博碩士論文 945202064 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:8 、訪客IP:18.117.196.217
姓名 張鴻閔(Hong-min Chang)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 以視覺特徵擷取為基礎之影像視訊內容認證技術
(Robust Visual Feature Extraction for Image/Video Content Authentication)
相關論文
★ 基於QT之跨平台無線心率分析系統實現★ 網路電話之額外訊息傳輸機制
★ 針對與運動比賽精彩畫面相關串場效果之偵測★ 植基於向量量化之視訊/影像內容驗證技術
★ 植基於串場效果偵測與內容分析之棒球比賽精華擷取系統★ 使用動態背景補償以偵測與追蹤移動監控畫面之前景物
★ 應用於H.264/AVC視訊內容認證之適應式數位浮水印★ 棒球比賽精華片段擷取分類系統
★ 利用H.264/AVC特徵之多攝影機即時追蹤系統★ 利用隱式型態模式之高速公路前車偵測機制
★ 基於時間域與空間域特徵擷取之影片複製偵測機制★ 結合數位浮水印與興趣區域位元率控制之車行視訊編碼
★ 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制★ 基於文字與主播偵測之新聞視訊分析系統
★ 植基於數位浮水印之H.264/AVC視訊內容驗證機制★ 利用隱式型態模式之自適應車行監控畫面分析系統
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 數位多媒體壓縮技術純熟與網路的快速發展使得數位化的影像、視訊等多媒體資料兼顧高品質與體積小,並且對於多媒體的發佈變也便的容易許多。由於數位多媒體資料易於編輯與複製的特性,使得數位化的資料易受竄改,使得多媒體資料的真實性(autnetity)與完整性(intergrity)受到質疑。多媒體的驗證主要目的為了確保數位多媒體資料的完整性與真實性避免受到竄改。在本篇論文中,提出一個以數位簽章為基礎的強健的影像/視訊驗證系統。主要透過量化編碼的方式取得區塊內容特徵的擷取形成驗證碼,再經由壓縮加密隨著影像/視訊傳送或儲存。對於惡意的竄改發出警告,其利用畫面資訊的區域性標示出竄改區塊;而對於影像/視訊的有損壓縮,像是JPEG、H.264/AVC等類型的合法操作,均能夠通過我們的驗證系統。更提出在H.264/AVC的監視系統下的改良方法,使我們系統產生的驗證碼長度小與提升驗證的效率,且不會影響驗證的準確率。
摘要(英) The creation and distribution of digital contents have become increasingly convenient these days thanks to the rapid growth of digital signal processing techniques and broadband networking infrastructure. Editing digital images/videos, which was thought to be only achievable by professionals, can now be done with inexpensive and widely available software and hardware. A content authentication scheme for digital images and videos is proposed in this research. In order to avoid the content from being unnoticeably tampered by using digital editing facilities, reliable visual features are extracted as the authentication code and transmitted along with the images and videos. The integrity of content in a picture or a frame can thus be guaranteed by comparing the similarity between the transmitted authentication code and the extracted feature. The features are sensitive to malicious modification of data but are resilient to allowed lossy compression. The receiver can calculate the similarity between the transmitted digest and the extracted one to determine if the content has been tampered. The tampered region can even be located to help identify the motivation of the attacker. Experimental results show the feasibility of the proposed algorithm.
關鍵字(中) ★ 特徵擷取
★ 內容認證
★ 視訊
★ 影像
關鍵字(英) ★ authentication
★ feature extraction
論文目次 第一章 緒論 1
1-1 研究目的與動機 1
1-2 論文架構 3
第二章 現存多媒體驗證系統 5
2-1 影像驗證技術的分類 5
2-2 以數位簽章為基礎的方法 6
2-3 以數位浮水印為基礎的方法 8
第三章 驗證系統架構 10
3-1 前置處理 11
3-2 量化編碼 12
3-2-1 數值量化編碼 12
3-2-2 基於奇異值分解的向量量化 13
3-2-2-1 向量間距離的計算 16
3-2-2-2 亮度區塊向量編碼 16
3-2-3 使用SVD做影像區塊分類 17
3-3 編碼簿設計與產生 19
3-4 驗證碼擷取 21
3-5 驗證流程 23
3-6 應用於H.264/AVC 29
3-6-1 H.264/AVC特徵碼編碼 29
3-6-2 H.264/AVC前置處理 30
第四章 實驗結果 33
4-1 有損壓縮 33
4-1-1 影像有損壓縮 33
4-1-2 對於H.264/AVC壓縮 34
4-1-3 驗證結果分析 35
4-2 驗證碼的大小 36
4-3 竄改偵測 37
4-3-1 對於影像畫面的竄改偵測 38
4-3-2 對於視訊畫面的竄改偵測 40
4-3-3 針對H.264/AVC壓縮的視訊的竄改 42
第五章 結論與未來工作 45
第六章 參考文獻 46
參考文獻 [01] F. Bartolini, A. Tefas, M. Barni, and I. Pitas, "Image authentication techniques for surveillance applications," Proceedings of the IEEE, vol.89, no.10, pp.1403-1418, Oct 2001
[02] C.Y. Lin and S.F Chang, ”Issues and solutions for authenticating MPEG video,” SPIE Security and Watermarking of Multimedia Contents, Jan. 1999
[03] W. Diffie, and M.E. Hellman, ”New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no.6, pp.644-654, 1976
[04] B.B. Zhu, M.D. Swanson, and A.H. Tewfik, "When seeing isn't believing [multimedia authentication technologies]," IEEE Signal Processing Magazine, vol.21, no.2, pp. 40-49, Mar 2004.
[05] G. Frideman, “The trustworthy digital camera: Restoring credibility to the photographic imageh,” in IEEE Transatctions on Consumer Electronics, vol. 39, pp. 905–910, Nov. 1993.
[06] C. Y. Lin and S. F. Chang, “Issues and solutions for authenticating MPEG video,” in Proc. SPIE Security and Watermarking of Multimedia Contents, Jan. 1999.
[07] C. Y. Lin and S. F. Chang, “Semi-fragile watermarking for authenticating JPEG visual content,” in Proc. SPIE International Conference Security and Watermarking of Multimedia Contents II, Jan. 2000
[08] A. Pramateftakis, T. Oelbaum, and K. Diepold, “Authentication of MPEG-4-based surveillance video,” in Proc. IEEE International Conference Image Processing (ICIP), vol. 1, pp. 33–37, Oct. 2004.
[09] Po-Chyi Su and Chun-Chieh Chen, “Image and Video Content Authentication by Using Vector Quantization,”CVGIP2006, August, 2006.
[10] R. C. Gonzalez and R. E. Woods, Digital Image Processing, Addison-Wesley, NY, 1992.
[11] S. Walton, “Information authentication for a slippery new age,” in Dr. Dobbs Journal, vol. 20, pp. 18–26, April. 1995
[12] P.Wong, “A public key watermark for image verification and authentication,” in Proc. IEEE International Conference Image Processing (ICIP), vol. 1, pp. 455–459, Oct. 1998.
[13] M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. IEEE International Conference Image Processing (ICIP), vol. 1, pp. 680–683, Oct. 1997.
[14] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic Publishers, USA, 1992.
[15] Abdi, H. “.Singular Value Decomposition and Generalized Singular Value Decomposition,” In N.J. Salkind: Encyclopedia of Measurement and Statistics. Thousand Oaks: Sage.,2007
[16] J.T. Tou and R.C. Gonzalez, “Pattern Recognition Principles ” Addison Wesley.
指導教授 蘇柏齊(Po-chyi Su) 審核日期 2007-7-19
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明