,” IEEE Trans. on Antennas and Propagation, vol.55, pp. 556-567, 2007.
[59]	B. Zhao, C.X. Guo, and Y.J. Cao, “A multiagent-based particle swarm optimization approach for optimal reactive power dispatch,” IEEE Trans. on Power Systems, vol.20, pp.1070-1078, 2005.
[60]	D. Liu, K.C. Tan, C.K. Goh, and W.K. Ho, “A multiobjective memetic algorithm based on particle swarm optimization,” IEEE Trans. on System, Man, and Cybernetics-Part B, vol.37, pp.42-50, 2007.
[61]	Z.J. Lee, S.W. Lin, S.F. Su, and C.Y. Lin, “A hybrid watermarking technique applied to digital images,” Applied Soft Computing, vol.8, pp. 798-808, 2008.
[62]	X. Li, and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm,” Information Sciences, vol.177, pp. 3099-3109, 2007.
[63]	R.W. Floyd, and L. Steinberg, “Adaptive algorithm for spatial grey scale,” SID Int. Sym. Digest of Tech. Papers, pp. 36-37, 1975.
[64]	J.F. Javis, C.N. Judice, and W.H. Ninke, “A survey of techniques for the display of continuous-tone pictures on bilevel displays,” Computer Graphics and Image Processing, vol.5, pp.13-40, 1976.
[65]	P. Stucki, “MECCA –a multiple error correcting computation algorithm for bilevel  image hardcopy reproduction,” Research Report RZ1060, IBM Research Laboratory, 1981.
[66]	O'Ruanaidh, J. K. Joseph and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” in Proc. IEEE Conf. on Image Processing, pp. 536-539, 1997.
[67]	H. S. Kim, and H. K. Lee, “Invariant image watermark using Zernike moments”, IEEE Trans. on Circuits and Systems for Video Technology, pp. 766-775, 2003.
[68]	Y. Xin, S. Liao, and M. Pawlak, “A multibit geometrically robust image watermark based on Zernike moments”, in Proc. of Pattern Recognition, pp. 861-864, 2004.
[69]	H. Liu, J. Lin, and J. Huang, “Image authentication using content based watermark”, in Proc. of IEEE Circuits and Systems, pp. 4014-4017, 2005.
[70]	M. Farzam, and S. Shirani, “A robust multimedia watermarking technique using Zernike transform”, in Proc. of IEEE Multimedia Signal Processing, pp. 529-534, 2004.
[71]	J. Chen, H. Yao, W. Gao and S. Liu, “A robust watermarking method based on wavelet and Zernike transform”, in Proc. of Circuits and Systems, pp. 173-176, 2004.
[72]	T. Kazaana, S. Kaneko and S. Igarashi, “Fast and Rotation-invariant Image Registration Using Zernike Moments,” IEE Trans. On Japan, vol.121-C, No.5, 2001.
[73]	S. Pigeon and Y. Bengio, “Binary Pseudowavelets and Applications to Bilevel Image Processing,” in Proc. Data Compression Conference, pp. 364-373, 1999.
[74]	C.T. Hsieh and Y.K. Wu, “Geometric invariant semi-fragile Image authentication using real-symmetric matrix,” in Trans. WSEAS on Signal Processing,  vol.5, pp.612-617, 2006.
[75]	P. Sherry and A. Savakis, “Improved Techniques for Watermarking Halftone Images,”    in Proc. Acoustics, Speech, and Signal Processing, vol. 5, pp.1005- 1008, 2004. 
[76]	J.M. Guo, “Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning”, Signal Processing, vol.88, pp. 1496-1510, 2008.
[77]	J. M. Guo, S. C. Pei, and H. Lee, " Paired sub-image matching watermarking method on ordered dither images and its high-quality progressive coding," IEEE Trans. Multimedia, vol. 10, pp. 16-30, 2008.
[78]	S. C. Pei, and J. M. Guo, “High capacity data hiding in halftone images using minimal error bit searching and least mean square filter,” IEEE Trans. Image Processing, vol. 15, pp. 1665-1679, 2006.
[79]	L. Yu, X. Niu, and S. Sun, “Print-and-Scan model and the watermarking countermeasure,” Image and Vision Computing, vol.23, pp. 807-814, 2005.
[80]	K. Solanki, U. Madhow, B.S. Manjunath, S. Chandrasekaran, and I.E. Khalil, “`Print and Scan' Resilient Data Hiding in Images,” IEEE Trans. on Information Forensics and Security, vol.1, pp.464-478, 2006.
[81]	V. Vapnik, “The nature of statistical learning theory,” Springer, New York, 1995.
[82]	X.Y. Wang, P.P. Niu, and W. Qi, “A new adaptive digital audio watermarking based on support vector machine,” Journal of Network and Computer Applications, vol.31, pp. 725-749, 2007.
[83]	X.Y. Wang, H.Y. Yang, and C.Y. Cui, “An SVM-based robust digital image watermarking against desynchronization attacks,” Signal Processing, vol.88, pp.2193-2205, 2008.
[84]	C.C. Wu, C.H. Chou, and F. Chang, “A machine-learning approach for analyzing document layout structures with two reading orders,” Pattern Recognition, vol.41, pp.3200-3213.
[85]	H.H. Tsai, and D.W. Sun, “Color image watermark extraction based on support vector machines,” Int. Journal of Information Sciences, vol.177, pp. 550-567, 2007.
[86]	C.H. Li, H.F. Ling, and Z.D. Lu, “Semi-Fragile Watermarking Based on SVM for Image Authentication,” in Proc. Conf. on Multimedia and Expo, pp.1255-1258, 2007.
[87]	H. Qi, D. Zheng, and J. Zhao, “Human visual system based adaptive digital image watermarking,” Signal Processing, vol.88, pp.174-188, 2008.
[88]	A. Koz, and A.A. Alatan, “Oblivious spatio-temporal watermarking of digital video by exploiting the human visual system,” IEEE Trans. on Circuits and Systems for Video Technology, vol.18, pp.326-337, 2008.
[89]	C.S. Lu, and C.Y. Hsu, “Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding,” IEEE Trans. on Circuits and Systems for Video Technology, vol.17, pp. 454-467, 2007.
[90]	B. Zhao, C.X. Guo, and Y.J. Cao, “A multiagent-based particle swarm optimization approach for optimal reactive power dispatch,” IEEE Trans. on Power Systems, vol.20, pp.1070-1078, 2005
[91]	J. Sang and M.S. Alam, “Fragility and robustness of binary-phase-only filter based fragile/semifragile digital image watermarking,” IEEE Trans. on Instrumentation and Measurement, vol.57, pp. 595-606, 2008.
[92]	M. Shehab, E. Bertino, and A. Ghafoor, “Watermarking relational databases using optimization-based technique,” IEEE Trans. on Knowledge and Data Engineering, vol.20, pp. 116-129, 2008.
[93]	M.S. Fu and O.C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Trans. on Images Processing, vol.11, pp.477-84, 2002.
[94]	N. Cristianini, and J. Shawe-Taylor, “An introduction to support vector machine and other kernel-based learning methods,” Cambridge University Press, 2000.
[95]	C.T. Hsieh, Y.K. Wu, and W.Z. Chung, “Digital watermarking system for halftone images based on particle swarm optimization,” in Proc. IEEE Conf. on Ubi-Media Computing, pp.201-206, 2008.
[96]	S.C. Pei, and J.M. Guo, “Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp.867-884, 2003.
論文全文使用權限
校內
紙本論文於授權書繳交後5年公開
校內書目立即公開
校外
不同意授權

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信