English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90429/105609 (86%)
Visitors : 10335180      Online Users : 372
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 會議論文 >  Item 310904400/5858


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/5858


    Title: Wavelet-Based Ownership Protection Scheme for Gray-Level Watermarks
    Other Titles: 以小波轉換與灰階浮水印為基礎的所有權保護方法
    Authors: 許慶昇;李奕煌
    Contributors: 銘傳大學資訊管理系
    Keywords: 數位浮水印;離散小波轉換;著作權保護 digital watermarking;discrete wavelet transformation;copyright protection
    Date: 2007-12-20
    Issue Date: 2009-12-15
    Publisher: 亞洲大學資訊學院;中華電腦學會
    Abstract: 隨著科技的進步,許多影像檔案均已透過數位化而成為數位影像。由於數位影像具備容易複製及散佈的特性,因此常常衍生出數位影像智慧財產權的爭議問題。為了解決此問題,近年來許多數位浮水印機制相繼被提出,其作法就是在數位影像之中,藏入足以辨識影像所有權的數位訊號。本文中將提出一個以小波轉換為基礎的灰階數位浮水印機制,為了提升浮水印的強韌性,我們將浮水印的灰階值轉換為三種不同重要性的位元,並以不同的方法將此三種位元藏入原始影像中,使較重要的位元資料能得到較佳的保護,而影像的破壞程度則控制在人眼所無法察覺的狀態之下。由實驗結果顯示,本研究所提出的方法對於一些常見的影像攻擊具有相當程度的強韌性。With the explosive growth of digital technologies, more and more images are transformed into digital formats. Therefore, it is very easy to duplicate or distribute digital images in an unauthorized manner. Recently, more and more watermarking schemes are proposed to protect intellectual property rights of digital images. However, only a few of them take into account the issue of gray-level watermarks. This paper proposes an ownership protection scheme based on discrete wavelet transformation (DWT) for gray-level watermarks. To embed a gray-level watermark, we distinguish the gray-levels of the watermark into three kinds of bits according to their importance levels, and embed them into the original image by different methods. Thus, we can increase the survival rate of significant bits under attacks. In addition, the scheme requires neither the original watermark nor the original image during the ownership identification phase. Experimental results show that our scheme can resist many common attacks.
    Relation: 2007NCS全國計算機會議 12-20~21
    Appears in Collections:[資訊學院] 會議論文

    Files in This Item:

    File SizeFormat
    4084.pdf830KbAdobe PDF1417View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback