帳號:guest(18.222.162.142)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:阮維達
作者(英文):Duy-Dat Nguyen
論文名稱:一種被竄改彩色影像的認證與自我恢復方法
論文名稱(英文):An Authentication and Self-Recovery Method for Tampered Color Images
指導教授:林信鋒
指導教授(英文):Shin-Feng Lin
口試委員:劉國成
陳美娟
口試委員(英文):Kuo-Cheng Liu
Mei-Juan Chen
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:610921315
出版年(民國):112
畢業學年度:111
語文別:英文
論文頁數:64
關鍵詞:水印竄改偵測自我恢復認證
關鍵詞(英文):WatermarkingTamper detectionTamper self-recoveryAuthentication
相關次數:
  • 推薦推薦:0
  • 點閱點閱:8
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:5
  • 收藏收藏:0
考慮到影像處理技術和互聯網技術的不斷進步,本論文專注於數位影像領域中保護資料完整性和安全性的關鍵挑戰。隨著商業影像處理工具的普及,對數位影像的輕鬆操作和篡改成為可能,因此,迫切需要有效的對策來確保其真實性和可靠性。

為應對這些挑戰,我們提出了一種全面的方法,引入了一種區塊編碼方法來檢測篡改和實現影像恢復。我們的演算法融合了浮水印,將自我恢復資訊和身份驗證位元整合在每組四個非重疊的區塊中。通過使用查表,我們能夠將浮水印有效地嵌入到相應的區塊中。

為了評估我們提出方法的有效性,我們進行了一系列針對不同影像的實驗。評估範圍包括感知性、篡改檢測和恢復等。實驗結果強有力地支持我們方法的優點。所提出的方法始終生成具有高視覺品質的含浮水印影像,保持整體美感的同時也確保了不可察覺性,這在實際應用中是至關重要的因素。

我們的方法展示了出色的篡改檢測能力,能夠使用嵌入的浮水印準確地定位篡改區域。此外,它展示了在篡改率高達 90% 的情況下實現影像恢復的顯著潛力。浮水印中編碼的自我恢復資訊在恢復篡改區域方面發揮了至關重要的作用,增強了恢復影像的完整性和可靠性。與最先進方法的全面比較確認了我們方法在多個面向的優異性,包括感知性、篡改檢測和恢復等。
This thesis focuses on the challenge of safeguarding data integrity and security in the realm of digital images, considering the constant advancements in image processing techniques and internet technology. With the availability of commercial image processing tools that enable effortless manipulation and tampering of digital images, there is an urgent need for effective countermeasures to ensure their authenticity and reliability.

To tackle these challenges, we propose a comprehensive method that introduces a block encoding approach for detecting tampering and enabling image recovery. Our algorithm incorporates a watermark, integrating self-recovery information and authentication bits from groups of four non-overlapping blocks. By employing a lookup table, we effectively embed the watermark into the corresponding blocks independently.

To evaluate the effectiveness of our proposed method, we conducted experiments using various images. The evaluation encompasses imperceptibility, tamper detection, and recovery. Our results strongly support the merits of our approach. The proposed method consistently produces watermarked images with high visual quality, preserving the overall aesthetics while ensuring imperceptibility—a crucial factor for practical applications.

Our method demonstrated excellent tamper detection capability, accurately localizing tampered regions using the embedded watermark. Furthermore, it exhibited significant potential for image recovery, even with tampering rates as high as 90%. The self-recovery information encoded in the watermark played an essential role in restoring tampered regions, enhancing the integrity and reliability of the recovered image. A comprehensive comparison with state-of-the-art approaches confirms the superior performance of our method across multiple dimensions, including imperceptibility, tamper detection, and recovery.
致謝 I
摘要 II
Abstract III
Contents IV
List of Figures VI
List of Tables VIII
Chapter 1 Introduction 1
1.1 Motivation 1
1.2 Thesis Organization 4
Chapter 2 Backgrounds 5
2.1 Arnold’s Cat Map 5
2.2 Quality Measurements 6
Chapter 3 Related Work 11
3.1 A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery 11
3.2 Dual Watermark for Image Tamper Detection and Recovery 13
3.3 An Effective Fragile Watermarking Scheme for Color Image Tampering Detection and Self-Recovery 18
3.4 Authentication and Self-Recovery Using a New Image Inpainting Technique with LSB Shifting in Fragile Image Watermarking 21
Chapter 4 The Proposed Method 25
4.1 Watermark Embedding 26
4.1.1 Watermark Generation 27
4.1.2 Watermark Modification 30
4.1.3 Block Map Generation 31
4.1.4 Block Watermark Embedding 32
4.2 Tamper Detection 34
4.3 Tamper Recovery 35
Chapter 5 Experimental Results and Discussion 37
5.1 Data Set 37
5.2 Performance of the Proposed Method 38
Chapter 6 Conclusions 51
References 52
[1] D. Singh and S. Singh, “Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability,” J. Vis. Commun. Image Represent., vol. 38, pp. 775–789, 2016.
[2] C. Qin, H. Wang, X. Zhang, and X. Sun, “Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode,” Information Sciences, vol. 373, pp. 233–250, 2016.
[3] N. Wang, Z. Li, X. Cheng, and Y. Chen, “Dual watermarking algorithm based on singular value decomposition and compressive sensing,” in 2017 IEEE 17th International Conference on Communication Technology (ICCT), pp. 1763–1767, 2017.
[4] H. Rhayma, A. Makhloufi, H. Hamam, and A. ben Hmida, “Semi fragile watermarking scheme for image recovery in wavelet domain,” in 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp. 1–5, 2018.
[5] L. Rakhmawati, Wirawan, and Suwadi, “Image fragile watermarking with two authentication components for tamper detection and recovery,” in 2018 International Conference on Intelligent Autonomous Systems (ICoIAS), pp. 35–38, 2018.
[6] M. Hamid and C. Wang, “Adaptive image self-recovery based on feature extraction in the dct domain,” IEEE Access, vol. 6, pp. 67156–67165, 2018.
[7] Y. Chao, S. Liu, and H. Liu, “A novel semi-fragile watermarking algorithm with tamper localization and self-recovery,” in 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp. 186–190, 2018.
[8] R. Sinhal, I. Ansari, and C. Ahn, “Blind image watermarking for localization and restoration of color images,” IEEE Access, vol. 8, pp. 200157–200169, 2020.
[9] J. Molina-Garcia, B. Garcia-Salgado, V. Ponomaryov, R. Reyes-Reyes, S. Sadovnychiy, and C. Cruz-Ramos, “An effective fragile watermarking scheme for color image tampering detection and self-recovery,” Signal Processing: Image Communication, vol. 81, p. 115725, 2020.
[10] F. Tohidi, M. Paul, and M. Hooshmandasl, “Detection and recovery of higher tampered images using novel feature and compression strategy,” IEEE Access, vol. 9, pp. 57510–57528, 2021.
[11] A. Afrig and E. Ferda, “Ausr1: Authentication and self-recovery using a new image inpainting technique with lsb shifting in fragile image watermarking,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, Part B, pp. 5822–5840, 2022.
[12] P. Lin, C. Hsieh, and P. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005.
[13] T. Lee and S. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, pp. 3497–3506, 2008.
[14] K. Liu, “Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique,” IET Image Processing, vol. 8, pp. 363–372, 2014.
[15] S. Sarreshtedari and M. Akhaee, “A source-channel coding approach to digital image protection and self-recovery,” IEEE Transactions on Image Processing, vol. 24, no. 7, pp. 2266–2277, 2015.
[16] S. Dadkhah, A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, “An effective svd-based image tampering detection and self-recovery using active watermarking,” Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197–1210, 2014.
[17] M. Fan and H. Wang, “An enhanced fragile watermarking scheme to digital image protection and self-recovery,” Signal Processing: Image Communication, vol. 66, pp. 19–29, 2018.
[18] X. Tong, Y. Liu, M. Zhang, and Y. Chen, “A novel chaos-based fragile watermarking for image tampering detection and self-recovery,” Signal Processing: Image Communication, vol. 28, no. 3, pp. 301–308, 2013.
[19] S. Qiang and Z. Hongbin, “Image tamper detection and recovery using dual watermark,” 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010.
[20] M. Moonsazadeh and G. Ekbatanifard, “An improved robust image watermarking method using dct and ycocg-r color space,” Optik, vol. 140, pp. 975–988, 2017.
[21] W. Tai and Z. Liao, “Image self-recovery with watermark self-embedding,” Signal Processing: Image Communication, vol. 65, pp. 11–25, 2018.
[22] A. A. V.I. Arnold Ergodic Problems of Classical Mechanics, vol. 9, 1968.
[23] A. Telea, “An image inpainting technique based on the fast marching method,” Journal of Graphics Tools, vol. 9, 01 2004.
[24] A. G. Weber, “The usc-sipi image database: Version 6,” 2018. The USCSIPI Image Database Volume 3: Miscellaneous, https://sipi.usc.edu/database/database.php?volume=misc.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *