| 研究生: |
梁凱雯 Kai-Wen Liang |
|---|---|
| 論文名稱: |
基於特徵值空間分解之影像認證系統 Image Authentication System based on Eigenvalue Decomposition |
| 指導教授: |
張寶基
Pao-Chi Chang |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 通訊工程學系 Department of Communication Engineering |
| 畢業學年度: | 92 |
| 語文別: | 英文 |
| 論文頁數: | 65 |
| 中文關鍵詞: | 浮水印 、影像認證 、數位簽章 |
| 外文關鍵詞: | image authentication, digital signature, watermarking |
| 相關次數: | 點閱:12 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在本篇論文中,我們提出基於特徵值空間分解影像認證系統,為期達到對一定範圍內之失真容忍度及區域性認證,此系統以區塊為單位計算影像係數值之統計特性,將區塊內之影像信號作特徵空間之分解,擷取其特徵值作為代表各區塊之數位簽章的來源,加密後傳送,接收端將解密後的特徵值用以認證所收到之影像資訊。
我們將區塊先分成大小相同之子區塊,每一子區塊視為一隨機變數,各子區塊的大小作隨機變數之信號觀測空間以計算其期望值,進而對得到之信號空間作特徵值分解,取其最重要之一到數個特徵值作為一區塊之特徵代表。將取出之特徵代表經過量化後得到對應於各區塊之數位簽章,在認證端計算特徵之方式均與傳送端相同,唯在認證端的量化過程中在各量化區間的邊界處設一模糊區域用以容忍影像區塊之特徵值之小幅度變化。
實驗結果證明此系統以區塊為單位並以特徵值擷取作為數位簽章的方法對於經過常見之影像處理後所造成的失真能達到一定的容忍度,並對於有意義之影像竄改能有高偵測率。
In this thesis, we propose an image authentication system based on eigenvalue decomposition. In order to be incidental distortion tolerant and localization dominating, the feature is extracted on block based.
The feature extracted from each block is depended on the statistical characteristic inside one block. Each block is first divided into sub-blocks with the same size. Each sub-block is considered as an observation signal space of a random variable. Each block has random variables that match the number of sub-blocks. The eigenvalue decomposition operation is done within one image block. The feature is produced from the dominated eigenvalues. The feature is then quantized to generate the final signature for each block.
In the receiver end, the feature of one image block is extracted from the same process in the transmission end, but it is quantized with a neutral zone. The neutral zone can tolerate the small change of the feature caused by the incidental distortions.
The simulation results show that the proposed system works well in tolerating some kinds of image processing and achieves high detection accuracy.
[1] P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. International Conference, vol. 1, no. 4-7, pp. 455 - 459, Oct. 1998.
[2] M. M. Yeung, and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. International Conference, vol. 2 , no. 26-29, pp. 680 - 683, Oct. 1997.
[3] H. Matthew. and Nasir Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking scheme,” IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, Mar. 2000.
[4] M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp, “Hierarchical watermarking for secure image authentication with localization,” in Proc., IEEE Trans., vol. 11, issue: 6, pp. 585 – 595, June 2002.
[5] D. Kundur, and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” in Proc. IEEE, vol. 87, issue: 7, pp. 1167 – 1180, July 1999.
[6] C. Y. Lin and S. F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Trans. Circuits Syst. Video Technol, vol. 11, no. 2, pp. 153 – 168, Feb. 2001.
[7] C. S. Lu and H.-Y.M. Liao, “Structural digital signature for image authentication: an incidental distortion resistant scheme,” IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161 – 173, June 2003.
[8] 游國忠, “應用浮水印技術於影像之智慧財產權保護與認證,”中央大學資訊工程研究所博士論文, 2001.
[9] Bhattacharjee and M. Kutter, “Compression tolerant image authentication,” in Proc. International Conference, vol. 1, no. 4-7, pp. 435 - 439, Oct. 1998.
[10] R. B. Wolfgang and E. J. Delp, “Fragile watermarking using the VW2D watermark.,” in Proc. SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents, vol. 3657, no. 25-27, pp. 204 -213, 1999, San Jose, CA.
[11] M. U. Celik and G. S, A. M. Tekalp, “Localized lossless authentication watermark (LAW),” IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161 – 173, June 2003.
[12] S.C. Byun, I.L. Lee, T.H. Shin, and B.H. Ahn, “A public-key based watermarking for color image authentication,” in Proc. Multimedia and Expo, ICME ''02., vol. 1, no. 26-29, pp. 593 - 596, Aug. 2002.
[13] I. Kostopoulos, S. Gilani, A.M. and A.N. Skodras, “Colour image authentication based on a self-embedding technique,” in Proc. Digital Signal Processing,14th International Conference on, vol. 2, no. 1-3, pp. 733 - 736, July 2002.
[14] S. Qibin, S. F. Chang, M. Kurato, and M. Suto, “A quantitative semi-fragile JPEG2000 image authentication system,” in Proc. International Conference on, vol. 2, no. 22-25, pp. II-921 - II-924, Sep. 2002.
[15] S. Bannour, Azimi-Sadjadi and M.R., “Principal component extraction using recursive least squares learning,” IEEE Trans. Neural Networks, vol. 6, no. 2, pp. 457 - 469, Mar. 1995.