§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2806201915044800
DOI 10.6846/TKU.2019.00954
論文名稱(中文) 以類別索引表為基礎之彩色浮水印技術研究
論文名稱(英文) A Study of CIT-based Color Image Watermarking Method
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系資訊網路與多媒體碩士班
系所名稱(英文) Master's Program in Networking and Multimedia, Department of Computer Science and Information Engine
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 107
學期 2
出版年 108
研究生(中文) 劉蕙芩
研究生(英文) Hui-Qin Liu
學號 606420064
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2019-06-14
論文頁數 36頁
口試委員 指導教授 - 陳建彰(ccchen34@gmail.com)
委員 - 陳伯榮(pozung@mail.tku.edu.tw)
委員 - 楊權輝(chyang@hcu.edu.tw)
關鍵字(中) 可逆浮水印技術
類別索引表
距離配對
關鍵字(英) Class Index Table (CIT)
random preprocessing
nearest matching
第三語言關鍵字
學科別分類
中文摘要
浮水印技術為嵌入資訊於數位影像中之一種技術,再藉由資料抽取的步驟,取出原嵌入的資訊。而可逆浮水印技術(Reversible Image Watermarking)在抽取已嵌入的浮水印資訊後,可以同時獲得完整的原始影像。可逆浮水印技術對於著作權的保護,有很重要的保護功能。
至目前有眾多可逆浮水印的技術被提出。近年來,有學者提出類別索引表(Class Index Table, CIT)方法,藉由區塊內排列順序的調整,建立視覺上與掩護影像相似的浮水印嵌入後的圖。然而,直接使用類別索引表的浮水印嵌入後之視覺效果並不好,本論文研究使用彩色影像間之配對方式,透過影像區塊距離矩陣、貪婪式配對方式及類別索引表嵌入三大步驟,進行快速的計算處理,以期能獲得高效能及高品質之掩護影像。本論文比較多種類別索引表的方法,並期能獲得較佳的參數組合。
英文摘要
A reversible image watermarking scheme recovers the original image after extracting the embedded watermarks. A conventional CIT-based image watermarking method segments digital images to combination of non-overlapped blocks. Blocks of the original image is one-to-one mapped to blocks of the covered image for acquiring the watermarked image. The mapping table is needed for perfectly recovering the original image from the watermarked image. Quality of the watermarked image is determined by mapping procedure and the selection of mapping table. In this study, we examine different selection strategies to present an efficient method for acquiring good quality of the watermarked image. Analysis with other selected strategies, like random preprocessing or nearest matching, are compared. Moreover, color image has better watermarked image quality than gray-level image. For acquiring good watermarked image, nearest matching is the so-far best strategy on the CIT-based method. Experimental results show that the watermarked image has a similar visual effect to the target image but can perfect recover to the original image by using the mapping table.
第三語言摘要
論文目次
目錄
 第一章 緒論	1
1.1	研究背景	1
1.2	研究動機	1
1.3	研究目的及問題	2
1.4	研究架構	3
 第二章 文獻探討	4
2.1	類別索引表技術介紹	4
2.2	二元關係(Binary Relations)	6
2.3	二分圖配對法(Bipartite Matching)	7
 第三章 本論文所提出之方法	9
3.1	直接配對法	10
3.2	亂數前處理法	11
3.3	貪婪式配對法	11
3.4	各種方法比較	15
 第四章 實驗結果與分析	19
4.1	實驗結果	19
4.2	比較分析	24
 第五章 結論	27
 參考文獻	28
 附錄-英文論文	31
 
圖目錄
圖一、影像區塊與對應之類別索引表	4
圖二、利用類別索引表的影像區塊浮水印計算	5
圖三、(2,4,3)類別索引表技術中,可能產生錯誤還原的情形	6
圖四、兩種f : AB的對應關係圖	7
圖五、本研究處理步驟圖	9
圖六、本研究結果示意圖	10
圖七、直接配對法的一對一配對方式	10
圖八、原始影像I與參考影像C的區塊編號定義	12
圖九、本研究所提出貪婪式配對法之浮水印嵌入演算法	14
圖十、本研究的配對方式與各種前處理的關係	16
圖十一、本研究所採用的影像	20
圖十二、原始影像為Airplane,參考影像為Baboon的實驗結果	21
圖十三、原始影像為House,參考影像為Pepper的實驗結果	22
圖十四、原始影像為Pepper,參考影像為House的實驗結果	24

表目錄
表一、四種方法的理論比較	17
表二、六種重要不同的亂數前處理、距離矩陣計算、與配對式方法	20
表三、四種方法的範例比較值	24
表四、不同影像與處理方法所需的執行時間	25
參考文獻
[1] A. Jolfaei, X. W. Wu and V. Muthukkumarasamym, “On the security of permutation-only image encryption schemes,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 235–246, 2016.
[2] A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147–1156, 2004. 
[3] B. Ou, X. L. Li, Y. Zhao, R. R. Ni and Y. Q. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 5010–5021, 2013.
[4] C. C. Chen, Y. H. Tsai and H. C. Yeh, “Difference-expansion based reversible and visible image watermarking scheme,” Multimedia Tools Applications, vol.76, no. 6, 8497–8516, March, 2017.
[5] C. C. Chen and W. J. Wu, “A secure boolean-based multi-secret image sharing scheme,” Journal of Systems and Software, vol. 92, no. 1, pp. 107–114, 2014. 
[6] J. Li, X. L. Li, B. Yang and X. M. Sun, “Segmentation-based image copy-move forgery detection scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507–518, 2015. 
[7] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003. 
[8] L. Luo, Z. Y. Chen, M. Chen, X. Zeng and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 187–193, 2010. 
[9] C. F. Lee, H. L. Chen and H. K. Tso, “Embedding capacity raising in reversible data hiding based on prediction of difference expansion,” Journal of System and Software, vol. 83, no. 10, pp. 1864–1872, 2010. 
[10] C. C. Lin, S. P. Yang and N. L. Hsueh, “Reversible data hiding based on three-circular-pixel difference expansion,” Fundamenta Informaticae, vol.91, no. 3–4, pp. 581–595, 2009. 
[11] T. Y. Liu and W. H. Tsai, “Generic lossless visible Watermarking—A new approach,” IEEE Transactions on Image Processing, vol. 19, no. 5, pp. 1224–1235, 2010. 
[12] H. M. Tsai and L. W. Chang, “Secure reversible visible image watermarking with authentication,” Signal Process Image Communication, vol. 25, no. 1, pp. 10–17, 2010. 
[13] W.M. Zhang, H. Wang, D. Hou, and N. Yu,” Reversible Data Hiding in Encrypted Images by Reversible Image Transformation,” IEEE Transactions on Multimedia, vol. 18, no. 8, Aug. 2016.
[14] Y. J. Hu and B. W. Jeon, “Reversible visible watermarking and lossless recovery of original images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 11, pp. 1423–1429, 2006. 
[15] Y. J. Hu, H. K. Lee, K. Y. Chen and J. W. Li, “Difference expansion based reversible data hiding using two embedding directions,” IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1500–1512, 2008. 
[16] Y. Yang, X. M. Sun, H. F. Yang, C. T. Li and R. Xiao, “A contrast-sensitive reversible visible image watermarking technique,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 5, pp. 656–667, 2009. 
[17] Z. C. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006. 
[18] R.W. Irving, “Greedy matchings,” University of Glasgow, Computing Science Department Research Report, TR-2003-136, April 2003.
[19] E. Lehman, F. T. Leighton, A. R. Meyer, “Mathematics for Computer Science,” Samurai Media Limited, 2017.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信