博碩士論文 93523051 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:21 、訪客IP:3.144.248.24
姓名 許維倫(Wei-Lun Hsu)  查詢紙本館藏   畢業系所 通訊工程學系
論文名稱 H.264序號調變視訊浮水印技術與基於特徵統計之時軸同步機制
(Index modulation for H.264 video watermarking and temporal synchronization based on feature statistics)
相關論文
★ 基於區域權重之衛星影像超解析技術★ 延伸曝光曲線線性特性之調適性高動態範圍影像融合演算法
★ 實現於RISC架構之H.264視訊編碼複雜度控制★ 基於卷積遞迴神經網路之構音異常評估技術
★ 具有元學習分類權重轉移網路生成遮罩於少樣本圖像分割技術★ 具有注意力機制之隱式表示於影像重建 三維人體模型
★ 使用對抗式圖形神經網路之物件偵測張榮★ 基於弱監督式學習可變形模型之三維人臉重建
★ 以非監督式表徵分離學習之邊緣運算裝置低延遲樂曲中人聲轉換架構★ 基於序列至序列模型之 FMCW雷達估計人體姿勢
★ 基於多層次注意力機制之單目相機語意場景補全技術★ 基於時序卷積網路之單FMCW雷達應用於非接觸式即時生命特徵監控
★ 視訊隨選網路上的視訊訊務描述與管理★ 基於線性預測編碼及音框基頻週期同步之高品質語音變換技術
★ 基於藉語音再取樣萃取共振峰變化之聲調調整技術★ 即時細緻可調性視訊在無線區域網路下之傳輸效率最佳化研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) H.264是一個新興的視訊壓縮標準,現今不論是在有線或無線網路的視訊應用上,都相當受到歡迎。然而數位內容容易被消費者修改或是拷貝,因此著作權保護、拷貝控制和完整驗證,在近幾年已變成一個重要的議題。浮水印即是一種要求數位資料所有權的保護方法。
本論文中我們利用區塊極性與序號調變來達到浮水印的嵌入,其中區塊極性是由4x4 DCT轉換且量化後的DC係數來決定,而區塊序號則是由4x4 DCT轉換且量化後,其所有AC係數量級的總和來決定。區塊序號的最低位元被當成調變參數,藉由修改量化之AC係數來改變調變參數,進而達到嵌入浮水印的目的。為了抵抗時軸同步攻擊,像是畫面刪除,畫面插入或是畫面順序調換,我們亦提出基於特徵統計的時軸同步機制,特徵統計量是經由統計視訊內容中的局部變異量或是特徵空間分佈的投影量而得到,同時將其當作額外資訊傳送到浮水印萃取端。在浮水印萃取端,藉由比對額外資訊與從接收視訊中取出的特徵統計量,來達到時軸同步。
模擬結果顯示提出的浮水印系統有良好的效能,而且萃取浮水印不需要原始視訊,同時浮水印演算法有較低的複雜度,可適合即時性的應用;而基於特徵統計的時軸同步機制,可促使浮水印系統更有效的抵抗時軸同步攻擊。
摘要(英) H.264 is a new advanced standard. The applications of video on Internet or wireless networks become very popular nowadays. However, these digital contents can be easily modified and copied by end users. Hence copyright protection, copy control and integrity verification has become important issues in recent years. Digital watermarking is a means of claiming ownership of a data source.
In the proposed system, block polarity and block index modulation are used to achieve watermark embedding. The block polarity is determined based on the nonzero quantized DC coefficient in each 4x4 integer DCT block. The block index is the pseudo-quantized block activity that is represented by the sum of magnitude of quantized AC coefficients. The watermark embedding is actually performed by the index modulation that will modify quantized AC coefficient values by a small amount to force the activity to be quantized into a specific region.
For resisting temporal attacks, such as frame dropping, frame insertion, and frame transposition, we also propose a temporal synchronization method for video watermarking by matching feature statistics. The feature statistics are calculated by local variances or eigenvalues in video content and sent as side information. Temporal attacks can be detected by comparing side information and feature statistics that be calculated from the received video.
Simulation results show that the proposed method performs well and extract embedded watermark without the original video signal. Additionally, the algorithm is not very complex and appropriate for real-time applications. Based on the extracted feature statistics, the video watermarking system is more robustness against temporal attacks.
關鍵字(中) ★ 序號調變
★ 視訊浮水印
★ 區塊極性
★ 時軸同步
★ H.264
關鍵字(英) ★ temporal synchronization.
★ index modulation
★ block polarity
★ video watermark
★ H.264
論文目次 目錄
摘 要 I
Abstract II
目錄 III
圖目 VI
表目 IX
第一章 序論 1
1.1 研究動機與目的 1
1.2 數位浮水印概論 4
1.2.1 數位浮水印之應用 8
1.2.2 數位浮水印同步簡介 10
1.3 論文架構 12
第二章 視訊浮水印的發展 13
2.1 視訊浮水印之功能需求 13
2.2 視訊浮水印技術回顧 17
2.3 同步攻擊及同步技術發展 19
2.3.1 同步攻擊 20
2.3.2 同步技術發展 22
2.4 H.264視訊壓縮標準簡介 25
2.4.1 整體壓縮效能改進情形 26
2.4.2 H.264架構介紹 27
2.4.3 網路提取層 28
2.4.4 視訊編碼層 29
第三章 H.264序號調變視訊浮水印系統 41
3.1 系統嵌入架構 41
3.2 數位浮水印嵌入演算法 44
3.2.1 決定區塊極性 (Block Polarity Decision) 45
3.2.2 區塊序號調變(Block Activity Index Modulation) 46
3.3 數位浮水印萃取演算法 50
第四章 特徵統計之時軸同步機制 51
4.1 系統架構 51
4.2 同步訊號產生 53
4.2.1 局部變異量統計 53
4.2.2 固有值統計 55
4.3 同步訊號偵測 59
第五章 實驗結果與討論 61
5.1 實驗參數環境 61
5.2 H.264視訊浮水印分析 63
5.2.1 浮水印透明度 63
5.2.2 浮水印強韌度 67
5.3 時軸同步測試 76
第六章 81
參考文獻 82
參考文獻 參考文獻
[1]T. Wiegand, G. J. Sullian, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC Video Coding Standard,” IEEE Trans. Circuits System Video Technology, vol. 13, pp. 560-576, July 2003.
[2]“Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264/ISO/IEC 14486-10 AVC”, in Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVT-G050, 2003
[3]Multimedia Messaging Service(MMS); Media Formats and Codecs, 3GPP Technical Specification 3GPP TS 26.140, Dec. 2002.
[4]T. Kimura and K. Asai, “Technologies for Image Applications on Mobile Phone,” Information Technology R&D Center. Mitsubishi Electric Advance TECHNICAL REPORTS, vol. 11, pp.11-14, Jun. 2005.
[5]T. Stockhammer, M. Hannuksela, and T. Wiegand, “H.264/AVC in Wireless Environments,” IEEE Trans. Circuits System Video Technology, vol.13, pp. 657-673, July 2003.
[6]S. Wenger, “H.264/AVC over IP,” IEEE Trans. Circuits System Video Technology, vol. 13, pp. 645-656, July 2003.
[7]T. T. Lu and P. C. Chang, “ Selective Weighting on Wavelet Coefficients for Blind Image Watermarking System,” SPIE Conf. Optics & Photonics 2005 Symposium, vol. 5915, pp. 201-208, San Diego, CA., 2005.
[8]C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithms and applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001.
[9]G. Dorr and J. L. Dugelay, “A guide tour of video watermarking,” Signal Process. Image Commun., vol. 18, no. 4, pp. 263-282, Apr. 2003.
[10]Y. Bodo, N. Laurent, C. Laurent, and J. L. Dugelay, “Video waterscrambling: towards a video protection scheme based on the disturbance of motion vectors,” EURASIP Journal of Applied Signal Processing special issue : Multimedia Security and Rights Management, vol. 2004, issue 14, pp. 2224-2237, Oct. 2004.
[11]J. Lee and C. S. Won, “Authentication and correction of digital watermarking images,” Electronics Letters, vol. 35, no. 11, pp. 886-887, May 1999.
[12]M. Barni, F. Bartolini, R. Caldelli, V. Cappellini, A. D. Rosa, and A. Piva, “Robust frame-based watermarking for digital video,” 12th International Workshop on Database and Expert Systems Applications, pp. 825-829, 2001.
[13]J. Huang and Y. Q. Shi, “Adaptive image watermarking scheme based on visual masking,” Electronics Letters, vol. 34, no. 8, pp. 748-750, April 1998.
[14]Z. H. Wei, P. Qin and Y. Q. Fu, “Perceptual digital watermark of images using Wavelet transform,” IEEE Transactions on Consumer Electronics, vol. 44, no. 4, pp. 1267-1272, Nov. 1998.
[15]C. T. Hsu and J. L. Wu, “DCT-based watermarking for video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998.
[16]R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks for digital images and video,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1108 -1126, July 1999.
[17]I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673 -1687, Dec. 1997.
[18]F. Hartung and B. Girod, “Digital watermarking of uncompressed and uncompressed video,” Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
[19]I. J. Cox, M. Miller, and J. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, Los Altos, CA, 2001 ISBN 1-55860-714-5
[20]E. T. Lin and E. J. Delp, “Temporal Synchronization in Video Watermarking,” Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents IV, vol. 4675, San Jose, CA, pp.478-490, Jan. 2002.
[21]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks on copyright marking systems,” in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, pp. 218-238, 1998.
[22]Stirmark Benchmark 4.0 is available on http://www.petitcolas.net/fabien/watermarking/stirmark/
[23]S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet and T. Pun, “Second generation benchmarking and application oriented evaluation,” in Information Hiding Workshop III, Pittsburgh, PA, USA, Apr. 2001.
[24]Official Optimark Page: http://poseidon.csd.auth.gr/optimark/
[25]S. J. Weng, T. T. Lu, and P. C. Chang, “Key-based video watermarking system on MPEG-2,” in SPIE Conf. Electronic Imaging 2003, vol. 5020, pp. 516-525, Santa Clara, CA, Jan. 2003.
[26]Y. Dai, L. Zhang, and Y. Yang, “A new method of MPEG video watermarking technology,” International Conference on Communication Technology Proceedings, ICCT 2003, vol. 2, pp. 1845-1847, Apr. 2003.
[27]B. G. Mobasseri and M. P. Marcinak, “Watermarking of MPEG-2 video in compressed domain using VLC mapping,” Proceedings of the 7th workshop on Multimedia and security, pp. 91-94, Aug. 2005.
[28]M. Noorkami, and R. M. Mersereau, “Compressed-Domain Video Watermarking for H.264,” IEEE International Conference on Image Processing, ICIP, vol. 2, pp. 890-893, Sept. 2005.
[29]G. Qiu, P. Marzilian, A. T. S. Ho, D. He, and Q. Sun, “A Hybrid Watermarking Scheme for H.264 Video,” Proceedings of the 17th International Conference on Pattern Recognition, ICPR, vol. 4, pp. 865-868, Aug. 2004.
[30]K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility for Collusion-resistant Digital Video Watermarking,” IEEE Transactions on Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2005.
[31]P. Bas, J. M. Chassery, and B. Macq, “Geometrically Invariant Watermarking Using Feature Points,” IEEE Trans. On Image Processing, vol. 11, no. 9, pp. 1014-1028, Sep. 2002.
[32]E. T. Lin, and E. J. Delp, “Temporal Synchronization in Video Watermarking,” IEEE Transactions on Signal Processing, vol. 52, pp. 3007-3022, Oct. 2004.
[33]J. Wang, and J. C. L. Liu, “Content-Based Block Watermarking Against Cumulative and Temporal Attack,” IEEE International Conference on Multimedia and Expo, ICME, pp. 77-80, Jul. 2005.
[34]S.W. Sun, and P.C. Chang, “Video Watermarking Synchronization Based on Profile Statistics,” IEEE Aerospace and Electronic Systems Magazine, vol.19, no. 5, pp. 21-25, May 2004.
[35]I. E. G. Richardson, H.264 and MPEG-4 Video Compression: Video Coding for Next-generation Multimedia, John Wiley & Sons Ltd Publishers, 2003, ISBN 0-470-84837-5.
[36]T. T. Lu, W. L. Hsu, and P. C. Chang, “Blind Video Watermarking for H.264,” in Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2006), pp. 2318-2321, Ottawa, Canada, May 2006.
[37]K. W. Liang, T. T. Lu, and P. C. Chang, “Image Authentication System based on Eigenvalue Decomposition,” in Proc. IPPR Conf. on CVGIP 2005, pp. 1331-1336, Taipei, Taiwan, Aug. 2005.
指導教授 張寶基(Pao-Chi Chang) 審核日期 2006-7-17
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明