English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52333/87441 (60%)
Visitors : 9107449      Online Users : 354
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/94560

    Title: 結合離散餘弦轉換與奇異值分解之多目標浮水印技術
    Other Titles: Study of multipurpose watermarking based on DCT and singular value decomposition
    Authors: 吳佳錡;Wu, Chia-Chi
    Contributors: 淡江大學電機工程學系碩士在職專班
    謝景棠;Hsieh, Ching-Tang
    Keywords: 多目標浮水印;奇異值分解;離散餘弦轉換;Multipurpose Watermarking;SVD(Singular Value Decompostion);DCT
    Date: 2013
    Issue Date: 2014-01-23 14:46:11 (UTC+8)
    Abstract:   隨著網路及多媒體技術的日益精進,數位資訊於網路之傳輸較以往便利,多媒體數位資訊取得容易,因此數位資訊容易被加以拷貝及修改,以至於引發版權問題之爭議。為保護原創作者之專屬權益,需要經由一驗證機制,達到保護所有權及鑑別合法擁有者。透過數位浮水印技術可以在欲保護之資料中,藏入用來驗證版權的標記,一旦數位資料被非法擁有者持有,可透過演算法來驗證該持有人是否為合法擁有者。
    With the Internet and multimedia technologies progressing increasingly, it is more convenient to transport digital information in networks ever since. Multimedia digital information is acquired easily, so it is easy to copy and modify result in controversy of copyright protection. To protect the equity of original author via authentication mechanism, reach the legitimate owner of ownership and identification. By digital watermarking technology can be embed the sign of copyright on protection data. Once the digital data is held by the illegal owner, it can verify owner if he is legitimate.
    In this paper, we proposed a multipurpose watermarking based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). We use the property of discrete cosine transform that spatial domain transform to frequency domain and embed watermark. And then the verification code is generated and embedded in AC(0,1) and AC(1,0), according to the difference of new verification code and old verification code can decide the place that is attacked on the cover image. The experimental results have good performs and also detecting malicious manipulations accurately on an image.
    Appears in Collections:[電機工程學系暨研究所] 學位論文

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback