淡江大學機構典藏:Item 987654321/52143
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62819/95882 (66%)
Visitors : 4006997      Online Users : 544
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/52143


    Title: 應用統計特性於智慧財產權保護
    Other Titles: Protecting intellectual property rights based on features of statistics
    Authors: 劉馨茹;Liu, Shin-ju
    Contributors: 淡江大學資訊管理學系碩士班
    侯永昌;Hou, Young-chang
    Keywords: 數位浮水印;視覺密碼;統計特性;小波轉換;著作權保護;digital watermark;Visual Cryptography;law of large numbers;wavelet transformation;intellectual property rights protection
    Date: 2010
    Issue Date: 2010-09-23 16:55:11 (UTC+8)
    Abstract: 隨著電腦與網際網路持續的發展創新,科技帶給人們的便利就不斷的衝擊人類社會,人與人之間資訊的交流比早期電腦還未發展時來的更加的容易且頻繁。但也因為如此,竊取、修改他人資訊也變得比以往簡單太多,不肖人士利用電腦及網路即可非法取得資料,因此如何防堵資料被偷竊與竄改就顯得非常重要。數位浮水印技術是一種將個人資訊加入到欲保護的媒體中的方法,日後受保護的媒體產生爭議時,便可取出以證明其所有權,達到保護資產與驗證所有權目的。本研究以視覺密碼為基礎,應用統計學中大數法則所帶來的守恆特性產生視覺密碼所需要的分享影像。本研究的優點有三個:一,我們的方法以頻率域的方式嵌入浮水印,產生不擴展的分享影像,降低了像素值易受攻擊的影響。二,驗證所有權的過程不需要原圖的輔助即可取出浮水印。三,解決了保護影像被攻擊後的浮水印強韌性不佳的問題。實驗結果證明,本研究對於dark、light、blur、sharpen、noise、distort、jitter、jpeg、crop等攻擊有優異的抵抗性。
    Because computer technology is developed so fast, people enjoy the convenience it brings to us everyday. On the other hand, hackers may access the confidential data illegally and easily by the computer and the Internet. Therefore, how to protect these important data against being stolen or modified is an essential issue.
    Digital watermark is a method which is to add a personal information into an intellectual property to protect its’ ownership right. When someday the intellectual property is disputed, the owner can retrieve the watermark and prove their ownership right.
    Our study based on the properties of visual cryptography and statistics to generate the shares during the processes of embedding and verifying the hidden watermark. There are three advantages of our study. 1. We embedded the watermark by frequency domain and created unexpanded shares, which reduced the impact of pixel modification effectively. 2. Our method does not require the help of the original image during the verification process. 3. We solve the robustness problem when protected image suffered from attack. Experimental results indicated that our method had a good robustness on dark, light, blur, sharpen, noise, distort, jitter, jpeg, and crop attacks.
    Appears in Collections:[Graduate Institute & Department of Information Management] Thesis

    Files in This Item:

    File SizeFormat
    index.html0KbHTML205View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback