淡江大學機構典藏:Item 987654321/52143
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 62822/95882 (66%)
造访人次 : 4021079      在线人数 : 1031
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/52143


    题名: 應用統計特性於智慧財產權保護
    其它题名: Protecting intellectual property rights based on features of statistics
    作者: 劉馨茹;Liu, Shin-ju
    贡献者: 淡江大學資訊管理學系碩士班
    侯永昌;Hou, Young-chang
    关键词: 數位浮水印;視覺密碼;統計特性;小波轉換;著作權保護;digital watermark;Visual Cryptography;law of large numbers;wavelet transformation;intellectual property rights protection
    日期: 2010
    上传时间: 2010-09-23 16:55:11 (UTC+8)
    摘要: 隨著電腦與網際網路持續的發展創新,科技帶給人們的便利就不斷的衝擊人類社會,人與人之間資訊的交流比早期電腦還未發展時來的更加的容易且頻繁。但也因為如此,竊取、修改他人資訊也變得比以往簡單太多,不肖人士利用電腦及網路即可非法取得資料,因此如何防堵資料被偷竊與竄改就顯得非常重要。數位浮水印技術是一種將個人資訊加入到欲保護的媒體中的方法,日後受保護的媒體產生爭議時,便可取出以證明其所有權,達到保護資產與驗證所有權目的。本研究以視覺密碼為基礎,應用統計學中大數法則所帶來的守恆特性產生視覺密碼所需要的分享影像。本研究的優點有三個:一,我們的方法以頻率域的方式嵌入浮水印,產生不擴展的分享影像,降低了像素值易受攻擊的影響。二,驗證所有權的過程不需要原圖的輔助即可取出浮水印。三,解決了保護影像被攻擊後的浮水印強韌性不佳的問題。實驗結果證明,本研究對於dark、light、blur、sharpen、noise、distort、jitter、jpeg、crop等攻擊有優異的抵抗性。
    Because computer technology is developed so fast, people enjoy the convenience it brings to us everyday. On the other hand, hackers may access the confidential data illegally and easily by the computer and the Internet. Therefore, how to protect these important data against being stolen or modified is an essential issue.
    Digital watermark is a method which is to add a personal information into an intellectual property to protect its’ ownership right. When someday the intellectual property is disputed, the owner can retrieve the watermark and prove their ownership right.
    Our study based on the properties of visual cryptography and statistics to generate the shares during the processes of embedding and verifying the hidden watermark. There are three advantages of our study. 1. We embedded the watermark by frequency domain and created unexpanded shares, which reduced the impact of pixel modification effectively. 2. Our method does not require the help of the original image during the verification process. 3. We solve the robustness problem when protected image suffered from attack. Experimental results indicated that our method had a good robustness on dark, light, blur, sharpen, noise, distort, jitter, jpeg, and crop attacks.
    显示于类别:[資訊管理學系暨研究所] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML205检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈