题名

基於視覺機密分享與BCH碼之版權保護機制

并列篇名

Copyright Protection Scheme Based on Visual Secret Sharing and BCH Code

DOI

10.29688/MHJ.201208.0011

作者

趙和昌(Her-Chang Chao);范佐搖(Tzuo-Yau Fan)

关键词

浮水印 ; 版權保護 ; 離散小波轉換 ; 視覺機密分享機制 ; Watermarking ; copyright protection ; discrete wavelet transform ; visual secret sharing

期刊名称

明新學報

卷期/出版年月

38卷2期(2012 / 08 / 01)

页次

157 - 167

内容语文

繁體中文

中文摘要

本論文提出基於視覺機密分享與BCH碼之版權保護機制。此方法包含兩階段。第一階段為產生所有權影像,第二階段則為取回浮水印階段。在產生所有權影像階段裡,將欲註冊影像經由n階層離散小波轉換取得影像的特徵,以此特徵產生特徵影像;並藉由BCH碼將浮水印編碼為驗證碼,運用特徵影像、驗證碼和視覺機密分享機制(Visual Secret Sharing Scheme, VSSS)可實現所有權影像。在浮水印取回階段,特徵影像由欲驗證影像中生成,並透過特徵影像與所有權影像疊合而取回驗證碼,經BCH碼解碼出驗證影像所有權之浮水印。此方法在產生影像所有權驗證碼時不僅不需要修改原圖,並且BCH碼可提升浮水印的強韌性。從實驗結果得知,本機制可抵抗多數的影像處理攻擊。

英文摘要

In this paper, a copyright protection scheme based on visual secret sharing and BCH code is proposed. The scheme includes ownership image construction and watermark extraction. In the ownership image construction, the characteristic of image is then extracted by n-DWT decomposing from the host image, the characteristic of image can be created the feature image. Next, a verification code is generated by BCH code from a watermark. An ownership share can be generated according to the feature image, the verification code, and the visual secret sharing scheme (VSSS). In the watermark extraction, the feature image can be produced from a suspected image. By stacking the feature image and the ownership image, and BCH decode, the hidden watermark, used for copyright verification, can be obtained. The scheme cannot only maintain the quality of a host image, but also can enhance the robustness of the watermarking by BCH code. The experimental results show that the proposed scheme can resist several image processing attacks.

主题分类 人文學 > 人文學綜合
基礎與應用科學 > 基礎與應用科學綜合
工程學 > 工程學綜合
社會科學 > 社會科學綜合
参考文献
  1. Aydin, S.,Memis, M.,Elbasi, E.(2008).Digital image watermarking method in multi level DWT.Signal Processing, Communication and Applications Conference, 2008. SIU 2008. IEEE 16th
  2. Bouchakour, M.,Jeannic, G.,Autrusseau, F.(2008).JND mask adaptation for wavelet domain watermarking.2008 IEEE International Conference on Multimedia and Expo
  3. Chang, C. C.,Hsiao, J. Y.,Chiang, C. L.(2002).An image copyright protection scheme based on torus automorphism.First International Symposium on Cyber Worlds (CW'02)
  4. Hernandez, J. R.,Amado, M.,Perez-Gonzalez, F.(2000).DCT-domain watermarking techniques for still images: detector performance analysis and a new structure.IEEE Transactions on Image Processing,9(1),55-68.
  5. Hsu, C. S.,Hou, Y. C.(2005).Copyright protection scheme for digital images using visual cryptography and sampling methods.Optical Engineering,44(7),077003.
  6. Ito, R.,Kuwakado, H.,Tanaka, H.(1999).Image size invariant visual cryptographic.IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,82-A(10),2172-2177.
  7. Kung, C. H.,Wu, P. T.,Lee, Y. C.(2005).The design of an innovative method for digital video surveillance system with watermarking and error control codes.2005. IMTC 2005.Proceedings of the IEEE
  8. Loo, P.,Kingsbury, N.(2003).Watermark detection based on the properties of error control codes.Vision, Image and Signal Processing, IEE Proceedings,150(2),115-121.
  9. Lou, D. C.,Tso, H. K.,Liu, J. L.(2007).A copyright protection scheme for digital images using Visual Cryptography technique.Computer Standards and Interfaces,29(1),125-131.
  10. Naor M.,Shamir A.(1995).Visual cryptography.Advances in Cryptography-EUROCRYPT'94,Perugia, Italy:
  11. Peterson, W. W.,Weldon, E. J., Jr.(1971).Error-Correcting Codes.Cambridge, Mass:MIT Press.
  12. Solachidis, V.,Pitas, I.(1999).Circularly symmetric watermark embedding in 2-D DFT domain.Proc. IEEE Int. Conf. on Acoust., Speech and Signal Process.,6,3469-3472.
  13. Tsui, T. K.,Zhang, X. P.,Androutsos, D.(2008).Color image watermarking using multidimensional fourier transforms.IEEE Transactions on Information Forensics and Security,3(1),16-22.
  14. Tu, S. F.,Hsu, C. S.(2009).Digital watermarking method based on image size invariant visual cryptographic scheme.Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
  15. Wang, M. S.,Chen, W. C.(2008).Robust copyright protection scheme based on discrete cosine transform and secret sharing techniques.Journal of Electronic Imaging,17(2),125-131.
  16. Wang, M. S.,Chen, W. C.(2007).Digital image copyright protection scheme based on visual cryptography and singular value decomposition.Optical Engineering,46(6),067006.
  17. Xing, Y. B.,He, J. H.(2010).A new robust copyright protection scheme for digital image based on visual cryptography.International Conference on Wavelet Analysis and Pattern Recognition
  18. Zeng, Y. C.,Pei, S. C.(2007).2.5-domain tri-watermarking algorithm for DCT-Based video protection.2007 IEEE International Conference on Multimedia and Expo