Tunghai University Institutional Repository:Item 310901/2662
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4250449      Online Users : 321
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/2662


    Title: 基於數位樣板的二元文件影像完整性保護技術
    Other Titles: Integrity Protection of Binary Document Images Based on Digital Patterns
    Authors: 林育瑩
    Lin, Yu-Ying
    Contributors: 林祝興
    Lin, Chu-Hsing
    東海大學資訊工程學系
    Keywords: 完整性保護;數位浮水印;可翻轉性;細線化;數位樣板;骨架
    integrity protection;digital watermark;flippability;thinning;digital pattern;skeleton
    Date: 2008
    Issue Date: 2011-03-23T05:56:32Z (UTC)
    Abstract: 在此研究論文當中,我們將提出一個基於影像樣板的二元文件影像完整性保護架構,二元影像較困難於灰階影像及彩色影像,因為二元影像只由黑色及白色像素所構成,因此對於嵌入方面便更顯得困難。架構上我們將二元文件影像的黑及白樣板透過細線化的方法取出,且和使用者的浮水印資訊做組合後透過非對稱的加密方法加密,之後再將加密資訊嵌入到原有的二元文件影像中可嵌入的位置,供日後完整性的判定。對於實驗部份我們提供了一系列的攻擊方式,而實驗結果顯示此方法架構能有效的偵測出此二元文件影像是否遭受竄改攻擊,甚至連最細微攻擊也都能有效的偵測出,另外,和先前的方法做比較上,除了能有效的偵測出是否遭受竄改之外,此方法的計算複雜度也較先前的方法來的要好。
    It is more difficult to protect binary document images than color or grayscale images. Because binary document images are often in black and white format and there is thus less redundancy that can be exploited for embedding additional information. In this thesis, a scheme for integrity protection of binary document images based on digital patterns is proposed. The image skeleton and the inverse skeleton are found through thinning and the skeleton signature is combined with watermark information. The result is encrypted asymmetrically and hidden in embeddable locations of the image. A series of attack experiments are conducted to demonstrate that the approach is capable of detecting tampering. Even single malicious pixel modifications can be detected. The approach is computationally more efficient than previous approaches.
    Appears in Collections:[Department of Computer Science and Information ] Master's Theses

    Files in This Item:

    File SizeFormat
    096THU00394024-001.pdf2477KbAdobe PDF152View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback