博碩士論文 945202076 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:9 、訪客IP:3.231.228.109
姓名 李明倫(Ming-lun Li)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 應用於H.264/AVC視訊內容認證之適應式數位浮水印
(Content-Adaptive Digital Watermarking in H.264/AVC for Video Authentication)
相關論文
★ 基於QT之跨平台無線心率分析系統實現★ 網路電話之額外訊息傳輸機制
★ 針對與運動比賽精彩畫面相關串場效果之偵測★ 植基於向量量化之視訊/影像內容驗證技術
★ 植基於串場效果偵測與內容分析之棒球比賽精華擷取系統★ 以視覺特徵擷取為基礎之影像視訊內容認證技術
★ 使用動態背景補償以偵測與追蹤移動監控畫面之前景物★ 棒球比賽精華片段擷取分類系統
★ 利用H.264/AVC特徵之多攝影機即時追蹤系統★ 利用隱式型態模式之高速公路前車偵測機制
★ 基於時間域與空間域特徵擷取之影片複製偵測機制★ 結合數位浮水印與興趣區域位元率控制之車行視訊編碼
★ 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制★ 基於文字與主播偵測之新聞視訊分析系統
★ 植基於數位浮水印之H.264/AVC視訊內容驗證機制★ 利用隱式型態模式之自適應車行監控畫面分析系統
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 由於數位技術的進步,傳統的類比資料轉為數位格式儲存,不論是收藏或是攜帶都更為便利;網際網路的發達,也促進了數位資料的普及;此外,多媒體編碼技術的進步,數位資料所需的容量越來越小,對於上述的網路傳輸與儲存也變得更為方便。
然而,數位資料所遇到的問題也接踵而來。由於數位資料易於複製的特性,使用者可以輕易的對其複製散播,使得創作者的智慧財產權受損。更甚者,利用偽造、變更、剪接等方式,對其內容更改,破壞原先內容的含義,進而做為己用。以監視系統為例,數位監視影像因為內容易於更改的特性,大幅降低了影像的公信力與可靠性。因此,我們提出了一個完善的數位浮水印機制,對於數位影像的內容加以驗證,由萃取出的浮水印,可判斷數位影像內容是否遭受竄改、加入畫面、移除畫面或是畫面調換等剪輯攻擊。
我們以區塊DC值做為畫面之特徵,利用畫面內容分析的方式,判斷畫面場景切換以及影像雜湊值,再由場景內之畫面內容與單一畫面的雜湊值做為浮水印序列的生成參數,利用人類視覺模組依據畫面適應性地調整浮水印能量,在不破壞畫面品質下,盡可能地增強浮水印的強健性。
利用我們所提出的浮水印方法,嵌入的浮水印將顯示影像畫面或片段的順序,因此任何企圖更改影像片段順序或是以刪除或插入畫面來改變視訊內容的攻擊都將被偵測出來。此外,本研究方法不但能在維持原始影像品質下,對影像內容做有效的驗證,還能夠抵抗重新壓縮等攻擊。我們相信本研究所提出之H.264/AVC視訊壓縮與數位浮水印整合機制,將對建立更完美的多媒體資訊架構作出貢獻。
摘要(英) Digital contents have become increasingly popular nowadays due to their convenience of transferring and storage. In addition, the rapid growth of broadband networks and advanced coding technologies make creation and distribution of digital contents much easier and faster than ever. However, digital contents can be easily modified and the malicious tampering of data may change the meaning of contents. In this research, we propose a digital watermarking scheme under the framework of H.264/AVC. The watermark is embedded into video frames to ensure the correct frame order. Such attacks as frame dropping, swapping or insertion can be reflected from the unambiguous watermark detection.
We use DC values of blocks as the features of the image, which can help determine whether a shot change occurs. The image hash value is calculated by content analysis and used to generate the watermark sequence. The watermarking scheme uses a human perceptual model to adjust the watermark energy so that the watermark robustness can be enhanced without degrading the visual quality.
By integrating the watermarking approach with H.264/AVC, we can make the watermark embedding/detection be done in a very efficient manner. The content-analysis mechanism not only makes the watermark imperceptible but simplifies the watermark detection process. The experimental results show that the embedded watermark can survive transcoding processes such as changing quality parameters or the coding structure. Besides, the frame modification attacks will be revealed by the successful watermark extraction.
關鍵字(中) ★ 視訊浮水印
★ H.264/AVC
★ 影像內容分析
★ 人類視覺模組
關鍵字(英) ★ video watermarking
★ Human Visual Model
★ image content analysis
★ H.264/AVC
論文目次 第一章 緒論 1
1-1 研究目的與動機 1
1-2 論文架構 3
第二章 相關技術探討 4
2-1 數位浮水印之相關簡介 4
2-1-1 數位浮水印的需求與應用 6
2-1-2 視訊浮水印簡介 9
2-2 H.264/AVC視訊編碼標準簡介 11
2-2-1 H.264/AVC編解碼流程 12
2-2-2 H.264/AVC關鍵技術 15
第三章 數位浮水印架構 16
3-1 浮水印嵌入與偵測 16
3-1-1 以人類視覺模組提升浮水印嵌入品質 17
3-1-2 畫面DC圖生成 20
3-2 視訊浮水印嵌入流程 22
3-2-1 浮水印序列生成 24
3-2-2 視訊浮水印嵌入步驟 29
3-3 視訊浮水印偵測與驗證流程 30
3-3-1 畫面DC圖重建 30
3-3-2 浮水印序列重建 31
3-3-3 視訊浮水印偵測 31
3-3-4 視訊浮水印偵測步驟 31
3-4 利用浮水印對視訊畫面之驗證 32
第四章 實驗結果 37
4-1 實驗環境參數 37
4-2 嵌入浮水印之影像品質評估 37
4-3 浮水印偵測結果 39
4-4 利用影像重新編碼之攻擊 40
第五章 結論與未來工作展望 43
第六章 參考文獻 44
參考文獻 [1]J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying,” in Proc. Infocom’94, pp. 1278–1287
[2] L. F. Turner, “Digital data security system,” Patent IPN WO 89/08915, 1989.
[3] M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. IEEE ICIP, vol. I, Santa Barbara, CA, Oct. 1997, pp. 680–683.
[4] M. Schneider and S. F. Chang, “A robust content based digital signature for image authentication,” in Proc. IEEE ICIP, vol. III, Lausanne, Switzerland, Sept. 1996, pp. 227–230.
[5] E. T. Lin, c. I. Podilchuk and E. J. Delp, “Detection of image alterations using semi-fragile watermarks,” Proc. of the SPIE Int. Con. on Security and Watermarking of Multimedia Contents II, Vol. 3971, 2000.
[6] K. 1. Hashida and A. Shiozaki, “A method of embedding robust watermarks into digital color images”, IElCE Trans. Fundamentals, Vol. E81-, NO. IO, pp. 2133-3237, 1998
[7] I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. on Image Processing, pp. 1673-1687, 1997.
[8] C.S. Lu, S.K. Huang, C.J. Sze, and H.Y.M. Liao., “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, pp.209-224, Dec. 2000.
[9] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., vol. 66, no. 3, pp. 283–301, May 1998.
[10] T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A video watermarking system for broadcast monitoring,” in Proc. SPIE—SecurityWatermarking Multimedia Contents, vol. 3657, pp. 103–112 , 1999
[11] F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun., vol. 2952, Oct. 1996, pp. 205–213.
[12] M. Swanson, B. Zhu, and A. Tewfik, “Multiresolution video watermarking using perceptual models and scene segmentation,” in Proc. IEEE Int. Conf. Image Processing 1997 (ICIP ’97), vol.2, Santa Barbara, CA, Oct. 1997, pp. 558–561.
[13] Eckhard Koch and Jian Zhao, “Towards robust and hidden image copyright labeling,” in IEEE international Workshop on Nonlinear Signal and Image Processing, pp.452-455, Marmaras, Greece, Jun. 1995.
[14] F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun., vol. 2952, Oct. 1996, pp. 205–213.
[15] F. Hartung and B. Girod, “Fast public-key watermarking of compressed video,” in Proc. IEEE Int. Conf. on Image Processing 1997 (ICIP ’97), vol. 1, Santa Barbara, CA, Oct. 1997, pp. 528–531.
[16] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, no. 3, pp. 283–301, May 1998.
[17] F. Hartung, J. K. Su, and B. Girod, “Spread spectrum watermarking: Malicious attacks and counterattacks,” in Proc. SPIE Security and Watermarking of Multimedia Contents 99, San Jose, CA, Jan. 1999.
[18] F. Jordan, M. Kutter, and T. Ebrahimi, “Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video,” ISO/IEC Doc. JTC1/SC29/WG11 MPEG97/M2281, July 1997.
[19] A. M. Alattar, E. T. Lin, and M. U. Celik, "Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video," IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp. 787-800, August 2003.
[20] Noorkami, Maneli; Mersereau, Russell M. “Towards robust compressed-domain video watermarking for H.264” Security, Steganography, and Watermarking of Multimedia Contents VIII. Edited by Delp, Edward J., III; Wong, Ping Wah. Proceedings of the SPIE, Volume 6072, pp. 489-497 (2006).Feb 2006.
[21] Ingemar J. Cox Matthew L. Miller Jeffery A. Bloom; DIGITAL WATERMARKING, p215-p218.
[22] G. Qiu, P. Marziliano, A. T. Ho, D. He, and Q. Sun, “A hybrid watermarking scheme for H.264/AVC video,” in Proceedings of the 17th International Conference on Pattern Recognition, 4, pp. 865–868, Aug. 2004.
[23] M. Noorkami and R. M. Mersereau, “Compressed-domain video watermarking for H.264,” in Proceedings of International Conference on Image Processing (ICIP),Genoa,Italy, Sep. 2005.
[24] G.-Z. Wu and Y.-J. Wang, “Robust watermark embedding/detection algorithm for H.264,” Journal of Electronic Imaging 14, Jan. 2005.
[25] A. B. Watson, “Perceptual optimization of DCT color quantization matrices,” in Proc. IEEE Int. Conf. Image Processing, Austin, TX, 1994.
指導教授 蘇柏齊(Po-chyi Su) 審核日期 2007-7-20
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明