A Technique for Image Authentication
碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 90 === As digital technologies advance, more and more publications such as digital images and the MP3 music products are produced in the digital format and transmitted through the Internet. Accompanying the advent of such digital world, however, illegal use and copying...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/12948829473620349269 |
id |
ndltd-TW-090CYUT0396001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090CYUT03960012015-10-13T17:35:25Z http://ndltd.ncl.edu.tw/handle/12948829473620349269 A Technique for Image Authentication 數位影像驗證法 Chung-Wei Tsai 蔡中瑋 碩士 朝陽科技大學 資訊管理系碩士班 90 As digital technologies advance, more and more publications such as digital images and the MP3 music products are produced in the digital format and transmitted through the Internet. Accompanying the advent of such digital world, however, illegal use and copying of digital products become a serious problem. How to protect the right of legal users and the copyright of original producers thus becomes an active research area. Among various technologies for digital product protection, image authentication has received extensive attentions. Researchers have developed a number of methods to identify if an image has experienced illegal modifications. For examples, images can be authenticated by image feature comparison, by digital signatures, and by error control coding. Most of them, however, can only detect if a "portion" of an image is modified, as a tradeoff of simplicity, efficiency, or specific requirements for certain applications. There are very few techniques that can identify image tampering up to one-pixel level. In this research, we will first review current important techniques for digital product protection in general, and then propose a method that is able to locate image tampering up to one-pixel level. This technique is very important if the image content is not allowed for modification, especially when the image is used for legal purposes. Yuan-Liang Tang 唐元亮 2002 學位論文 ; thesis 49 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 90 === As digital technologies advance, more and more publications such as digital images and the MP3 music products are produced in the digital format and transmitted through the Internet. Accompanying the advent of such digital world, however, illegal use and copying of digital products become a serious problem. How to protect the right of legal users and the copyright of original producers thus becomes an active research area.
Among various technologies for digital product protection, image authentication has received extensive attentions. Researchers have developed a number of methods to identify if an image has experienced illegal modifications. For examples, images can be authenticated by image feature comparison, by digital signatures, and by error control coding. Most of them, however, can only detect if a "portion" of an image is modified, as a tradeoff of simplicity, efficiency, or specific requirements for certain applications. There are very few techniques that can identify image tampering up to one-pixel level. In this research, we will first review current important techniques for digital product protection in general, and then propose a method that is able to locate image tampering up to one-pixel level. This technique is very important if the image content is not allowed for modification, especially when the image is used for legal purposes.
|
author2 |
Yuan-Liang Tang |
author_facet |
Yuan-Liang Tang Chung-Wei Tsai 蔡中瑋 |
author |
Chung-Wei Tsai 蔡中瑋 |
spellingShingle |
Chung-Wei Tsai 蔡中瑋 A Technique for Image Authentication |
author_sort |
Chung-Wei Tsai |
title |
A Technique for Image Authentication |
title_short |
A Technique for Image Authentication |
title_full |
A Technique for Image Authentication |
title_fullStr |
A Technique for Image Authentication |
title_full_unstemmed |
A Technique for Image Authentication |
title_sort |
technique for image authentication |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/12948829473620349269 |
work_keys_str_mv |
AT chungweitsai atechniqueforimageauthentication AT càizhōngwěi atechniqueforimageauthentication AT chungweitsai shùwèiyǐngxiàngyànzhèngfǎ AT càizhōngwěi shùwèiyǐngxiàngyànzhèngfǎ AT chungweitsai techniqueforimageauthentication AT càizhōngwěi techniqueforimageauthentication |
_version_ |
1717782994018631680 |