Image Watermarking Based on Block Mean Value Quantization

Abstract

[[abstract]]基於區塊平均值量化的影像浮水印技術 摘要 自從網際網路風行以來,資訊流通快速,多媒體的著作財產權,逐漸受到嚴厲的考驗,版權保護將是未來首要的課題。本論文將以數位浮水印的技術來保護影像的版權,主要應用的技術如下所示: 1 混沌擾亂技術: 此為數位浮水印的前置演算法,為了資訊安全和不可視的要求,數位浮水印必須先行轉換成類似亂碼雜訊,再嵌入數位影像;然而取出必須利用交付版權所有者保留的密鑰,才能還原成真正的數位浮水印。所以即使有心和有能力的人,花費相當昂貴的時間和金錢後,得到的也只是無意義的資訊。 2 錯誤更正碼 此為數位浮水印的加強演算法,這裡使用了[7、4]漢明碼,數位浮水印嵌入前先行編碼和取出後再行解碼,本法可以簡單有效地加強數位浮水印的強韌性。 3 區塊平均值量化 此為數位浮水印的嵌入和取出處理演算法,本法利用JPEG對於平均值刻意保護的特性,以及noise的零平均值特性。所以在惡意的攻擊,都能有不錯的強韌性。而且本技術使用了空間領域和不需要原圖還原的方式,大量節省了儲存原圖的記憶空間。 為了證明本法的可行性,也利用了JPEG壓縮和noise干擾來進行攻擊。包括多種不同的JPEG壓縮倍率,和加法性雜訊、反轉性雜訊、乘法性雜訊三種不同主要的雜訊。最後自行開發人機介面視窗程式,方便使用者操作。而且和數位浮水印優異的上市產品進行各項比較,以證明本法的實用性和有效性。[[abstract]]Image Watermarking Based on Block Mean Value Quantization Student: Ren-Der Lin Advisor: Dr Chien-Cheng Tseng Department of Computer and Communication Engineering National Kaohsiung First University of Science and Technology Abstract The information interchange is very fast since internet is invented The illegal copy of the electronic multimedia become easier so the copyright protection is important research topic now This thesis presents a novel method for inserting binary watermark into image for protection The details of the method are given as follows: 1 Toral Automorphism It is a preprocessing algorithm of our digital watermarking scheme For the purposes of security and invisibility the binary watermark must be converted into noise like image and then insert into digital image The extracted watermark must have a private key of the copyright owner to restore the noise like image 2 Error Correcting Code This is an enhanced algorithm for the robustness of our watermarking scheme We use [7、4]Hamming code here 3 Block DC Value Quantization This is a embedding and extracting algorithm of our watermarking scheme this method uses two major image processing characteristics One is the DC Value invariant characteristic for JPEG compression the other is the zero mean characteristic of noise This algorithm performs in the space domain and watermark can be extracted without requiring the original image In order to show the effectiveness we also apply the compression of JPEG and interference of noise to attack the watermarking scheme In the JPEG attack we compare the performance for various JPEG compression ratios In the noise interference attack we use three major noises that are Gaussian-white noise salt & pepper noise and speckle noise Finally we develop the graphic user interference (GUI) window program for our scheme and compare it with the market product to demonstrate the effectiveness of our metho

    Similar works

    Full text

    thumbnail-image