淡江大學機構典藏:Item 987654321/94560
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 62805/95882 (66%)
造访人次 : 3942856      在线人数 : 923
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/94560


    题名: 結合離散餘弦轉換與奇異值分解之多目標浮水印技術
    其它题名: Study of multipurpose watermarking based on DCT and singular value decomposition
    作者: 吳佳錡;Wu, Chia-Chi
    贡献者: 淡江大學電機工程學系碩士在職專班
    謝景棠;Hsieh, Ching-Tang
    关键词: 多目標浮水印;奇異值分解;離散餘弦轉換;Multipurpose Watermarking;SVD(Singular Value Decompostion);DCT
    日期: 2013
    上传时间: 2014-01-23 14:46:11 (UTC+8)
    摘要:   隨著網路及多媒體技術的日益精進,數位資訊於網路之傳輸較以往便利,多媒體數位資訊取得容易,因此數位資訊容易被加以拷貝及修改,以至於引發版權問題之爭議。為保護原創作者之專屬權益,需要經由一驗證機制,達到保護所有權及鑑別合法擁有者。透過數位浮水印技術可以在欲保護之資料中,藏入用來驗證版權的標記,一旦數位資料被非法擁有者持有,可透過演算法來驗證該持有人是否為合法擁有者。
      本文提出了一個結合離散餘弦轉換及奇異值分解的多目標浮水印技術,為了達到浮水印強健性的目的,利用浮水印頻域的特性,將浮水印由空間域轉換至頻率域再嵌入浮水印。並且以AC(0,1)及AC(1,0)位置產生與嵌入驗證碼,透過新舊驗證碼之差異處,來判斷影像受竄改之位置。實驗結果顯示,我們提出的方法有很好的執行結果,也可以正確地偵測受竄改位置。
    With the Internet and multimedia technologies progressing increasingly, it is more convenient to transport digital information in networks ever since. Multimedia digital information is acquired easily, so it is easy to copy and modify result in controversy of copyright protection. To protect the equity of original author via authentication mechanism, reach the legitimate owner of ownership and identification. By digital watermarking technology can be embed the sign of copyright on protection data. Once the digital data is held by the illegal owner, it can verify owner if he is legitimate.
    In this paper, we proposed a multipurpose watermarking based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). We use the property of discrete cosine transform that spatial domain transform to frequency domain and embed watermark. And then the verification code is generated and embedded in AC(0,1) and AC(1,0), according to the difference of new verification code and old verification code can decide the place that is attacked on the cover image. The experimental results have good performs and also detecting malicious manipulations accurately on an image.
    显示于类别:[電機工程學系暨研究所] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML226检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈