文化大學機構典藏 CCUR:Item 987654321/26873
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 47121/50987 (92%)
Visitors : 13827601      Online Users : 234
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/26873


    Title: 結合整數線性規劃與改良式LBP之半易碎型浮水印方法
    Authors: 杜淑芬
    許慶昇
    Contributors: 資訊管理學系
    Keywords: 半易碎型浮水印
    整數線性規劃
    區域二元特徵
    影像驗證
    semi-fragile watermarking
    integer linear programming
    local binary pattern
    image authentication
    Date: 2013-08
    Issue Date: 2014-02-27 13:34:16 (UTC+8)
    Abstract: 為了減少儲存空間的浪費並加快傳輸速度,大多數的數位影像都會經過失真壓縮處 理。由於失真壓縮會使得資料損失,因此,使用易碎型浮水印技術會導致失真壓縮格 式的影像無法通過驗證。相對於易碎型浮水印對於攻擊的敏感性,半易碎型浮水印則 可以抵抗失真壓縮與某些常見的影像處理,並對於惡意的竄改保有易碎性。2011 年 Wenyin and Shih 學者利用區域二元特徵(local binary pattern, LBP)運算子提出一套半易 碎型浮水印方法,但此方法存在著安全性方面的問題,有可能無法偵測出攻擊者的惡 意竄改;此外,該方法嵌入浮水印的規則,在某些情況下可能會導致較差的影像品質。 因此,本研究將提出一套改善的方法,可解決 Wenyin and Shih 等學者方法的安全性問 題,並且結合整數線性規劃的技術,來提昇嵌入浮水印後的影像品質。
    Fragile watermarking technique is used for image authentication. However, some common used lossy compression cannot pass the tampering detection even if that is used to reduce the image size hence cannot be seen as an malicious attack. Therefore, some researchers proposed semi-fragile watermarking schemes, which do not recognized lossy compression as an malicious attack. In 2011, Wenyin and Shih proposed a semi-fragile watermarking scheme based on local binary pattern (LBP) operators, but the watermarked image can be tampered with without being detected by their scheme. Besides, the watermarked image quality may be degraded under some circumstances. Therefore, this research will propose an semi-fragile watermarking scheme to improve the security of Wenyin and Shih’s scheme. In addition, integer linear programming is adopted in our scheme to upgrade the watermarked image quality.
    Appears in Collections:[Department of Information Management & Graduate Institute of Information Management] project

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML594View/Open
    1022221E034011.PDF665KbAdobe PDF450View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback