博碩士論文 101522115 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:7 、訪客IP:3.231.228.109
姓名 林瑜綸(Yu-lun Lin)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 網路電話之額外訊息傳輸機制
(A Novel Data Transmission Scheme on Voice over Internet Protocol)
相關論文
★ 基於QT之跨平台無線心率分析系統實現★ 針對與運動比賽精彩畫面相關串場效果之偵測
★ 植基於向量量化之視訊/影像內容驗證技術★ 植基於串場效果偵測與內容分析之棒球比賽精華擷取系統
★ 以視覺特徵擷取為基礎之影像視訊內容認證技術★ 使用動態背景補償以偵測與追蹤移動監控畫面之前景物
★ 應用於H.264/AVC視訊內容認證之適應式數位浮水印★ 棒球比賽精華片段擷取分類系統
★ 利用H.264/AVC特徵之多攝影機即時追蹤系統★ 利用隱式型態模式之高速公路前車偵測機制
★ 基於時間域與空間域特徵擷取之影片複製偵測機制★ 結合數位浮水印與興趣區域位元率控制之車行視訊編碼
★ 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制★ 基於文字與主播偵測之新聞視訊分析系統
★ 植基於數位浮水印之H.264/AVC視訊內容驗證機制★ 利用隱式型態模式之自適應車行監控畫面分析系統
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 在資訊數位化與網路化的趨勢下,以網際網路傳遞訊息已非常普及。傳統方法採用加解密技術保護訊息,將明文資料轉換為無法識別的亂碼,僅讓擁有解碼金鑰的接收者可正確解讀資訊,因而確保了資料的安全性。然而,在資料傳遞的過程中仍有可能被截獲並且破譯。另外,傳輸加密資料在某些場合中是不被允許的,或是對於訊息的加密反而招致竊聽者或攻擊者的興趣。因此,如何加強資料傳遞的隱蔽性以確保訊息安全是項重要的議題。
本論文中提出在網路電話Voice over Internet Protocol (VoIP) 系統上的額外訊息傳輸機制。我們利用H.264/AVC視訊來達成有效的資料傳輸,另外記錄並告知接收端每單位資料量所需要的編碼宏塊數,讓接收者可檢視封包宏塊開始位置與前個封包的結束位置來判斷是否發生封包遺失以利重新傳遞。這些關於訊息大小與單位資料量所需宏塊數資訊將以G.729音訊封包傳送,同時減低了視訊處理的工作量。實驗結果將顯示本機制的實用性。
摘要(英) With the rapid growth of networking technologies and digital data, content transmission on the Internet has become a common operation. Traditionally, we encrypt the data to make them unreadable so that only the recipient who owns the decryption key can read the data successfully. Nevertheless, it is still possible that the eavesdropper may still intercept the data for further analysis. Besides, the application of cryptography in certain occasions may not be allowed. The encrypted data may even arouse the interest from the eavesdroppers. Therefore, how to transmit the data in a more secured way has been an important research issue.
In this research, an additional data transmission scheme in Voice over Internet Protocol (VoIP) is designed. The H.264/AVC bit-stream is responsible for transmission the major data. The file size and the number of macroblocks for embedding a data unit are carried in G.729. By signaling the start and the end of macroblocks in H.264/AVC for embedding a data unit, we can know whether the packet lost has occurred and the retransmission can be applied. The experimental results will show the feasibility of the proposed method.
關鍵字(中) ★ VoIP
★ H.264/AVC
★ G.729
關鍵字(英) ★ VoIP
★ H.264/AVC
★ G.729
論文目次 中文摘要 i
Abstract ii
誌謝 iii
目錄 iv
附圖目錄 vi
表格目錄 viii
第一章 緒論 1
1.1 研究動機與目的 1
1.2 研究貢獻 2
1.3 論文架構 3
第二章 相關研究與文獻回顧 4
2.1 VoIP技術架構簡介 4
2.1.1 SIP通訊協定 4
2.1.2 SIP元件 4
2.1.3 利用Asterisk建立VoIP環境 6
2.1.4 利用Linphone做為IP語音電話 7
2.2 H.264之預測編碼模式 8
2.2.1 Intra預測編碼 8
2.2.2 Intra預測編碼 10
2.2.3 冗餘係數編碼 11
2.3 G.729編碼標準介紹 12
2.3.1 L0 L1 L2 L3參數簡介 12
2.3.2 P1 P2參數簡介 13
2.3.3 C1 C2 S1 S2參數簡介 13
2.3.4 GA GB參數簡介 14
2.4 相關研究 14
第三章 提出之方法 17
3.1 基本介紹 17
3.2 視訊資料嵌入 17
3.3.1 嵌入位置 18
3.3.2 資料隱藏演算法 19
3.3 音訊資料嵌入 20
3.3.1 傳送端的嵌入 21
3.3.2 接收段的取出 22
3.4 VoIP資料傳輸機制 23
3.4.1 單位資料與單位資料宏塊數 23
3.3.2 音訊封包組 24
3.3.3 音訊封包標籤 25
3.3.4 傳送者音訊封包的嵌入 26
3.3.5 接收者音訊封包的嵌入 27
3.3.6 視訊資料暫存器 28
第四章 實驗結果 32
4.1 實驗環境參數及視訊格式 32
4.2 資料單位比較 32
4.3 有線網路及無線網路的影響 34
4.4 傳輸距離的影響 35
第五章 結論與未來方向 37
參考文獻 38
參考文獻 [1]Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker “Digital Watermarking and Steganography,” Morgan Kaufmann Publishers Inc. San Francisco, CA, USA ©2008.
[2]Dawen Xu, Rangding Wang, Yun Q. Shi, “An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,” Journal of Visual Communication and Image Representation Volume 25, Issue 2, February 2014
[3]Y. Li, H.-X. Chen, and Y. Zhao, “A new method of data hiding based on H.264 encoded video sequences,” in Proc. IEEE Int. Conf. Signal Processing, ICSP, Oct. 2010, pp. 1833–1836
[4]SU-WAN PARK AND SANG UK SHIN, “Authentication and Copyright Protection Scheme for H.264/AVC and SVC,” Department of Information Security Graduate School Pukyong National University Busan, 608-737, Korea
[5]M. Carli, M. Farais, E. D. Gelasca, R. Tedesco, and A. Neri, “Quality assessment using data hiding on perceptually important areas,” in Proc. IEEE Int. Conf. Image Processing, ICIP, Sep. 2005, pp. III-1200-3–III-1200-3
[6]S. Kapotas and A. Skodras, “A new data hiding scheme for scene change detection in H.264 encoded video sequences,” in Proc. IEEE Int. Conf. Multimedia Expo ICME, Jun. 2008, pp. 277–280.
[7]F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Communication, Vol. 2952, Los Angeles, CA, 1996, pp. 205–213.
[8]F. Hartung, B. Girod, “Watermarking of MPEG-2 encoded video without decoding and re-encoding,” in Proceedings Multimedia Computing and Networking (MMCN), San Jose, CA, 1997.
[9]V. Darmstaedter, J.-F. Delaigle, D. Nicholson, B. Macq, “A block based watermarking technique for MPEG-2 signals: Optimization and validation on real digital TV distribution links,” in Proc. European Conference Multimedia Applications, Services and Techniques, Berlin, Germany, 1998, pp. 190–206.
[10]J. Dittmann, M. Stabenau, R. Steinmetz, “Robust MPEG video watermarking technologies,” in Proc. ACM Multimedia, Bristol, U.K., 1998, pp. 71–80.
[11]T.-Y. Chung, M.-S. Hong, Y.-N. Oh, D.-H. Shin, S.-H. Park, “Digital watermarking for copyright protection of MPEG-2 compressed video,” IEEE Transaction on Consumer Electronics 44 (1998) 895–901.
[12]D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, M. G. Strintzis, “Compressed-domain video watermarking of MPEG streams,” in: IEEE Int. Conf. Multimedia and Expo., Vol. 1, 2002, pp. 569–572.
[13]G. C. Langelaar, R. L. Lagendijk, “Optimal differential energy watermarking of DCT encoded images and video,” IEEE Trans. on Image Processing 10 (1) (2001) 148–158.
[14]M. Barni, F. Bartolini, N. Checcacci, “Watermarking of MPEG-4 video objects,” IEEE Transactions on Multimedia 7 (1) (2005) 23–32.
[15]A. M. Alattar, E. T. Lin, and M. U. Celik, “Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video,” IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp. 787-800, August 2003.
[16]J. Zhang, A. Ho, G. Qiu, P. Marziliano, Robust video watermarking of H.264/AVC,” IEEE Transactions on Circuits and System-II: Express Briefs, Vol. 54, 2007, pp. 205–209.
[17]A. Mansouri, A. Aznaveh, F. Torkamani-Azar, F. Kurugollu, “A low complexity video watermarking in H.264 compressed domain,” IEEE Transactions on Information Forensics and Security 5 (2010) 649– 657.
[18]M. Yang, N. Bourbakis, “A high bitrate information hiding algorithm for digital video content under H.264/AVC compression,” IEEE Int. Sym. On Circuits and Systems, Vol. 2, 2005, pp. 935–938.
[19]Ersin Esen and A. Aydin Alatan, “Robust video data hiding using forbidden zone data hiding and selective embedding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 21, no. 8, Aug. 2011 pp.1130-1138,
[20]G. Qiu, P. Marziliano, A. Ho, D. He, Q. Sun, “A hybrid watermarking scheme for H.264/AVC video,” Proceedings of the 17th International Conference on Pattern Recognition, ICPR, Vol. 4, 2004, pp. 865–868.
[21]M. Noorkami, R. M. Mersereau, “Compressed-domain video watermarking for H.264,” Proceedings of the International Conference on Image Processing, ICIP, Vol. 2, 2005, pp. 890–893.
[22]G.-Z. Wu, Y.-J. Wang, W.-H. Hsu, “Data Hiding Techniques for G.729 and MELP Speech Coding” Master’s thesis, National Central University, 2002
[23]Maneli Noorkami, Russell M.Mersereau, “Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase”
指導教授 蘇柏齊 審核日期 2014-8-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明