A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code
碩士 === 國立臺中技術學院 === 多媒體設計研究所 === 94 === As the internet becomes more and more popular, there is also an increased use of digital images on it. However, protecting intellectual property rights and keeping tracks of end-users with rights to use similar copies of a digital image have become extremely i...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/59984088015382296787 |
id |
ndltd-TW-094NTTI0641009 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094NTTI06410092016-06-01T04:14:44Z http://ndltd.ncl.edu.tw/handle/59984088015382296787 A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code 利用灰階浮水印技術設計影像數位指紋系統 Allen Shi 施彥任 碩士 國立臺中技術學院 多媒體設計研究所 94 As the internet becomes more and more popular, there is also an increased use of digital images on it. However, protecting intellectual property rights and keeping tracks of end-users with rights to use similar copies of a digital image have become extremely important and urgent. To prevent piracies of images, finger printing techniques have been applied to images before they are being distributed. The fingerprint can be a unique ID that will be hidden in each image. The fingerprint can be retrieved later on to prove the ownership of the image or who the legal users are. However users could collude to tamper with the images to generate copies of tampered images for illegal purposes. One collusion method is to take parts from different legal copies and pieced them together to form a newly colluded image. That is the colluded image contained parts from several authentic fingerprinted images. Another kind of collusion is to average each overlapping pixels from several legal copies to create a colluded copy. The hidden fingerprints would be corrupted in the colluded images from being made up of parts from several other fingerprint images or by averaging, respectively. In this thesis, the proposed fingerprint technique applies the discrete cosine wavelet transform on the original image whereby a gray fingerprint image would be hidden in the transformed domain. The gray fingerprint image consists of a unique ID code. During recovery, Hamming code is used to improve the quality of the recovered fingerprint ID in the event it is corrupted by collusion. Experimental results show that the fingerprint technique is resistant to collusion attacks. In fact the IDs of the colluders could be identified and used to prove the rightful ownership of the image and also to pinpoint the colluders. Tung-Shou Chen Geeng-Neng You 陳同孝 游耿能 2006 學位論文 ; thesis 65 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺中技術學院 === 多媒體設計研究所 === 94 === As the internet becomes more and more popular, there is also an increased use of digital
images on it. However, protecting intellectual property rights and keeping tracks of
end-users with rights to use similar copies of a digital image have become extremely
important and urgent. To prevent piracies of images, finger printing techniques have been
applied to images before they are being distributed. The fingerprint can be a unique ID that
will be hidden in each image. The fingerprint can be retrieved later on to prove the
ownership of the image or who the legal users are. However users could collude to tamper
with the images to generate copies of tampered images for illegal purposes. One collusion
method is to take parts from different legal copies and pieced them together to form a
newly colluded image. That is the colluded image contained parts from several authentic
fingerprinted images. Another kind of collusion is to average each overlapping pixels from
several legal copies to create a colluded copy. The hidden fingerprints would be corrupted
in the colluded images from being made up of parts from several other fingerprint images
or by averaging, respectively. In this thesis, the proposed fingerprint technique applies the
discrete cosine wavelet transform on the original image whereby a gray fingerprint image
would be hidden in the transformed domain. The gray fingerprint image consists of a
unique ID code. During recovery, Hamming code is used to improve the quality of the
recovered fingerprint ID in the event it is corrupted by collusion. Experimental results
show that the fingerprint technique is resistant to collusion attacks. In fact the IDs of the
colluders could be identified and used to prove the rightful ownership of the image and also
to pinpoint the colluders.
|
author2 |
Tung-Shou Chen Geeng-Neng You |
author_facet |
Tung-Shou Chen Geeng-Neng You Allen Shi 施彥任 |
author |
Allen Shi 施彥任 |
spellingShingle |
Allen Shi 施彥任 A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code |
author_sort |
Allen Shi |
title |
A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code |
title_short |
A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code |
title_full |
A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code |
title_fullStr |
A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code |
title_full_unstemmed |
A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code |
title_sort |
new fingerprinting system based on gray scale watermarking and hamming code |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/59984088015382296787 |
work_keys_str_mv |
AT allenshi anewfingerprintingsystembasedongrayscalewatermarkingandhammingcode AT shīyànrèn anewfingerprintingsystembasedongrayscalewatermarkingandhammingcode AT allenshi lìyònghuījiēfúshuǐyìnjìshùshèjìyǐngxiàngshùwèizhǐwénxìtǒng AT shīyànrèn lìyònghuījiēfúshuǐyìnjìshùshèjìyǐngxiàngshùwèizhǐwénxìtǒng AT allenshi newfingerprintingsystembasedongrayscalewatermarkingandhammingcode AT shīyànrèn newfingerprintingsystembasedongrayscalewatermarkingandhammingcode |
_version_ |
1718287433471098880 |