Announcement for Downloading full text filePlease respect the Copyright Act.
All digital full text dissertation and theses from this website are authorized the copyright owners. These copyrighted full-text dissertation and theses can be only used for academic, research and non-commercial purposes. Users of this website can search, read, and print for personal usage. In respect of the Copyright Act of the Republic of China, please do not reproduce, distribute, change, or edit the content of these dissertations and theses without any permission. Please do not create any work based upon a pre-existing work by reproduction, Adaptation, Distribution or other means.
URN etd-0808106-120208 Statistics This thesis had been viewed 3770 times. Download 1834 times. Author Jh-Jie Jian Author's Email Address No Public. Department Computer Science and Enginerring Year 2005 Semester 2 Degree Master Type of Document Master's Thesis Language English Page Count 73 Title A Color Image Watermarking Scheme Based on Secret Sharing and Wavelet Transform Keyword color image JND Watermark Watermark JND color image Abstract This thesis proposes a copyright protection scheme for color images using image secret sharing, Just-Noticeable-Distortion (JND) model and wavelet transform. The scheme contains two phases: the watermark embedding phase and the watermark extracting phase. In the watermark embedding phase, the color space of the color host image is first converted from RGB to YCbCr. Then a special sampling plane is created from the YCbCr color space. Next, the discrete wavelet transform is used to extract the features from the sampling plane. Then, a principal share image is generated according to the features and the watermark. Finally, the JND value and the discrete wavelet transform are used to embed the principal share image in the color host image to generate the watermarked image. In the watermark extracting phase, the principal share image is first retrieved from the suspect image. Then, an expanded watermark is reconstructed using the features of the suspect image features and the retrieved principal share image. Finally, the recovered watermark is obtained after the reduction of the expanded watermark. The recovered watermark is then verified against the original watermark to examine the copyright.
The experimental results show that the proposed scheme can resist several attacks such as cropping, blurring, sharpening, scaling, JPEG compression, brightness adjustment and contrast adjustment.
Advisor Committee Shang-Lin Hsieh - advisor
none - co-chair
none - co-chair
Files Date of Defense 2006-07-17 Date of Submission 2006-08-08