• 沒有找到結果。

最後對本論文的方法做一個總結,本論文所提出的一個基於粒子群演算法與 Canny 邊緣偵測來改善離散小波轉換和奇異值分解的數位浮水印技術。主要是利 用 DWT 和 SVD 轉換,藉由 Canny 濾波器,將浮水印嵌入於頻率域的邊緣特徵 裡,在以粒子群演算法,找出浮水印在不可視性與強韌性之間的合適權重。實驗 結果證實,本論文的方法,所計算出來的 PSNR,有明顯高於其他方法。而且,

再承受幾何攻擊、雜訊攻擊,去雜訊攻擊,壓縮攻擊,其他影像處理攻擊這五項 攻擊時,也具備極佳的抵抗效果;而且,在大多數的攻擊中,本論文所計算出來 的 Q 值,都位居第一。至於,在未來的工作上,將會針對以下的幾大項,進行 更深入的研究探討。

 特徵擷取:

1. 運用更多的邊緣偵測濾波器,進行嵌入測試。

2. 分析影像的角點、紋理、與內容。

3. 藉由DCT進行特徵擷取,並找出最佳嵌入位置。

 頻域轉換技術:

1. 利用 DFT 或 DCT,加強浮水印抗攻擊的強韌度。

2. 比較 DFT、DCT 與 DWT 在不同頻域段的強韌度。

 粒子群最佳化設計:

1. 給予浮水印不可視性與強韌性不同的比重,來改善適應函數上的設計。

2. 運用更多的影像品質評估函式,來進行適應函數的設計。

3. 加入更多具代表性的攻擊,來改進適應函數的設計。

6. 參考文獻

[1] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhnc, “Information hiding - A survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.

[2] C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 525-539, Apr. 1998.

[3] M. D. Swanson, B. Zhu, and A. H. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 540-550, Apr. 1998.

[4] F. A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Process.

Mag., vol. 17, no. 5, pp. 58-64, May 2000.

[5] Y-S. Lee, H.-J. Kang, and Y.-H. Kim, “A study on the copyright protection using watermarking technique in power line communication network,” in Proc. the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, 2006, pp. 65-68.

[6] I. J. Cox, J. Kilian, L. Thomson, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, vol. 6, no. 12, pp.1673-1687, 1997.

[7] J. Cannons and P. Moulin, “Design and statistical analysis of a hashaided image watermarking system,” IEEE Trans. on Image Processing, vol. 13, no. 10, pp.

1393-1408, Oct. 2004.

[8] N. Ahmed, T. Natarajan, and K. R. Rao, “Discrete cosine transform,” IEEE Trans. Computers, vol. 23, pp. 90-93, Jan. 1974.

[9] W.-H. Chen, C. H. Smith, and S. Fralick, “A fast computational algorithm for the discrete cosine transform,” IEEE Trans. Commun., vol. 25, no. 9, pp. 1004-1009, Sept. 1977.

[10] B. G. Lee, “A new algorithm to compute the discrete cosine transform,” IEEE Trans. Acoust. Speech Signal Processing, vol. 32, no. 6, pp. 1243-1245, Dec.

1984.

[11] E. Feig and S. Winograd, “Fast algorithms for the discrete cosine transform,” IEEE Trans. Signal Processing, vol. 40, no. 9, pp. 2174-2193, Sept.

1992.

[12] X. Qi and J. Qi, “A robust content-based digital image watermarking scheme,”

Signal Processing, vol. 87, Issue 6, pp. 1264-1280, 2007.

[13] F. Marvasti and P. Azmi, “A novel iterative decoding method for DFT codes in erasure channels,” Lecture Notes in Computer Science, vol. 3124, pp. 548-553,

[14] I. Djurović, L. Stanković, and B. Barkat, “Robust time-frequency distributions based on the robust short time Fourier transform,” Annales des Télécommunications, vol. 60, no. 5-6, pp. 681-697, 2005.

[15] I. Djurović and V. V. Lukin, “Robust DFT with high breakdown point for complex-valued impulse noise environment,” IEEE Signal Processing Letters, vol. 13, no. 1, pp. 25-28, 2006.

[16] M. Vetterli and C. Herley, “Wavelets and filter banks: theory and design,” IEEE Trans. on Signal Processing, vol. 40, no. 9, pp. 2207-2232, Sep. 1992.

[17] Y. S. Kim, O. H. Kwon, and R. H. Park, “Wavelet based watermarking method for digital images using the human visual system,” Electron. Lett., vol. 35, no. 6, pp. 466-468, 1999.

[18] N. Kaewkamnerd and K. Rao, “Wavelet based image adaptive watermarking scheme,” Electron. Lett., vol. 36, no. 4, pp. 312-313, 2000.

[19] M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Process., vol. 10, no. 5, pp.

783-791, May 2001.

[20] W. Zhu, Z. Xiong, and Y.-Q. Zhang, “Multiresolution watermarking for images and video,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 9, no. 4, pp. 545-550, June. 1999.

[21] F. Huang and Z. H. Guan, “A hybrid SVD-DCT watermarking method based on LPSNR,” Pattern Recognition Letters, vol. 25, no. 15, pp. 1769-1775, 2004.

[22] K.-M. Hung, Y.-T. Wang, and C.- H. Yeh, “A robust watermarking technique for copyright protection of digital images,” in Proc. WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January, 2007, pp. 248-252.

[23] R. Karkarala and P. O. Ogunbona, “Signal analysis using a multiresolution form of the singular value decomposition,” IEEE Trans. on Image Processing, vol. 10, no. 5, pp. 724-735, 2001.

[24] R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. on Multimedia. vol. 4, no. 1, pp. 121-128, 2002.

[25] Y. Wu, “On the security of an SVD-based ownership watermarking,” IEEE Trans.

on Multimedia. vol. 7, no. 4, pp. 624-627, 2005.

[26] X. P. Zhang and K. Li, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. on Multimedia. vol. 7, no. 2, pp. 593-594, 2005.

[27] S. C. Pei and H. H. Liu. “Improved SVD-based watermarking for digital images,” in Proc. the Sixth Indian Conference on Computer Vision, Graphics and Image Processing, 2008, pp. 273-280.

[28] C. Xiong, R. Ward, and J. Xu. “On the security of singular value based

watermarking,” in Proc. the IEEE International Conference on Image Processing, 2008, pp. 437-440.

[29] A. S. Lewis and G. Knowles, “VLSI architecture for 2-D Daubechics wavelet transform without multipliers,” Electron. Lett., vol. 27, no. 2, pp. 171-173, Jan.

1991.

[30] C. Chakrabarti and M. Vishwanath, “Efficient realizations of the discrete and continuous wavelet transforms: from single chip implementations to mappings on SIMD array computers,” IEEE Trans. on Signal Processing, vol. 43, no. 5, pp.

759-771, 1995.

[31] F. Marino, “Two fast architectures for the direct 2-D discrete wavelet Transform,”

IEEE Trans. on Signal Processing, vol. 49, no. 6, pp. 1248-1259, June 2001.

[32] Y. Wang, J. F. Doherty, and R. E. Van Dyck, “A wavelet-based watermarking algorithm for ownership verification of digital image,” IEEE Trans. on Image Processing, vol. 11, no. 2, pp. 77-88, Feb 2002.

[33] P. W. Chan and M. Lyu, “A DWT-based digital video watermarking scheme with error correcting code,” in Proc. International Conference on Information and Communications Security (ICICS2003), Oct. 2003, vol. 2836. pp. 202-213.

[34] E. Elbasi and A. M. Eskicioglu, “A DWT-based robust semi-blind image watermarking algorithm using two bands,” in Proc. Annual Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents Conference, 2006, pp. 15-19.

[35] E. Ganic and A. M. Eskicioglu, “Robust embedding of visual watermarks using DWT-SVD,” Journal of Electronic Imaging, vol. 14, no. 4, pp. 1673-1687, 2005.

[36] Z. H. Cui, J. C. Zeng, and G. J. Sun, “A fast particle swarm optimization,”

International Journal of Innovative Computing, Information and Control, vol. 2, no. 6, pp. 1365-1380, 2006.

[37] Y. Shang and Y. Qiu, “A note on the extended rosenbrock function,” Evolutionary Computation, vol. 14, no. 1, pp. 119-126, 2006.

[38] Y. Shi and R. C. Eberhart, “A modified particle swarm optimizer,” in Proc. IEEE Congress on Evolutionary Computation, 1998, Piscataway, pp. 69-73.

[39] Z. Cui, J. Zeng, and X. Cai,“A new stochastic particle swarm optimizer,” in Proc.

2004 Congress on Evolutionary Computation, vol. 1, Portland, Oregon, 2004, pp.

316-319.

[40] Z. H. Cui and J. C. Zeng, “A guaranteed global convergence particle swarm optimizer,” Lecture Notes in Artificial Intelligence, vol. 3066, Sweden, pp.

762-767, 2004.

[41] Y.-R. Wang, W.-H. Lin, and L. Yang, “An intelligent watermarking method based

7, pp. 8024-8029, 2011.

[42] B. J. Falkowski, R. S. Stanković, and D. Janković, “Circuit synthesis from minimized Haar series,” in Proc. of IEEE International Symposium on Circuits and Systems, Phoenix, Arizona, May 2002, vol. 3. pp. 381-384.

[43] W. Lu, H. Lu, and F. L. Chung, “Feature based watermarking using watermark template match,” Applied Mathematics and Computation, vol. 177, no. 1, pp.

377-386, 2006.

[44] C.-W. Tang and H.-M. Hang, “A feature-based robust digital watermarking scheme,” IEEE Trans. on Signal Processing, vol. 51, no. 4, pp. 950-959, 2003.

[45] A. K. Parthasarathy and S. Kak, “An improved method of content based image watermarking,” IEEE Trans. on Broadcasting, vol. 53, no. 2, pp. 468-479, June 2007.

[46] F. Autrusseau, P. Le Callet, and A. Ninassi, “A study of content based watermarking using an advanced HVS model,” in Proc. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007, pp. 485-488.

[47] Z. Wang and A. C. Bovik, “A universal image quality index,” IEEE Signal Processing Letters, vol. 9, no. 3, pp. 81-84, 2002.

[48] A. Ichigaya, M. Kurozumi, N. Hara, Y. Nishida, and E. Nakasu, “A method of estimating coding PSNR using quantized DCT coefficients,” IEEE Trans. Circ.

Syst Video Tech., vol. 16, no. 2, pp. 251-259, Feb. 2006.

[49] D. S. Turaga, Y. Chen, and J. Caviedes, “No reference PSNR estimation for compressed pictures,” Signal Processing: Image Communication, vol. 19, no. 2, pp. 173-184, Sep. 2004.

[50] Copyright (c) 2001, Shelby Pereira, University of Geneva, Vision Group.

http://cvml.unige.ch/ResearchProjects/Watermarking/Checkmark/

[51] M. Clerc and J. Kennedy, “The particle swarm-explosion, stability, and convergence in a multi-dimensional complex space,” IEEE Trans. on Evolutionary Computation, vol. 6, pp. 58-73, Feb. 2002.

相關文件