English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 51296/86402 (59%)
造訪人次 : 8166753      線上人數 : 77
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/94560


    題名: 結合離散餘弦轉換與奇異值分解之多目標浮水印技術
    其他題名: Study of multipurpose watermarking based on DCT and singular value decomposition
    作者: 吳佳錡;Wu, Chia-Chi
    貢獻者: 淡江大學電機工程學系碩士在職專班
    謝景棠;Hsieh, Ching-Tang
    關鍵詞: 多目標浮水印;奇異值分解;離散餘弦轉換;Multipurpose Watermarking;SVD(Singular Value Decompostion);DCT
    日期: 2013
    上傳時間: 2014-01-23 14:46:11 (UTC+8)
    摘要:   隨著網路及多媒體技術的日益精進,數位資訊於網路之傳輸較以往便利,多媒體數位資訊取得容易,因此數位資訊容易被加以拷貝及修改,以至於引發版權問題之爭議。為保護原創作者之專屬權益,需要經由一驗證機制,達到保護所有權及鑑別合法擁有者。透過數位浮水印技術可以在欲保護之資料中,藏入用來驗證版權的標記,一旦數位資料被非法擁有者持有,可透過演算法來驗證該持有人是否為合法擁有者。
      本文提出了一個結合離散餘弦轉換及奇異值分解的多目標浮水印技術,為了達到浮水印強健性的目的,利用浮水印頻域的特性,將浮水印由空間域轉換至頻率域再嵌入浮水印。並且以AC(0,1)及AC(1,0)位置產生與嵌入驗證碼,透過新舊驗證碼之差異處,來判斷影像受竄改之位置。實驗結果顯示,我們提出的方法有很好的執行結果,也可以正確地偵測受竄改位置。
    With the Internet and multimedia technologies progressing increasingly, it is more convenient to transport digital information in networks ever since. Multimedia digital information is acquired easily, so it is easy to copy and modify result in controversy of copyright protection. To protect the equity of original author via authentication mechanism, reach the legitimate owner of ownership and identification. By digital watermarking technology can be embed the sign of copyright on protection data. Once the digital data is held by the illegal owner, it can verify owner if he is legitimate.
    In this paper, we proposed a multipurpose watermarking based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). We use the property of discrete cosine transform that spatial domain transform to frequency domain and embed watermark. And then the verification code is generated and embedded in AC(0,1) and AC(1,0), according to the difference of new verification code and old verification code can decide the place that is attacked on the cover image. The experimental results have good performs and also detecting malicious manipulations accurately on an image.
    顯示於類別:[電機工程學系暨研究所] 學位論文

    文件中的檔案:

    檔案 大小格式瀏覽次數
    index.html0KbHTML109檢視/開啟

    在機構典藏中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋