A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code

碩士 === 國立臺中技術學院 === 多媒體設計研究所 === 94 === As the internet becomes more and more popular, there is also an increased use of digital images on it. However, protecting intellectual property rights and keeping tracks of end-users with rights to use similar copies of a digital image have become extremely i...

Full description

Bibliographic Details
Main Authors: Allen Shi, 施彥任
Other Authors: Tung-Shou Chen Geeng-Neng You
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/59984088015382296787
id ndltd-TW-094NTTI0641009
record_format oai_dc
spelling ndltd-TW-094NTTI06410092016-06-01T04:14:44Z http://ndltd.ncl.edu.tw/handle/59984088015382296787 A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code 利用灰階浮水印技術設計影像數位指紋系統 Allen Shi 施彥任 碩士 國立臺中技術學院 多媒體設計研究所 94 As the internet becomes more and more popular, there is also an increased use of digital images on it. However, protecting intellectual property rights and keeping tracks of end-users with rights to use similar copies of a digital image have become extremely important and urgent. To prevent piracies of images, finger printing techniques have been applied to images before they are being distributed. The fingerprint can be a unique ID that will be hidden in each image. The fingerprint can be retrieved later on to prove the ownership of the image or who the legal users are. However users could collude to tamper with the images to generate copies of tampered images for illegal purposes. One collusion method is to take parts from different legal copies and pieced them together to form a newly colluded image. That is the colluded image contained parts from several authentic fingerprinted images. Another kind of collusion is to average each overlapping pixels from several legal copies to create a colluded copy. The hidden fingerprints would be corrupted in the colluded images from being made up of parts from several other fingerprint images or by averaging, respectively. In this thesis, the proposed fingerprint technique applies the discrete cosine wavelet transform on the original image whereby a gray fingerprint image would be hidden in the transformed domain. The gray fingerprint image consists of a unique ID code. During recovery, Hamming code is used to improve the quality of the recovered fingerprint ID in the event it is corrupted by collusion. Experimental results show that the fingerprint technique is resistant to collusion attacks. In fact the IDs of the colluders could be identified and used to prove the rightful ownership of the image and also to pinpoint the colluders. Tung-Shou Chen Geeng-Neng You 陳同孝 游耿能 2006 學位論文 ; thesis 65 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺中技術學院 === 多媒體設計研究所 === 94 === As the internet becomes more and more popular, there is also an increased use of digital images on it. However, protecting intellectual property rights and keeping tracks of end-users with rights to use similar copies of a digital image have become extremely important and urgent. To prevent piracies of images, finger printing techniques have been applied to images before they are being distributed. The fingerprint can be a unique ID that will be hidden in each image. The fingerprint can be retrieved later on to prove the ownership of the image or who the legal users are. However users could collude to tamper with the images to generate copies of tampered images for illegal purposes. One collusion method is to take parts from different legal copies and pieced them together to form a newly colluded image. That is the colluded image contained parts from several authentic fingerprinted images. Another kind of collusion is to average each overlapping pixels from several legal copies to create a colluded copy. The hidden fingerprints would be corrupted in the colluded images from being made up of parts from several other fingerprint images or by averaging, respectively. In this thesis, the proposed fingerprint technique applies the discrete cosine wavelet transform on the original image whereby a gray fingerprint image would be hidden in the transformed domain. The gray fingerprint image consists of a unique ID code. During recovery, Hamming code is used to improve the quality of the recovered fingerprint ID in the event it is corrupted by collusion. Experimental results show that the fingerprint technique is resistant to collusion attacks. In fact the IDs of the colluders could be identified and used to prove the rightful ownership of the image and also to pinpoint the colluders.
author2 Tung-Shou Chen Geeng-Neng You
author_facet Tung-Shou Chen Geeng-Neng You
Allen Shi
施彥任
author Allen Shi
施彥任
spellingShingle Allen Shi
施彥任
A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code
author_sort Allen Shi
title A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code
title_short A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code
title_full A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code
title_fullStr A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code
title_full_unstemmed A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code
title_sort new fingerprinting system based on gray scale watermarking and hamming code
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/59984088015382296787
work_keys_str_mv AT allenshi anewfingerprintingsystembasedongrayscalewatermarkingandhammingcode
AT shīyànrèn anewfingerprintingsystembasedongrayscalewatermarkingandhammingcode
AT allenshi lìyònghuījiēfúshuǐyìnjìshùshèjìyǐngxiàngshùwèizhǐwénxìtǒng
AT shīyànrèn lìyònghuījiēfúshuǐyìnjìshùshèjìyǐngxiàngshùwèizhǐwénxìtǒng
AT allenshi newfingerprintingsystembasedongrayscalewatermarkingandhammingcode
AT shīyànrèn newfingerprintingsystembasedongrayscalewatermarkingandhammingcode
_version_ 1718287433471098880