淡江大學機構典藏:Item 987654321/35663
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64178/96951 (66%)
Visitors : 9305153      Online Users : 232
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/35663


    Title: 混合型數位半色調影像浮水印之研究
    Other Titles: A study of hybrid watermarking for digital halftone images
    Authors: 葉宜治;Yeh, Yi-chih
    Contributors: 淡江大學電機工程學系碩士班
    謝景棠;Hsieh, Ching-tang
    Keywords: 數位半色調影像;Zernike動量;抖陣調色法;二元擬小波轉換;Halftone Image;Zernike Moment;Ordered Dithering;Binary Pseudo-wavelet Transform
    Date: 2007
    Issue Date: 2010-01-11 06:58:40 (UTC+8)
    Abstract: 在本論文中提出一套結合空間域與頻率域之數位半色調影像浮水印演算法。首先,在數位灰階影像轉換為數位半色調影像的過程中嵌入浮水印,避免直接從空間域上做修改,影響半色調影像品質與視覺效果;為了提高浮水印系統嵌入容量與增加強健性,我們在具有空間域浮水印之半色調影像中,利用小波轉換找出紋理變化大以及灰階值極大與極小之區域,當作頻率域浮水印嵌入之特定區塊。之後利用更改特定區塊之高頻係數值,嵌入頻率域浮水印。本文利用Donut Masks Zernike Moment求得具有混合型浮水印之半色調影像的旋轉角度與縮放倍率之參數,進而抵抗多重攻擊。實驗結果說明本文所提出之數位浮水印系統可抵抗旋轉、縮放、黑色塗鴉、剪裁、胡椒鹽雜訊以及列印與掃瞄攻擊,具有非常好的強健性。
    In this thesis, a hybrid watermarking for digital halftone images was proposed. At first, the spatial watermarking was adopted by the ordered dithering technique which uses two dither cells in the digital halftoning. In view of the shortcomings of the spatial watermarking, the spatial watermarked halftone image was divided into sub-images with 8x8 pixels and transformed by binary pseudo-wavelet transform. The frequency watermarking was embedded into the high frequency components of the designated sub-images. Finally, the donut Masks Zernike moment is adopted to detect rotation and scale of the Hybrid watermarked halftone image. Experimental results show that the hybrid watermarked halftone image with high transparency and the is robust to the malicious attacks such as corrupting, cropping, rotating, scaling, salt & pepper noise. The correct decoding rate is close to 0.9 after the attack of print & scan.
    Appears in Collections:[Graduate Institute & Department of Electrical Engineering] Thesis

    Files in This Item:

    File SizeFormat
    0KbUnknown299View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback