Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model
碩士 === 國立清華大學 === 資訊系統與應用研究所 === 98 === In the rapidly development of the internet, the image content will be more easily be copied or tampered while delivering trough the net. The paper chooses the Semi-fragile watermarking technique. Semi-fragile watermarking can resist legal manipulations such as...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/49402813046411608761 |
id |
ndltd-TW-098NTHU5394020 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NTHU53940202016-04-20T04:17:28Z http://ndltd.ncl.edu.tw/handle/49402813046411608761 Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model 運用賽局理論古諾模型機制於半易碎型浮水印 Huang, Ling-Hsuan 黃齡萱 碩士 國立清華大學 資訊系統與應用研究所 98 In the rapidly development of the internet, the image content will be more easily be copied or tampered while delivering trough the net. The paper chooses the Semi-fragile watermarking technique. Semi-fragile watermarking can resist legal manipulations such as JPEG compression, and detect the tampered image. Therefore, it can be used to authenticate the image and detect if the image is tampered. For the blind scheme, we propose the Modulate mechanism to embed the watermark pattern. After embedding the watermark into the image, we hope to maintain the high quality and correctly detect the changed signal of the image even if it under the normal image processing. To match this goal, we choose Game Theory to analyze it. In Game Theory, two features of the Semi-fragile watermarking, Authentication and Tamper Detection are considered as two players who compete in the game. And the quality of the image is considered as the resource that two players have to compete. By the analysis of the Cournot model, it can find the best solution to control the image quality. We compare the proposed method and the average resource allocation method to find that our method can work even in JPEG compression 70%. Finally, the results are applied to design an efficient Discrete Cosine Transform (DCT) semi-fragile watermarking system which allows detecting local forgery signals in spite of JPEG compression. Chang, Long-Wen 張隆紋 2010 學位論文 ; thesis 49 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立清華大學 === 資訊系統與應用研究所 === 98 === In the rapidly development of the internet, the image content will be more easily be copied or tampered while delivering trough the net. The paper chooses the Semi-fragile watermarking technique. Semi-fragile watermarking can resist legal manipulations such as JPEG compression, and detect the tampered image. Therefore, it can be used to authenticate the image and detect if the image is tampered. For the blind scheme, we propose the Modulate mechanism to embed the watermark pattern.
After embedding the watermark into the image, we hope to maintain the high quality and correctly detect the changed signal of the image even if it under the normal image processing. To match this goal, we choose Game Theory to analyze it. In Game Theory, two features of the Semi-fragile watermarking, Authentication and Tamper Detection are considered as two players who compete in the game. And the quality of the image is considered as the resource that two players have to compete. By the analysis of the Cournot model, it can find the best solution to control the image quality.
We compare the proposed method and the average resource allocation method to find that our method can work even in JPEG compression 70%. Finally, the results are applied to design an efficient Discrete Cosine Transform (DCT) semi-fragile watermarking system which allows detecting local forgery signals in spite of JPEG compression.
|
author2 |
Chang, Long-Wen |
author_facet |
Chang, Long-Wen Huang, Ling-Hsuan 黃齡萱 |
author |
Huang, Ling-Hsuan 黃齡萱 |
spellingShingle |
Huang, Ling-Hsuan 黃齡萱 Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model |
author_sort |
Huang, Ling-Hsuan |
title |
Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model |
title_short |
Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model |
title_full |
Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model |
title_fullStr |
Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model |
title_full_unstemmed |
Semi-Fragile Watermarking with Applying Game-Theoretic Cournot Model |
title_sort |
semi-fragile watermarking with applying game-theoretic cournot model |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/49402813046411608761 |
work_keys_str_mv |
AT huanglinghsuan semifragilewatermarkingwithapplyinggametheoreticcournotmodel AT huánglíngxuān semifragilewatermarkingwithapplyinggametheoreticcournotmodel AT huanglinghsuan yùnyòngsàijúlǐlùngǔnuòmóxíngjīzhìyúbànyìsuìxíngfúshuǐyìn AT huánglíngxuān yùnyòngsàijúlǐlùngǔnuòmóxíngjīzhìyúbànyìsuìxíngfúshuǐyìn |
_version_ |
1718227672896634880 |