A Study on Digital Watermarking Techniques
碩士 === 朝陽大學 === 資訊管理系碩士班 === 87 === Nowadays, the Internet revolution is in full swing, and commercial interests abound. Many commercial vendors and developers try to use Internet to deliver media products or transactions for profit. Such as video on deman...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
1999
|
Online Access: | http://ndltd.ncl.edu.tw/handle/90282434410039645719 |
id |
ndltd-TW-087CYUT0396003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-087CYUT03960032016-02-03T04:32:24Z http://ndltd.ncl.edu.tw/handle/90282434410039645719 A Study on Digital Watermarking Techniques 數位浮水印技術之研究 Kuo-Feng Hwang 黃國峰 碩士 朝陽大學 資訊管理系碩士班 87 Nowadays, the Internet revolution is in full swing, and commercial interests abound. Many commercial vendors and developers try to use Internet to deliver media products or transactions for profit. Such as video on demand service, electronic data exchange, online shopping and so on. To utilize Internet is convenient for both vendors and customers. However, there are many problems when provide these services via Internet. The identification of intellectual property owner is one of that problems. Digital watermarking is a technique used to solve this problem. In this thesis, we use cryptography, image processing, and information security techniques to develop digital watermarking scheme. In addition, a time-stamping protocol for digital watermarking also proposed in this thesis. For practical use, the digital watermark scheme has the following requirements: 1) Alterations introduced in the image or video should be perceptually invisible. 2) Watermark must be undetectable by a perpetrator. 3) The detection of the watermark should be no correlative with original image or video. 4) Watermark should be robust as much as possible image processing which preserves desired quality for the image. 5) Like information securing technique, the details of digital watermark technique must be opening. In this thesis, we propose two new digital watermarking technique. The first scheme is based on Rabin's public-key cryptosystem, which has highly security of embedded watermark. The second scheme is based on neural network, one-way hash function, and discrete cosine transform (DCT). Our schemes can achieve the following two goals. One is that the illegal users do not know the locations of an embedded watermark in the image. The other is that a legal user can retrieve the embedded watermark from an altered (filtering, lossy compression, and scaling) image. Finally, a new time-stamping protocol for all digital watermarking algorithms is proposed. This protocol is added a time-stamp on digital watermarking algorithms through a trusted-third party. Min-Shiang Hwang 黃明祥 1999 學位論文 ; thesis 82 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 朝陽大學 === 資訊管理系碩士班 === 87 === Nowadays, the Internet revolution is in full swing, and commercial
interests abound. Many commercial vendors and developers try to
use Internet to deliver media products or transactions for profit.
Such as video on demand service, electronic data exchange, online
shopping and so on. To utilize Internet is convenient for both
vendors and customers. However, there are many problems when
provide these services via Internet. The identification of
intellectual property owner is one of that problems. Digital
watermarking is a technique used to solve this problem. In this
thesis, we use cryptography, image processing, and information
security techniques to develop digital watermarking scheme. In
addition, a time-stamping protocol for digital watermarking also
proposed in this thesis.
For practical use, the digital watermark scheme has the following
requirements: 1) Alterations introduced in the image or video
should be perceptually invisible. 2) Watermark must be
undetectable by a perpetrator. 3) The detection of the watermark
should be no correlative with original image or video. 4)
Watermark should be robust as much as possible image processing
which preserves desired quality for the image. 5) Like information
securing technique, the details of digital watermark technique
must be opening. In this thesis, we propose two new digital
watermarking technique. The first scheme is based on Rabin's
public-key cryptosystem, which has highly security of embedded
watermark. The second scheme is based on neural network, one-way
hash function, and discrete cosine transform (DCT). Our schemes
can achieve the following two goals. One is that the illegal users
do not know the locations of an embedded watermark in the image.
The other is that a legal user can retrieve the embedded watermark
from an altered (filtering, lossy compression, and scaling) image.
Finally, a new time-stamping protocol for all digital watermarking
algorithms is proposed. This protocol is added a time-stamp on
digital watermarking algorithms through a trusted-third party.
|
author2 |
Min-Shiang Hwang |
author_facet |
Min-Shiang Hwang Kuo-Feng Hwang 黃國峰 |
author |
Kuo-Feng Hwang 黃國峰 |
spellingShingle |
Kuo-Feng Hwang 黃國峰 A Study on Digital Watermarking Techniques |
author_sort |
Kuo-Feng Hwang |
title |
A Study on Digital Watermarking Techniques |
title_short |
A Study on Digital Watermarking Techniques |
title_full |
A Study on Digital Watermarking Techniques |
title_fullStr |
A Study on Digital Watermarking Techniques |
title_full_unstemmed |
A Study on Digital Watermarking Techniques |
title_sort |
study on digital watermarking techniques |
publishDate |
1999 |
url |
http://ndltd.ncl.edu.tw/handle/90282434410039645719 |
work_keys_str_mv |
AT kuofenghwang astudyondigitalwatermarkingtechniques AT huángguófēng astudyondigitalwatermarkingtechniques AT kuofenghwang shùwèifúshuǐyìnjìshùzhīyánjiū AT huángguófēng shùwèifúshuǐyìnjìshùzhīyánjiū AT kuofenghwang studyondigitalwatermarkingtechniques AT huángguófēng studyondigitalwatermarkingtechniques |
_version_ |
1718177844881784832 |