博碩士論文 102522017 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:54 、訪客IP:3.144.25.74
姓名 陳?彰(Kun-Zhang Chen)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 適用於壓縮視訊串流服務之溯源數位浮水印設計
(Design of Fingerprinting Watermark in Digital Compressed Videos for Streaming Services)
相關論文
★ 基於QT之跨平台無線心率分析系統實現★ 網路電話之額外訊息傳輸機制
★ 針對與運動比賽精彩畫面相關串場效果之偵測★ 植基於向量量化之視訊/影像內容驗證技術
★ 植基於串場效果偵測與內容分析之棒球比賽精華擷取系統★ 以視覺特徵擷取為基礎之影像視訊內容認證技術
★ 使用動態背景補償以偵測與追蹤移動監控畫面之前景物★ 應用於H.264/AVC視訊內容認證之適應式數位浮水印
★ 棒球比賽精華片段擷取分類系統★ 利用H.264/AVC特徵之多攝影機即時追蹤系統
★ 利用隱式型態模式之高速公路前車偵測機制★ 基於時間域與空間域特徵擷取之影片複製偵測機制
★ 結合數位浮水印與興趣區域位元率控制之車行視訊編碼★ 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制
★ 基於文字與主播偵測之新聞視訊分析系統★ 植基於數位浮水印之H.264/AVC視訊內容驗證機制
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著網路多媒體視訊串流的蓬勃發展,數位多媒體內容易於複製和散佈,如何保障視訊著作權不受非法侵害日趨成為相當重要的議題,而數位浮水印技術被視為一種有效的防範措施。本論文提出實作於視訊串流服務中的數位視訊浮水印設計。透過在壓縮域嵌入浮水印訊號代表合法視訊接收者的相關身分資訊,有效協助追蹤非法視訊拷貝的散佈來源。運用部分解碼、嵌入處理和視訊編碼將浮水印訊號嵌入在視訊畫格中的特定區域,這些區域採用特徵或感興趣點來決定,有助於後續浮水印偵測。藉由嵌入訊號的自我相似特性,使浮水印偵測不需要原始視訊比對。利用移位浮水印設計,根據嵌入訊號的互相關函數表示不同位元,藉此提高浮水印攜載資訊容量。嵌入訊號理當能承受一定程度的轉碼處理或幾何形變轉換攻擊。為了實現視訊串流應用的需求,我們考量浮水印的視覺感知程度、容量、強健性和偵測方法,實驗結果也顯示我們提出架構的可行性。
摘要(英) With the expeditious development of digital video streaming over the Internet, avoiding the infringement of copyright and illegal distribution of videos has become increasingly important. Digital watermarking techniques may provide an effective solution. In this study, we propose a practical design of fingerprinting watermarking scheme for video streaming services. In order to track the source of the illegal redistribution, we embed the watermark signal representing the identity of a legitimate video recipient in the compressed domain of the transmitted videos. Once a pirated copy is found somewhere, the embedded fingerprint can uniquely determine the malicious subscriber. For the sake of less computational complexity in the streaming server, compressed video would be decoded partially and embedded with the fingerprint in the quantization indices, and then re-encoded. Since the blind detection is performed in the proposed scheme, the feature point extraction such as SURF is necessarily employed to determine the embedding positions of the watermarks, so that embedding and detection can be synchronized against geometrically deformed video. The autocorrelation function is introduced to figure out whether a watermark exists or not, and the message is read by the cross-correlation function. The experimental results demonstrate the feasibility of the proposed scheme.
關鍵字(中) ★ 數位浮水印
★ 數位智權保護
★ 視訊串流
★ 追蹤
關鍵字(英) ★ digital watermark
★ digital rights management
★ video streaming
★ tracking
論文目次 中文摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
圖目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
表目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
一 、 緒論 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 研究動機與目的 . . . . . . . . . . . . . . . . . . . . . 1
1.2 研究貢獻 . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 論文架構 . . . . . . . . . . . . . . . . . . . . . . . . . 3
二 、 相關研究與文獻回顧 . . . . . . . . . . . . . . . . . . . 4
2.1 數位浮水印的應用和需求 . . . . . . . . . . . . . . . . 4
2.2 視訊浮水印相關發展 . . . . . . . . . . . . . . . . . . . 5
三 、 基礎框架與情境 . . . . . . . . . . . . . . . . . . . . . 8
四 、 研究方法 . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.1 決定浮水印嵌入區域 . . . . . . . . . . . . . . . . . . . 12
4.1.1 SURF演算法簡介 . . . . . . . . . . . . . . . . . . . . 13
4.1.2 特徵點分群 . . . . . . . . . . . . . . . . . . . . . . . . 19
4.1.3 選擇浮水印嵌入區域 . . . . . . . . . . . . . . . . . . . 21
4.2 浮水印訊號 . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.1 浮水印嵌入演算法 . . . . . . . . . . . . . . . . . . . . 24
4.2.2 利用浮水印週期性結構偵測 . . . . . . . . . . . . . . . 26
4.2.3 偵測時以多數決投票機制選擇特徵點 . . . . . . . . . 28
4.3 攜載多位元 . . . . . . . . . . . . . . . . . . . . . . . . 29
4.3.1 可行的解決辦法 ──「Patchwork」 . . . . . . . . . . . 29
4.3.2 利用相關聯的隱藏訊號之方法 . . . . . . . . . . . . . 30
4.3.3 決定峰值的8個位置 . . . . . . . . . . . . . . . . . . . 32
五 、 實驗結果與討論 . . . . . . . . . . . . . . . . . . . . . 35
5.1 實驗環境與各項參數設定 . . . . . . . . . . . . . . . . 35
5.2 利用多張影像模擬場景變換測試 . . . . . . . . . . . . 36
5.2.1 訊號嵌入 . . . . . . . . . . . . . . . . . . . . . . . . . 36
5.2.2 浮水印視訊之失真度測試 . . . . . . . . . . . . . . . . 37
5.2.3 視訊未經攻擊之訊號偵測 . . . . . . . . . . . . . . . . 38
5.2.4 視訊遭攻擊後之訊號偵測 . . . . . . . . . . . . . . . . 40
5.2.5 討論較嚴重的攻擊狀況 . . . . . . . . . . . . . . . . . 41
5.3 探究討論 . . . . . . . . . . . . . . . . . . . . . . . . . 43
六 、 結論 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
參考文獻 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
參考文獻 [1] W. Zeng, H. Yu, and C.-Y. Lin, Multimedia Security Technologies for Digital
Rights Management. Elsevier, 2006.
[2] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking
and Steganography. Morgan Kaufmann, 2007.
[3] K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting
Forensics for Traitor Tracing. Hindawi, 2005.
[4] F. Hartung and B. Girod, “Digital watermarking of raw and compressed
video,” Proc. SPIE Digital Compression Technologies and Systems for Video
Communication, pp. 205–213, 1996.
[5] ——, “Watermarking of MPEG-2 encoded video without decoding and reencoding,”
Proceedings Multimedia Computing and Networking (MMCN),
1997.
[6] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “A video watermarking
system for broadcast monitoring,” in Proc. SPIE, Security and Watermarking
of Multimedia Contents, vol. 3657, Apr. 1999, pp. 103–112.
[7] V. Darmstaedter, J.-F. Delaigle, D. Nicholson, and B. Macq, “A block based
watermarking technique for MPEG-2 signals: Optimization and validation on
real digital TV distribution links,” in Proc. European Conference Multimedia Applications, Services and Techniques, Berlin, Germany, May 1998, pp. 190–
206.
[8] J. Dittmann, M. Stabenau, and R. Steinmetz, “Robust MPEG video watermarking
technologies,” in Proc. ACM Multimedia, Bristol, U.K., Sep. 1998,
pp. 71–80.
[9] T.-Y. Chung, M.-S. Hong, Y.-N. Oh, D.-H. Shin, and S.-H. Park, “Digital
watermarking for copyright protection of MPEG-2 compressed video,” IEEE
Transaction on Consumer Electronics, vol. 44, pp. 895–901, 1998.
[10] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, and M. G. Strintzis,
“Compressed-domain video watermarking of MPEG streams,” in IEEE Int.
Conf. Multimedia and Expo., vol. 1, 2002, pp. 569–572.
[11] G. C. Langelaar and R. L. Lagendijk, “Optimal differential energy watermarking
of DCT encoded images and video,” IEEE Trans. on Image Processing,
vol. 10, no. 1, pp. 148–158, Jan. 2001.
[12] M. Barni, F. Bartolini, and N. Checcacci, “Watermarking of MPEG-4 video
objects,” vol. 7, no. 1, pp. 23–32, 2005.
[13] M.-J. Lee, D.-H. Im, H.-Y. Lee, K.-S. Kim, and H.-K. Lee, “Real-time video
watermarking system on the compressed domain for high-definition video
contents: Practical issues,” Digital Signal Processing, vol. 22, no. 1, pp. 190–
198, 2012.
[14] L. Wang, H. Ling, F. Zou, and Z. Lu, “Real-time compressed-domain video
watermarking resistance to geometric distortions,” IEEE Multimedia, vol. 19,
no. 1, pp. 70–79, 2012.
[15] J. Zhang, A. Ho, G. Qiu, and P. Marziliano, “Robust video watermarking of
H.264/AVC,” vol. 54, pp. 205–209, February 2007.
[16] A. Mansouri, A. Aznaveh, F. Torkamani-Azar, and F. Kurugollu, “A low
complexity video watermarking in H.264 compressed domain,” IEEE Trans.
on Inf. Forensics and Security, vol. 5, pp. 649– 657, Dec. 2010.
[17] M. Noorkami and R. M. Mersereau, “A framework for robust watermarking
of H.264-encoded video with controllable detection performance,” IEEE
Trans. on Inf. Forensics and Security, vol. 2, pp. 14–23, Mar. 2007.
[18] G.-Z. Wu, Y.-J. Wang, and W.-H. Hsu, “Robust watermark embedding/detection
algorithm for H.264 video,” vol. 14, Jan.-Mar. 2005.
[19] P.-C. Su, C.-S. Wu, I.-F. Chen, C.-Y. Wu, and Y.-C. Wu, “A practical design of
digital video watermarking in H.264/AVC for content authentication,” Signal
Processing: Image Communication, vol. 26, no. 8-9, pp. 413–426, 2011.
[20] J. J. K. Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital
image watermarking,” Signal Processing, vol. 66, no. 3, pp. 303–317, May
1998.
[21] M. Manoochehri, H. Pourghassem, and G. Shahgholian, “A novel synthetic
image watermarking algorithm based on discrete wavelet transform
and fourier-mellin transform,” in Communication Software and Networks
(ICCSN), 2011 IEEE 3rd International Conference on, May 2011, pp. 265–
269.
[22] E. Tsougenis, G. Papakostas, D. Koulouriotis, and V. Tourassis, “Towards
adaptivity of image watermarking in polar harmonic transforms domain,” Optics
and Laser Technology, vol. 54, pp. 84 – 97, 2013.
[23] M. Ali and C. Ahn, “An optimized watermarking technique based on selfadaptive
de in dwt-svd transform domain,” Signal Processing, vol. 94, no. 1,
pp. 545–556, 2014.
[24] G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, “Reversible
watermarking based on invariant image classification and dynamic
histogram shifting,” IEEE Transactions on Information Forensics and Security,
vol. 8, no. 1, pp. 111–120, 2013.
[25] A. A. Mohammad, “A new digital image watermarking scheme based on
schur decomposition,” Multimedia Tools and Applications, vol. 59, no. 3,
pp. 851–883, 2012.
[26] S. Pereira and T. Pun, “Robust template matching for affine resistant image
watermarks,” IEEE Trans. Image Process, vol. 9, no. 6, pp. 1123–1129, Jun
2000.
[27] M. Kutter, “Watermarking resisting to translation, rotation, and scaling,” in
SPIE The International Society for Optical Engineering, vol. 3528, 1999, pp.
423–431.
[28] P.-C. Su and C.-C. J. Kuo, “Synchronized detection of the block-based watermark
with invisible grid embedding,” in SPIE Photonics West, San Jose,
CA, Jan. 2001, pp. 423–431.
[29] M. Kutter, S. Bhattacharjee, and T. Ebrahimi, “Towards second generation
watermarking schemes,” in IEEE International Confernece on Image Process,
vol. 1, 1999, pp. 320–323.
[30] X. Wang, J. Wu, and P. Niu, “A new digital image watermarking algorithm
resilient to desynchronization attacks,” IEEE Transactions on Information
Forensics and Security, vol. 2, no. 4, pp. 655–663, 2007.
[31] D. Zheng, S. Wang, and J. Zhao, “RST invariant image watermarking al
gorithm with mathematical modeling and analysis of the watermarking processes,”
IEEE Transactions on Image Processing, vol. 18, no. 5, pp. 1055–
1068, 2009.
[32] H. Tian, Y. Zhao, R. Ni, L. Qin, and X. Li, “LDFT-based watermarking resilient
to local desynchronization attacks,” IEEE Transactions on Cybernetics,
vol. 43, no. 6, pp. 2190–2201, Dec 2013.
[33] H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, “Speeded-up robust features,”
Computer Vision and Image Understanding, vol. 110, no. 3, pp. 346–359,
2008.
[34] D. Arthur and S. Vassilvitskii, “K-means++: The advantages of careful seeding,”
in Proceedings of the Eighteenth Annual ACM-SIAM Symposium on
Discrete Algorithms. Philadelphia, PA, USA: Society for Industrial and
Applied Mathematics, 2007, pp. 1027–1035.
[35] J. M. S. Prewitt, “Object enhancement and extraction,” Picture Processing
and Psychopictorics, pp. 75–149, 1970.
[36] S. Montabone and A. Soto, “Human detection using a mobile platform and
novel features derived from a visual saliency mechanism,” Image and Vision
Computing, vol. 28, no. 3, pp. 391 – 402, 2010.
[37] L. Tong, F. Dai, Y. Zhang, and J. Li, “Prediction restricted H.264/AVC video
scrambling for privacy protection,” Electronics letters, vol. 46, no. 1, pp. 47–
49, 2010.
[38] P.-C. Su, Y.-C. Chang, and C.-Y. Wu, “Geometrically resilient digital image
watermarking by using interest point extraction and extended pilot signals,”
IEEE Trans. on Inf. Forensics and Security, vol. 8, no. 12, pp. 1897–1908,
Dec. 2013.
[39] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Multibit digital watermarking
robust against local nonlinear geometrical distortions,” in IEEE International
Conference on Image Processing, Thessaloniki, Greece, 2001, pp.
999–1002.
[40] J. S. Lim, Two-Dimensional Signal and Image Processing. Prentice Hall,
1990.
[41] W. Bender, D. Gruhl, Morimoto, and A. Lu, “Techniques for data hiding,”
IBM Systems Journal, vol. 35, no. 3-4, pp. 313–336, 1996.
[42] K. Suhring, “H.264/AVC Software JM 18.6,” http://iphome.hhi.de/suehring/
tml/, 2014, [Online] Available.
[43] H. Jegou, M. Douze, and C. Schmid, “Hamming embedding and weak geometry
consistency for large scale image search,” in Proceedings of the 10th
European conference on Computer vision, vol. 5302. Marseille, France:
Springer, Oct 2008, pp. 304–317.
[44] B. Institute, “Tears of Steal,” https://mango.blender.org/download/, 2012,
[Online] Available.
[45] Xiph.org, “Video Test Media,” https://media.xiph.org/video/derf/, 2016,
[Online] Available.
指導教授 蘇柏齊(Po-Chyi Su) 審核日期 2017-1-24
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明