淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-1907201019462100
中文論文名稱 以轉移圖和嵌入法則為基礎之DWT浮水印技術
英文論文名稱 DWT Watermarking Techniques Based on Translation Map and Embedding Rule
校院名稱 淡江大學
系所名稱(中) 資訊工程學系碩士班
系所名稱(英) Department of Computer Science and Information Engineering
學年度 98
學期 2
出版年 99
研究生中文姓名 呂哲緯
研究生英文姓名 Che-Wei Lu
電子信箱 tony90981@hotmail.com
學號 697410545
學位類別 碩士
語文別 中文
第二語文別 英文
口試日期 2010-06-29
論文頁數 58頁
口試委員 指導教授-林慧珍
委員-徐道義
委員-顏淑惠
委員-許秋婷
委員-林慧珍
中文關鍵字 離散餘弦轉換  離散小波轉換  基因演算法  粒子群最佳化演算法  轉移圖  嵌入法則 
英文關鍵字 discrete cosine transform(DCT)  discrete wavelet transform(DWT)  genetic algorithm(GA)  particle swarm optimization(PSO)  translation map  embedding rule 
學科別分類 學科別應用科學資訊工程
中文摘要 近年來,隨著資訊科技的進步,網際網路已成為最受歡迎的宣傳、銷售媒介,有許多企業開始將傳統的商業活動開拓至網際網路上,不僅為企業及其顧客帶來相當大的便利性,更拓展出電子購物、電子文件交換等新的商機。這些有價值的媒體如影像、聲音、影片等以數位化的形式在網際網路上傳送的同時,非常容易遭到非法的複製與盜用。例如近年來就有許多網站,以較低廉的價格提供一些賣座電影供使用者下載觀看,或者是知名歌手的新專輯,在還未發片之前就已被人在網路上播放,也因此使片商或唱片公司遭受到不少的損失。因此,智慧財產權的認證及驗證問題在數位化的網路環境中就顯得格外地重要。而數位浮水印便是用來解決此一問題的有效技術。本論文主要目的即是針對數位浮水印的技術深入研究以期望能在此領域有所貢獻,提出來的方法主要有兩個:第一個方法是使用DWT和PSO的浮水印技術,第二個方法則是以一個法則嵌入浮水印的技術。
為了達到更好的偽裝影像品質和擷取出來的浮水印之辨識率,我們所提的第一個方法,將使用PSO去做訓練,以期望能找到translation map的最佳近似解,來提升偽裝影像的品質,而且在無遭受到一些影像處理的攻擊或有遭受到攻擊,擷取出來的浮水印都具有不錯的強健性並且時間花費也較少。對於我們所提的第二個方法,將利用已經定義好的嵌入法則來完成嵌入浮水印,嵌入浮水印後有令人滿意的偽裝影像品質,而在無遭受到一些影像處理攻擊或有遭受到攻擊,擷取出來的浮水印仍有不錯的辨識率,另外,時間花費也較少,使用者可依照自己的需求,選擇使用自己想要的方法。
英文摘要 Information hiding has become an important research issue in recent years, since developing techniques to solve unauthorized copying, tampering, and multimedia data delivery through the internet has been more and more urgent. The information hiding techniques mainly include steganography and digital watermarking.
In this paper, we present two approaches that are able to reach image authentication and ownership protection even tampering detection. For the first approach, we use Discrete Wavelet Transformation (DWT) as major components. In order to gain the best translation maps, we use Particle Swarm Optimization (PSO) to train. On the other hand, the second approach embeds watermark in the HL and LH subbands of DWT associated with an embedding rule.
The experimental results show that DWTMPSO is more efficient in computational time and more robust than the method proposed by V. Aslantas et al.. Furthermore, DWTMPSO is not only capable of image authentication and ownership protection but it is also able to detect exactly where the image has been tampered with. On the other hand, DWTER indeed produces better results than the compared method in terms of quality of the stego images and robustness of watermarks, and time efficiency.
論文目次 目 錄
第一章 緒論.......................1
1.1 研究背景、動機與目的..........1
1.2 論文架構......................3
第二章 數位浮水印之相關研究.......4
第三章 研究方法..................10
3.1 方法一 DWTMPSO ..............10
3.2 方法二 DWTER.................15
3.3 其它應用.....................18
第四章 實驗結果與討論............19
4.1 灰階影像浮水印隱藏...........19
4.2 彩色影像浮水印隱藏...........35
4.3 竄改的位置偵測...............38
第五章 結論與未來研究方向........40
參考文獻.........................42
附錄—英文論文...................45

圖目錄
圖1. HL頻帶藏入位置示意圖...........................11
圖2. (a)IDCT或IDWT的結果 (b)訓練出來的轉移圖 (c)藏入浮水印後的圖結果..12
圖3. 一個PSO位置更新簡單範例........................13
圖4. 選擇嵌入位置流程圖.............................16
圖5. 嵌入規則範例:若w = 0則調整區塊裡的係數使其平均值M(m, n)變成0;若w = 1則M(m, n)變成3......................16
圖6. 測試灰階影像及黑白浮水印 (a)測試影像1 (b)測試影像2 (c)測試影像3 (d)測試影像4 (e)浮水印 w..................20
圖7. 對測試影像1使用本文的第二個方法DWTER其偽裝影像的攻擊範例(a)竄改影像 (b)JPEG (QF = 99) (c)點雜訊 (rate = 0.04) (d)亮度和對比 +20 (e)簽名塗鴉 (f)正框裁切 (g)斜框裁切 (h)球體效果 (i)馬賽克效果(j)亮度 -10 (k)亮度 +10 (l)對比 -10 (m)對比 +10 (n)水波效果 (o)反向(p)強風效果 (q)漩渦效果 (r)清晰化..22
圖8. V. Aslantas方法之結果 (a)偽裝影像 (b)萃取浮水印....22
圖9. DWTMPSO方法之結果 (a)偽裝影像 (b)萃取浮水印........22
圖10. C. C. Chang方法之結果 (a)偽裝影像 (b)萃取浮水印...23
圖11. DWTER方法之結果 (a)偽裝影像 (b)萃取浮水印.........23
圖12. V. Aslantas方法之結果 (a)偽裝影像 (b)萃取浮水印...25
圖13. DWTMPSO方法之結果 (a)偽裝影像 (b)萃取浮水印.......25
圖14. C. C. Chang方法之結果 (a)偽裝影像 (b)萃取浮水印...25
圖15. DWTER之結果 (a)偽裝影像 (b)萃取浮水印.............25
圖16. 測試彩色影像及黑白浮水印 (a)測試影像5 (b)測試影像6 (c)浮水印 w..35
圖17. DWTMPSO方法之結果 (a)偽裝影像 (b)萃取浮水印.......37
圖18. DWTER方法之結果 (a)偽裝影像 (b)萃取浮水印.........37
圖19. DWTMPSO方法之結果 (a)偽裝影像 (b)萃取浮水印.......37
圖20. DWTER方法之結果 (a)偽裝影像 (b)萃取浮水印.........37
圖21. 竄改偵測的測試影像 (a)測試影像7 (b)測試影像8 (c)測試影像9 (d)測試影像10 (e)浮水印w............................38
圖22. 測試影像7的竄改偵測結果 (a)偽裝影像 (b)竄改後影像 (c)萃取浮水印 (d) 白點為竄改的位置.........................38
圖23. 測試影像8的竄改偵測結果 (a)偽裝影像 (b)竄改後影像 (c)萃取浮水印 (d) 白點為竄改的位置.........................39
圖24. 測試影像9的竄改偵測結果 (a)偽裝影像 (b)竄改後影像 (c)萃取浮水印 (d) 白點為竄改的位置.........................39
圖25. 測試影像10的竄改偵測結果 (a)偽裝影像 (b)竄改後影像 (c)萃取浮水印 (d) 白點為竄改的位置.........................39

表目錄
表一. 前兩個方法結果比較(測試影像1)...............23
表二. 後兩個方法結果比較(測試影像1)...............24
表三. 前兩個方法結果比較(測試影像2)...............26
表四. 後兩個方法結果比較(測試影像2)...............27
表五. 前兩個方法結果比較(測試影像3)...............28
表六. 後兩個方法結果比較(測試影像3)...............29
表七. 前兩個方法結果比較(測試影像4)...............30
表八. 後兩個方法結果比較(測試影像4)...............31
表九. 前兩個方法結果比較(四張測試影像平均值)......32
表十. 後兩個方法結果比較(四張測試影像平均值)......33
表十一. 本論文提出兩個方法比較....................36
參考文獻 [1] X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006.
[2] C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition Letters, Vol. 36, No. 7, pp. 1583-1595, 2003.
[3] C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognition Letters, Vol. 41, No. 8, pp. 2674-2683, 2008.
[4] Y. Wang and A. Pearmain, “Blind image data hiding based on self reference,” Pattern Recognition Letters, Vol. 25, No. 15, pp. 1681-1689, 2004.
[5] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition Letters, Vol. 34, No. 3, pp. 671-683, 2001.
[6] J. Tian, “Reversible data embedding using difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890-896, 2003.
[7] H. W. Tseng and C. C. Chang, “An extended difference expansion algorithm for reversible watermarking,” Image and Vision Computing, Vol. 26, No. 8, pp. 1148-1153, 2008.
[8] C. C. Lee, H. C. Wu, C. S. Tsai, and Y. P. Chu, “Adaptive lossless steganographic scheme with centralized difference expansion,” Pattern Recognition Letters, Vol. 41, No. 6, pp. 2097-2106, 2008.
[9] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.
[10] Y. P. Hsieh, C. C. Chang, and L. J. Liu, “A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity,” Pattern Recognition Letters, Vol. 41, No.10, pp. 3104-3113, 2008.
[11] C. Y. Lin and C. C. Chang, “Hiding data in VQ-compressed images using dissimilar pairs,” Journal of Computers, Vol. 17, No. 2, pp. 3-10, 2006.
[12] K. L. Chung, C. H. Shen, and L. C. Chang, “A novel SVD- and VQ-based image hiding scheme,” Pattern Recognition Letters, Vol. 22, No. 9, pp. 1051- 1058, 2001.
[13] C. C. Chang and C. Y. Lin, “Reversible steganographic method using SMVQ approach based on declustering,” Information Sciences, Vol. 177, No. 8, pp. 1796-1805, 2007.
[14] P. L. Lin, C. K. Hsieh, and P. W. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition Letters, Vol. 38, No. 12, pp. 2519-2529, 2005.
[15] G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD,” Computer Standards & Interfaces, Vol. 31, No. 5, pp. 1002-1013, 2009.
[16] H. C. Huang, S. C. Chu, and Y. H. Huang, “VQ-based watermarking techniques,” Journal of Computers, Vol. 17, No. 2, pp. 37-50, 2006.
[17] M. H. Pi and C. H. Li, “A novel fractal watermarking technique,” IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5, pp. 369-372, 2004.
[18] M. S. Wang and W. C. Chen, “A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography,” Computer Standards & Interfaces, Vol. 31, No. 4, pp. 757-762, 2009.
[19] Y. G. Fu and R. M. Shen, “Color image watermarking scheme based on linear discriminant analysis,” Computer Standards & Interfaces, Vol. 30, No. 3, pp. 115-120, 2008.
[20] W. C. Chen and M. S. Wang, “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication,” Expert Systems with Applications, Vol. 36, No. 2, pp. 1300-1307, 2009.
[21] P. T. Yu, H. H. Tsai, and J. S. Lin, “Digital watermarking based on neural networks for color images,” Signal Processing, Vol. 81, No. 3, pp. 663-671, 2001.
[22] S. H. Yen and C. J. Wang, “SVM based watermarking technique,” Tamkang Journal of Science and Engineering, Vol. 9, No. 2, pp. 141-150, 2006.
[23] S. H. Yen, C. J. Wang, and Y. T. Kao, “A watermarking scheme based on SVM and tolerable position map,” IEEE International Conference on Systems, Man, and Cybernetics, Vol. 4, pp. 3170-3175, 2006.
[24] V. Aslantas, A. L. Dogan, and S. Ozturk, “DWT-SVD based image watermarking using particle swarm optimizer,” IEEE International Conference on Multimedia and Expo, pp. 241-244, 2008.
[25] V. Aslantas, “An optimal robust digital image watermarking based on SVD using differential evolution algorithm,” Optics Communication, Vol. 282, No. 5, pp. 769-777, 2009.
[26] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognition Letters, Vol. 37, No. 3, pp. 555-565, 2004.
[27] Z. J. Lee, S. W. Lin, S. F. Su, and C. Y. Lin, “A hybrid watermarking technique applied to digital images,” Applied Soft Computing, Vol. 8, No.1, pp. 798-808, 2008.
[28] S. Rezazadeh and M. Yazdi, “An adaptive watermarking scheme based on morphological binary wavelet decomposition,” International Conference on Signal Processing, Vol. 4, pp. 16-20, 2006.
[29] C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, Vol. 177, No. 13, pp. 2768-2786, 2007.
[30] M. C. Chang, D. C. Lou, and H. K. Tso, “Combined watermarking and fingerprinting technologies for digital image copyright protection,” Imaging Science Journal, Vol. 55, No. 1, pp. 3-12, 2007.
[31] W. H. Lin, Y. R. Wang, S. J. Horng, T. W. Kao, and Y. Pan, “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, Vol. 36, No. 9, pp. 11509-11516, 2009.
[32] C. C. Chang and P. Y. Lin, “Adaptive watermark mechanism for rightful ownership protection,” Journal of Systems and Software, Vol. 81, No. 7, pp. 1118-1129, 2008.
[33] V. Aslantas, S. Ozer, and S. Ozturk, “Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms,” Optics Communication, Vol. 282, No.14, pp. 2806-2817, 2009.
[34] C. C. Chang, W. L. Tai, and C. C. Lin, “A multipurpose wavelet-based image watermarking,” International Conference on Innovative Computing, Information and Control, Vol. 3, pp. 70-73, 2006.
[35] Y. X. Jin, H. Z. Cheng, J. Y. Yan, and L. Zhang, “New discrete method for particle swarm optimization and its application in transmission network expansion planning,” Electric Power Systems Research, Vol. 77, No. 3-4 , pp. 227-233, 2007.
[36] Z. Haibao, C. Haozhong, and W. Xu, “Using ant colony system algorithm to solve dynamic transmission network expansion planning,” International Power Engineering Conference, pp. 814-819, 2003.
[37] H. J. Lin and J. P. Yeh, “A hybrid optimization strategy for simplifying the solutions of support vector machines,” Pattern Recognition Letters, Vol. 37, No. 7, pp. 563-571, 2010.
[38] J. Kennedy and R. Eberhart, “Particle Swarm Optimization,” IEEE International Conference on Neural Networks, Vol. 4, pp. 1942-1948, 1995.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2010-08-03公開。
  • 同意授權瀏覽/列印電子全文服務,於2010-08-03起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信