博碩士論文 90521078 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:38 、訪客IP:18.116.37.61
姓名 翁筱貞(Hsiao-Jen Weng)  查詢紙本館藏   畢業系所 電機工程學系
論文名稱 軟式萃取子區塊極性之金匙視訊浮水印系統
(Key-based Video Watermarking on MPEG-2)
相關論文
★ 運用G.729與G.723.1於多點會議系統之多聲道語音混合方法★ 寬頻網路之即時視訊品質控制系統
★ 多層漸進式零樹小波分頻音訊壓縮技術★ 資料隱藏技術應用於 H.263 視訊編碼之錯誤偵測
★ 無線傳輸及網際網路環境下之G.729與G.723.1語音傳輸★ 零樹小波視訊編碼之錯誤偵測與隱藏
★ 雜訊通道中視訊編碼防錯技術之研究★ 小波及離散餘弦域上使用子區塊分類之金匙數位影像浮水印系統
★ 資料隱藏應用於零樹小波分頻壓縮系統之音訊封包遺失回復技術★ IP網路之MPEG-4調適性視訊品質控制
★ 區塊重排於小波封包之階層式集合分割影像壓縮技術★ 動態調整緩衝區方法應用於網路延遲之VoIP語音品質改善
★ 語音編碼G.729及MELP之資料隱藏方法★ 金匙小波域音訊浮水印系統
★ 快速多階連續消除移動預估演算法應用於H.26L視訊編碼標準★ 視訊封包封裝與調適性自動重送於無線區域網路之研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在本篇論文中,我們提出軟式萃取子區塊極性之金匙視訊浮水印系統,此系統建構於MPEG-2上能同時完成浮水印嵌入與視訊壓縮。浮水印雖僅嵌入於I畫面,卻會經由移動預估編碼機制傳播到P與B畫面中,因此在萃取端提出兩種考慮視訊時間軸上相關性的權重計算方式,以之參考所有畫面資訊,視訊群組為單位軟式萃取子區塊極性來解得浮水印。
我們將浮水印嵌入在低頻離散餘弦係數。低頻係數首先合成子區塊,以區塊極性選出適合加入浮水印的區塊,區塊極性並且和浮水印進行Tri-state XOR(TXOR)的運算以產生金匙。金匙記錄浮水印嵌入的區塊位置,因此在萃取端能取代原始視訊訊號,與區塊極性進行TXOR運算即可解出浮水印。
實驗結果顯示此視訊浮水印系統具有良好的透明度,嵌入浮水印的畫面其PSNR值與未嵌入者相近,而萃取端參考所有種類畫面的資訊軟式萃取子區塊極性的確能夠提升浮水印的強韌性。
摘要(英) In this thesis, we propose a key-based video watermarking system in which the watermark embedding and the video encoding are processed at the same time on MPEG-2. Since the watermark information would propagate to P/B frames through the motion compensated coding, the watermark is embedded in a single I frame but can be extracted from all frames in the same group of pictures (GOP).
The watermark is embedded in the low frequency DCT coefficients based on the block polarity. The block polarity is operated with the watermark by Tri-state XOR to generate the secret key, which labels the block locations of the embedded watermark. In the decoding end, the key is operated with the block polarity by Tri-state XOR to get the extracted watermark from all kinds of frames. Finally, the watermark over a GOP can be calculated by a weighted voting procedure according to the frame types and the displacements of the pixels.
The simulation results show that the system has great imperceptibility that the PSNR of the watermarked frames are almost the same as the un-watermarked and more accurate normalized correlation (NC) can be obtained as well.
關鍵字(中) ★ 軟式萃取
★ 資料隱藏
★ 金匙浮水印
★ 視訊浮水印
關鍵字(英) ★ data hiding
★ video watermarking
★ soft decision
論文目次 摘要………………………………………………………………I
Abstract…………………………………………………………II
目錄………………………………………………………………III
圖目………………………………………………………………V
表目………………………………………………………………VII
第一章緒論..........................................1
1.1研究動機與目的...................................1
1.2 相關研究........................................4
1.3 論文架構........................................6
第二章視訊浮水印技術................................7
2.1數位浮水印之應用.................................7
2.2視訊浮水印之功能需求.............................9
2.3視訊浮水印技術之發展.............................12
2.4 MPEG-2視訊壓縮標準..............................14
2.4.1 基本編碼物件..................................14
2.4.2 編碼流程......................................16
2.4.3 解碼流程......................................21
第三章金匙視訊浮水印系統............................22
3.1 系統架構........................................22
3.2 視訊浮水印之嵌入................................24
3.2.1 隨機重排......................................25
3.2.2 子區塊合成....................................26
3.2.3 子區塊極性映射................................27
3.2.4 金匙之產生....................................29
3.2.5 禁區淨空......................................31
3.3 視訊浮水印之偵測................................32
3.3.1 子區塊極性投票................................33
3.3.2 浮水印萃取....................................36
3.3.3 浮水印相似度評估..............................37
3.3.4 權重之設計....................................37
第四章實驗結果與討論................................42
4.1 模擬環境........................................42
4.2 分析禁區的影響..................................44
4.2.1 禁區範圍與浮水印透明度........................44
4.2.2 禁區範圍與浮水印強韌性........................51
4.3 浮水印強韌性測試................................52
4.3.1 基本壓縮攻擊測試..............................53
4.3.2 子區塊極性投票分析............................53
第五章結論與未來展望................................60
參考文獻............................................61
參考文獻 [1] C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithms and applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001.
[2] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
[3] T.T. Lu, L.L. Lee and P.C. Chang, “A key-based image watermarking system using subblock composition in DCT domain,” Proc. Multimedia Technology and Applications Conference, pp. 157-163, Irvine, CA, Nov. 2001.
[4] J. Lee and C. S. Won, “Authentication and correction of digital watermarking images,” Electronics Letters, vol. 35, no. 11, pp. 886-887, May 1999.
[5] M. Barni, F. Bartolini, R. Caldelli, V. Cappellini, A. De Rosa, and A. Piva, “Robust frame-based watermarking for digital video,” 12th International Workshop on Database and Expert Systems Applications, pp. 825-829, 2001.
[6] J. Huang and Y. Q. Shi, “Adaptive image watermarking scheme based on visual masking,” Electronics Letters, vol. 34, no. 8, pp. 748-750, April 1998.
[7] Z. H. Wei, P. Qin and Y. Q. Fu, “Perceptual digital watermark of images using Wavelet transform,” IEEE Transactions on Consumer Electronics, vol. 44, no. 4, pp. 1267-1272, Nov. 1998.
[8] C. T. Hsu and J. L. Wu, “DCT-based watermarking for video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998.
[9] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks for digital images and video,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1108 -1126, July 1999.
[10] I. J. Cox, J. Kilian, F.T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673 -1687, Dec. 1997.
[11] F. Hartung and B. Girod, “Digital watermarking of uncompressed and uncompressed video,” Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
[12] S. G. Miaou and C. M. Chen, “A robust image watermarking technique based on Wavelet transform and human visual systems,” J. of Computers, Vol. 13, No. 1, pp. 21-31, March 2001.
[13] I. J. Cox, M. L. Miller and J.A. Bloom, Digital watermarking, Morgan Kaufmann, 2002.
[14] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers and J. K. Su, “Attacks on digital watermarks: classification, estimation based attacks, and benchmarks,” IEEE Communications Magazine, vol. 39, no. 8, pp. 118-126, Aug. 2001.
[15] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Attacks on copyright marking systems,” in David Aucsmith (Ed), Information Hiding, Second International Workshop, IH'98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219-239.
[16] Fabien A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Processing, vol. 17, no. 5, pp. 58–64, Sept. 2000.
[17] Stirmark Benchmark 4.0 is available on “http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/”
[18] S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet and T. Pun, “Second generation benchmarking and application oriented evaluation,” in Information Hiding Workshop III, Pittsburgh, PA, USA, April 2001.
[19] Official Optimark Page: http://poseidon.csd.auth.gr/optimark/
[20] S.W. Sun, T.T. Lu, and P.C. Chang, “Image watermarking synchronization by significant MSB plane matching,” Proc. Third IEEE Pacific Rim Conference on Multimedia 2002, pp. 468-476, Hsin-Chu, Taiwan, Dec. 2002.
[21] S.W. Sun and P.C. Chang, “Video Watermarking Synchronization Based on Profile Statistics,” to appear in IEEE Carnahan 2003, Taipei, Taiwan, Oct. 2003.
[22] E. T. Lin and E. J. Delp, “Temporal Synchronization in Video Watermarking,” Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents IV, vol. 4675, January 20-25, 2002, San Jose, CA.
[23] T. Y. Chung, M. S. Hong, Y. N. Oh, D. H. Shin and S. H. Park, “Digital watermarking for copyright protection of MPEG2 compressed video,” IEEE Transactions on Consumer Electronics, vol. 44, no.3, pp. 895-901, Aug. 1998.
[24] J. Zhang, H. Maitre, J. Li, and L. Zhang, “Embedding watermark in MPEG video sequence,” IEEE Fourth Workshop on Multimedia Signal Processing, pp. 535-540, 2001.
[25] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” Proceedings of XIV Brazilian Symposium on Computer Graphics and Image Processing, pp. 179-182, Oct. 2001.
[26] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-Time labeling of MPEG-2 compressed video,” Journal of Visual Communication and Image Representation, vol. 9, no. 4, pp. 256-270, 1998.
[27] ISO/IEC TTC1/SC29/WG11 13818-2 Information technology– Generic coding of moving pictures and associated audio information: video, 1995.
[28] C. S. Lu, J. R. Chen, H. Y. Mark Liao and K. C. Fan, “Real-Time MPEG2 Video Watermarking in the VLC Domain,” Proc. 16th IAPR Int. Conf. on Pattern Recognition, Quebec, Canada, Vol. II, August 11-15, 2002.
[29] P.C. Chang and T.H. Lee, “Precise and Fast Error Tracking for Error-Resilient Transmission of H.263 Video,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 10, No. 4, pp. 600-607, June 2000.
[30] T.H. Lee and P.C. Chang, “Error Robust H.263 Video Coding with Video Segment Regulation and Precise Error Tracking,” IEICE Trans. on Communications, vol. E84-B, no. 2, pp.317-324, Feb. 2001.
指導教授 張寶基(Pao-Chi Chang) 審核日期 2003-7-11
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明