A Study on Digital Watermarking Techniques

碩士 === 朝陽大學 === 資訊管理系碩士班 === 87 === Nowadays, the Internet revolution is in full swing, and commercial interests abound. Many commercial vendors and developers try to use Internet to deliver media products or transactions for profit. Such as video on deman...

Full description

Bibliographic Details
Main Authors: Kuo-Feng Hwang, 黃國峰
Other Authors: Min-Shiang Hwang
Format: Others
Language:en_US
Published: 1999
Online Access:http://ndltd.ncl.edu.tw/handle/90282434410039645719
id ndltd-TW-087CYUT0396003
record_format oai_dc
spelling ndltd-TW-087CYUT03960032016-02-03T04:32:24Z http://ndltd.ncl.edu.tw/handle/90282434410039645719 A Study on Digital Watermarking Techniques 數位浮水印技術之研究 Kuo-Feng Hwang 黃國峰 碩士 朝陽大學 資訊管理系碩士班 87 Nowadays, the Internet revolution is in full swing, and commercial interests abound. Many commercial vendors and developers try to use Internet to deliver media products or transactions for profit. Such as video on demand service, electronic data exchange, online shopping and so on. To utilize Internet is convenient for both vendors and customers. However, there are many problems when provide these services via Internet. The identification of intellectual property owner is one of that problems. Digital watermarking is a technique used to solve this problem. In this thesis, we use cryptography, image processing, and information security techniques to develop digital watermarking scheme. In addition, a time-stamping protocol for digital watermarking also proposed in this thesis. For practical use, the digital watermark scheme has the following requirements: 1) Alterations introduced in the image or video should be perceptually invisible. 2) Watermark must be undetectable by a perpetrator. 3) The detection of the watermark should be no correlative with original image or video. 4) Watermark should be robust as much as possible image processing which preserves desired quality for the image. 5) Like information securing technique, the details of digital watermark technique must be opening. In this thesis, we propose two new digital watermarking technique. The first scheme is based on Rabin's public-key cryptosystem, which has highly security of embedded watermark. The second scheme is based on neural network, one-way hash function, and discrete cosine transform (DCT). Our schemes can achieve the following two goals. One is that the illegal users do not know the locations of an embedded watermark in the image. The other is that a legal user can retrieve the embedded watermark from an altered (filtering, lossy compression, and scaling) image. Finally, a new time-stamping protocol for all digital watermarking algorithms is proposed. This protocol is added a time-stamp on digital watermarking algorithms through a trusted-third party. Min-Shiang Hwang 黃明祥 1999 學位論文 ; thesis 82 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 朝陽大學 === 資訊管理系碩士班 === 87 === Nowadays, the Internet revolution is in full swing, and commercial interests abound. Many commercial vendors and developers try to use Internet to deliver media products or transactions for profit. Such as video on demand service, electronic data exchange, online shopping and so on. To utilize Internet is convenient for both vendors and customers. However, there are many problems when provide these services via Internet. The identification of intellectual property owner is one of that problems. Digital watermarking is a technique used to solve this problem. In this thesis, we use cryptography, image processing, and information security techniques to develop digital watermarking scheme. In addition, a time-stamping protocol for digital watermarking also proposed in this thesis. For practical use, the digital watermark scheme has the following requirements: 1) Alterations introduced in the image or video should be perceptually invisible. 2) Watermark must be undetectable by a perpetrator. 3) The detection of the watermark should be no correlative with original image or video. 4) Watermark should be robust as much as possible image processing which preserves desired quality for the image. 5) Like information securing technique, the details of digital watermark technique must be opening. In this thesis, we propose two new digital watermarking technique. The first scheme is based on Rabin's public-key cryptosystem, which has highly security of embedded watermark. The second scheme is based on neural network, one-way hash function, and discrete cosine transform (DCT). Our schemes can achieve the following two goals. One is that the illegal users do not know the locations of an embedded watermark in the image. The other is that a legal user can retrieve the embedded watermark from an altered (filtering, lossy compression, and scaling) image. Finally, a new time-stamping protocol for all digital watermarking algorithms is proposed. This protocol is added a time-stamp on digital watermarking algorithms through a trusted-third party.
author2 Min-Shiang Hwang
author_facet Min-Shiang Hwang
Kuo-Feng Hwang
黃國峰
author Kuo-Feng Hwang
黃國峰
spellingShingle Kuo-Feng Hwang
黃國峰
A Study on Digital Watermarking Techniques
author_sort Kuo-Feng Hwang
title A Study on Digital Watermarking Techniques
title_short A Study on Digital Watermarking Techniques
title_full A Study on Digital Watermarking Techniques
title_fullStr A Study on Digital Watermarking Techniques
title_full_unstemmed A Study on Digital Watermarking Techniques
title_sort study on digital watermarking techniques
publishDate 1999
url http://ndltd.ncl.edu.tw/handle/90282434410039645719
work_keys_str_mv AT kuofenghwang astudyondigitalwatermarkingtechniques
AT huángguófēng astudyondigitalwatermarkingtechniques
AT kuofenghwang shùwèifúshuǐyìnjìshùzhīyánjiū
AT huángguófēng shùwèifúshuǐyìnjìshùzhīyánjiū
AT kuofenghwang studyondigitalwatermarkingtechniques
AT huángguófēng studyondigitalwatermarkingtechniques
_version_ 1718177844881784832