博碩士論文 985202040 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:43 、訪客IP:3.21.231.245
姓名 鄭雅欣(Ya-xin Zheng)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 使用於視訊散佈來源追蹤之壓縮域數位浮水印設計
(A Compressed Domain Digital Watermarking Scheme for Transaction Tracking in Video Distribution)
相關論文
★ 基於QT之跨平台無線心率分析系統實現★ 網路電話之額外訊息傳輸機制
★ 針對與運動比賽精彩畫面相關串場效果之偵測★ 植基於向量量化之視訊/影像內容驗證技術
★ 植基於串場效果偵測與內容分析之棒球比賽精華擷取系統★ 以視覺特徵擷取為基礎之影像視訊內容認證技術
★ 使用動態背景補償以偵測與追蹤移動監控畫面之前景物★ 應用於H.264/AVC視訊內容認證之適應式數位浮水印
★ 棒球比賽精華片段擷取分類系統★ 利用H.264/AVC特徵之多攝影機即時追蹤系統
★ 利用隱式型態模式之高速公路前車偵測機制★ 基於時間域與空間域特徵擷取之影片複製偵測機制
★ 結合數位浮水印與興趣區域位元率控制之車行視訊編碼★ 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制
★ 基於文字與主播偵測之新聞視訊分析系統★ 植基於數位浮水印之H.264/AVC視訊內容驗證機制
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 近年來由於網路的蓬勃發展與壓縮技術的進步,許多的多媒體檔案被任意的散佈或下載,數位智權管理變得日益重要,而數位浮水印技術可被用來追蹤這些多媒體資料的非法散佈者。在本論文中,我們選擇對MPEG-4視訊壓縮標準嵌入數位浮水印。為了減少將浮水印嵌入視訊所需耗費的時間,我們利用部分解碼來實作壓縮域浮水印,即在解碼端解碼出量化指標,加入預先準備好的嵌入資訊,再經由編碼端的可變長度編碼組成壓縮視訊。為了避免嵌入的訊號因視訊壓縮時的預測機制造成飄移錯誤(drift error),我們提出將訊號只嵌入每張畫面中的不被參考區塊。此外,由於我們使用盲檢測(blind detection)以符合實際應用及偵測的公正性,我們使用特定的SIFT(Scale Invariant Feature Transform)特徵點嵌入樣板以達成偵測的同步。實驗結果顯示,即使因只嵌入不被參考的區塊且經過量化讓嵌入的資訊量大幅減少,我們依然能夠於可能被攻擊的視訊中正確偵測浮水印,且具有一般數位浮水印所必須具備的基本特性。
摘要(英) Due to the prevalent uses of digital video technology and the internet, many authorized videos have been illegally copied, downloaded and distributed. The concerns over intellectual property right infringement of video content are thus raised. Digital fingerprinting is a means of tracking the users who distribute the copyrighted multimedia data to provide a convincing evidence for the litigation. In this thesis, a partially decoding fingerprinting scheme is proposed. The quantization indices of the compressed video are decoded and embedded with the fingerprint and then encoded into the fingerprinted video. The computationally expensive motion estimation can thus be avoided in this transcoding process. In order to avoid the drift errors, which result from the error propagations in the inter-coded frames, only the non-referenced blocks are used for fingerprinting. Since the blind detection is adopted in the proposed scheme, the synchronization templates are embedded and their embedding positions are determined according to SIFT feature points such that the synchronized detection of geometrically attacked video can be achieved. Experimental results show that, even though the fingerprints are only embedded in the non-referenced areas and the video may be geometrically attacked, the fingerprinting watermark can still be detected successfully.
關鍵字(中) ★ 視訊浮水印
★ SIFT
★ 飄移錯誤
★ 同步樣板
★ MPEG-4
關鍵字(英) ★ MPEG-4
★ video watermarking
★ SIFT
★ drift error
★ synchronization template
論文目次 目錄
摘要............................................................................................................. I
Abstract ......................................................................................................II
誌謝...........................................................................................................III
目錄.......................................................................................................... IV
圖目錄...................................................................................................... VI
表目錄....................................................................................................VIII
第一章緒論...............................................................................................1
1.1 研究動機與目的.......................................................................1
1.2 貢獻...........................................................................................2
1.3 論文架構 ...................................................................................4
第二章相關研究與文獻回顧..................................................................5
2.1 數位浮水印相關簡介...............................................................5
2.1.1 數位浮水印之應用......................................................5
2.1.2 用於追蹤之視訊浮水印需求......................................6
2.2 視訊浮水印相關發展...............................................................8
第三章提出之方法 ................................................................................11
3.1 基本架構.................................................................................11
3.1.1 以人類視覺模組調整浮水印嵌入品質....................12
3.1.2 幾何攻擊與同步問題................................................14
3.1.3 基本浮水印系統架構................................................16
3.2 壓縮域視訊浮水印嵌入.........................................................16
3.2.1 MPEG-4部分解碼.....................................................17
V
3.2.2 可嵌入區塊遮罩........................................................19
3.2.3 嵌入流程....................................................................21
3.2.4 浮水印嵌入................................................................23
3.3 同步樣板.................................................................................24
3.3.1 SIFT特徵點擷取.......................................................24
3.3.2 特定樣板嵌入位置....................................................30
3.3.3 樣板設計與嵌入........................................................31
3.4 視訊校正.................................................................................34
3.4.1 畫面旋轉及縮放校正................................................34
3.4.2 畫面定位....................................................................35
3.5 浮水印偵測.............................................................................36
第四章實驗結果 ....................................................................................39
4.1 實驗環境參數設定.................................................................39
4.2 浮水印透明度測試.................................................................40
4.3 浮水印強韌性測試.................................................................43
第五章結論與未來工作展望................................................................48
參考文獻...................................................................................................49
參考文獻 參考文獻
[1] T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A video watermarking system for broadcast monitoring,” in Proc. SPIE—Security Watermarking Multimedia Contents, vol. 3657, pp. 103–112 , 1999
[2] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video, ” Signal Processing, vol. 66, no. 3, pp. 283–301, May 1998.
[3] I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. on Image Processing, pp. 1673-1687, 1997.
[4] Eckhard Koch and Jian Zhao, “Towards robust and hidden image copyright labeling,” in IEEE international Workshop on Nonlinear Signal and Image Processing, pp.452-455, Marmaras, Greece, Jun. 1995.
[5] F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun., vol. 2952, Oct. 1996, pp. 205–213.
[6] F. Hartung and B. Girod, “Fast public-key watermarking of compressed video,” in Proc. IEEE Int. Conf. on Image Processing 1997 (ICIP ’97), vol. 1, Santa Barbara, CA, Oct. 1997, pp. 528–531.
[7] F. Hartung, J. K. Su, and B. Girod, “Spread spectrum watermarking: Malicious attacks and counterattacks,” in Proc. SPIE Security and Watermarking of Multimedia Contents 99, San Jose, CA, Jan. 1999.
[8] F. Jordan, M. Kutter, and T. Ebrahimi, “Proposal of a watermarking
50
technique for hiding/retrieving data in compressed and decompressed video,” ISO/IEC Doc. JTC1/SC29/WG11 MPEG97/M2281, July 1997.
[9] Wang, Y.L., Pearmain, A., “Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain,” IEEE Transactions on Image Processing , vol. 15, no. 6, pp. 1536–1543, 2006.
[10] Mansouri A, Aznaveh AM, Farah TA, Fatih K, “A low complexity video watermarking in H.264 compressed domain, ” IEEE Transactions on Information Forensics, vol. 5, no. 4, pp. 649–657, 2010.
[11] A. M. Alattar, E. T. Lin, and M. U. Celik, “Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video, ” IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp. 787-800, August 2003.
[12] M. Noorkami and R. M. Mersereau, “Compressed-domain video watermarking for H.264,” in Proceedings of International Conference on Image Processing (ICIP),Genoa,Italy, Sep. 2005.
[13] A. B. Watson, “Perceptual optimization of DCT color quantization matrices,” in Proc. IEEE Int. Conf. Image Processing, Austin, TX, 1994.
[14] A. B. Watson, “DCT quantization matrices visually optimized for individual images,” in Proc. SPIE, vol. 1913, pp. 202–216, 1993.
[15] A. J. Ahumada Jr. and H. A. Peterson. “Luminance-Model-Based DCT Quantization for Color Image Compression,” in Human Vision, Visual Processing, and Digital Display III, B. E. Rogowitz, ed. (Proceedings of the SPIE, 1992).
51
[16] P-C Su and C.-C. Jay Kuo, “Synchronized Detection of the Block-based Watermark with Invisible Grid Embedding”, Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, 4314, San Jose, CA, pp. 406-417, January 2001
[17] D. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints,” International journal of Computer Vision, vol. 20, pp. 91-110, 2003.
指導教授 蘇柏齊(Po-chyi Su) 審核日期 2011-8-24
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明