Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model

碩士 === 國立清華大學 === 資訊系統與應用研究所 === 98 === In the rapidly development of the internet, the image content will be more easily be copied or tampered while delivering trough the net. The paper chooses the Semi-fragile watermarking technique. Semi-fragile watermarking can resist legal manipulations such as...

Full description

Bibliographic Details
Main Authors: Huang, Ling-Hsuan, 黃齡萱
Other Authors: Chang, Long-Wen
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/49402813046411608761
id ndltd-TW-098NTHU5394020
record_format oai_dc
spelling ndltd-TW-098NTHU53940202016-04-20T04:17:28Z http://ndltd.ncl.edu.tw/handle/49402813046411608761 Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model 運用賽局理論古諾模型機制於半易碎型浮水印 Huang, Ling-Hsuan 黃齡萱 碩士 國立清華大學 資訊系統與應用研究所 98 In the rapidly development of the internet, the image content will be more easily be copied or tampered while delivering trough the net. The paper chooses the Semi-fragile watermarking technique. Semi-fragile watermarking can resist legal manipulations such as JPEG compression, and detect the tampered image. Therefore, it can be used to authenticate the image and detect if the image is tampered. For the blind scheme, we propose the Modulate mechanism to embed the watermark pattern. After embedding the watermark into the image, we hope to maintain the high quality and correctly detect the changed signal of the image even if it under the normal image processing. To match this goal, we choose Game Theory to analyze it. In Game Theory, two features of the Semi-fragile watermarking, Authentication and Tamper Detection are considered as two players who compete in the game. And the quality of the image is considered as the resource that two players have to compete. By the analysis of the Cournot model, it can find the best solution to control the image quality. We compare the proposed method and the average resource allocation method to find that our method can work even in JPEG compression 70%. Finally, the results are applied to design an efficient Discrete Cosine Transform (DCT) semi-fragile watermarking system which allows detecting local forgery signals in spite of JPEG compression. Chang, Long-Wen 張隆紋 2010 學位論文 ; thesis 49 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立清華大學 === 資訊系統與應用研究所 === 98 === In the rapidly development of the internet, the image content will be more easily be copied or tampered while delivering trough the net. The paper chooses the Semi-fragile watermarking technique. Semi-fragile watermarking can resist legal manipulations such as JPEG compression, and detect the tampered image. Therefore, it can be used to authenticate the image and detect if the image is tampered. For the blind scheme, we propose the Modulate mechanism to embed the watermark pattern. After embedding the watermark into the image, we hope to maintain the high quality and correctly detect the changed signal of the image even if it under the normal image processing. To match this goal, we choose Game Theory to analyze it. In Game Theory, two features of the Semi-fragile watermarking, Authentication and Tamper Detection are considered as two players who compete in the game. And the quality of the image is considered as the resource that two players have to compete. By the analysis of the Cournot model, it can find the best solution to control the image quality. We compare the proposed method and the average resource allocation method to find that our method can work even in JPEG compression 70%. Finally, the results are applied to design an efficient Discrete Cosine Transform (DCT) semi-fragile watermarking system which allows detecting local forgery signals in spite of JPEG compression.
author2 Chang, Long-Wen
author_facet Chang, Long-Wen
Huang, Ling-Hsuan
黃齡萱
author Huang, Ling-Hsuan
黃齡萱
spellingShingle Huang, Ling-Hsuan
黃齡萱
Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
author_sort Huang, Ling-Hsuan
title Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
title_short Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
title_full Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
title_fullStr Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
title_full_unstemmed Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
title_sort semi-fragile watermarking with applying game-theoretic cournot model
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/49402813046411608761
work_keys_str_mv AT huanglinghsuan semifragilewatermarkingwithapplyinggametheoreticcournotmodel
AT huánglíngxuān semifragilewatermarkingwithapplyinggametheoreticcournotmodel
AT huanglinghsuan yùnyòngsàijúlǐlùngǔnuòmóxíngjīzhìyúbànyìsuìxíngfúshuǐyìn
AT huánglíngxuān yùnyòngsàijúlǐlùngǔnuòmóxíngjīzhìyúbànyìsuìxíngfúshuǐyìn
_version_ 1718227672896634880