以作者查詢圖書館館藏 、以作者查詢臺灣博碩士 、以作者查詢全國書目 、勘誤回報 、線上人數:33 、訪客IP:3.144.108.209
姓名 徐治瑋(Chih-Wei Hsu) 查詢紙本館藏 畢業系所 資訊工程學系 論文名稱 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制
(A Joint Selective Encryption and Digital Watermarking Scheme in H.264/AVC Videos for Digital Rights Management)相關論文 檔案 [Endnote RIS 格式] [Bibtex 格式] [相關文章] [文章引用] [完整記錄] [館藏目錄] [檢視] [下載]
- 本電子論文使用權限為同意立即開放。
- 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
- 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
摘要(中) H.264/AVC優異的編碼壓縮效能使其被廣泛地使用於網路視訊串流傳輸的各種應用。然而,網路與壓縮技術所帶來的方便性也讓未授權視訊更容易地被散播,數位影片的智權管理因此成為一項重要的議題。本論文針對H.264/AVC提出一個結合選擇性加密與低運算複雜度數位浮水印的智權管理機制。本機制利用選擇性加密,在儘量不影響影片大小的前提下,有效率地擾亂原來的視訊畫面,加密後的影片依然保有H.264/AVC的相容性,雖可被播放但有著凌亂的畫面。選擇性加密可以減少影片加解密時所需要的時間,也間接減少了電力上損耗。此外,本機制更在視訊壓縮與加密的過程中,抽換視訊串流中的一部分資料,並在此段資料中嵌入相對應使用者的個人資訊,在缺乏該段資料的情況下,視訊畫面將受到進一步的擾亂。使用者為了觀賞正確畫面必須另行下載此段資料,而在該資料與原先視訊串流結合的過程中,代表使用者的數位浮水印將被嵌入,以供日後追蹤之用,也就是當非法散播的H.264/AVC影片被發現後,可經由此訊息追溯下載使用者。此部份設計的目標在於如何減少額外資料的傳輸量,以及對於影片畫質的保障。實驗結果顯示本論文所提出的演算法能夠有效擾亂畫面,並且對於影片的壓縮率只有些微的影響,而視訊串流壓縮的時間則幾乎沒有增加,浮水印嵌入演算法亦不影響視訊畫質。
摘要(英) H.264/AVC is expected to be widely used in streaming applications due to its decent coding performance. Many commercial and surveillance systems will employ H.264/AVC to facilitate the transmission and archiving of video content. However, the convenience of distributing digital videos may also raise certain concerns from content providers and owners so the issues of Digital Rights Management (DRM) of videos become critical these days. In this research, we propose a joint encryption and digital watermarking scheme in H.264/AVC compressed videos. We first present a novel selective encryption scheme under the framework of this state-of-the-art video codec. The main idea is to not only make the encrypted video useless for anyone who does not own the correct key for decryption but also keep the compatibility of H.264/AVC syntax so that the complexity of decoding can be reduced. In other words, the video frame can be extracted for viewing but is scrambled to conceal its intelligibility. The ideas of partial encryption lead to more efficient power management. In addition, we also present a low complexity fingerprinting algorithm by using the techniques of digital watermarking for encrypted videos. The information of target user can be embedded for the purposes of trailer tracking. Experimental results demonstrate that the proposed scheme effectively scramble the video frame content and bring a negligible impact on the coding performance. Moreover, the coding complexity is almost not affected. The proposed fingerprinting algorithm can embed a reasonable amount of information into the compressed bit-stream without degrading the video quality.
關鍵字(中) ★ 數位浮水印
★ 智權管理
★ H.264/AVC
★ 部分加密
★ 選擇性加密關鍵字(英) ★ Selective Encryption
★ Partial Encryption
★ Digital Watermark
★ H.264/AVC
★ Digital Rights Management論文目次 Chapter 1 Introduction 1
1.1 Motivation 1
1.2 Contribution 2
Chapter 2 Preliminaries 5
2.1 Review of H.264/AVC Standard 5
2.1.1 Structure of H.264/AVC Standard 6
2.1.2 Intra Prediction 6
2.1.3 Inter Prediction 11
2.1.4 Entropy Coding 15
2.2 Review of the Related Works 19
2.2.1 Selective Encryption 19
2.2.2 Digital Watermarking 21
Chapter 3 The Proposed Encryption Scheme 23
3.1 Overview of The Proposed Encryption and Decryption Scheme 23
3.2 Analysis of Previous Encryption Methods 25
3.2.1 Intra Prediction Modes (IPMs) Encryption 25
3.2.2 Motion Vector Difference (MVDs) Encryption 28
3.3 Improved Residue Encryption 29
3.4 The Proposed Combination of Encryption Methods 31
Chapter 4 The Proposed Watermarking Scheme 39
4.1 Overview of The Proposed Watermarking Scheme 39
4.2 Data Selection for Effective Digital Watermarking 42
4.3 Analysis of The Payload 45
Chapter 5 Experimental Results 52
5.1 Selective Encryption 52
5.2 Digital Watermarking 57
Chapter 6 Conclusion and Future Work 62
Reference 64
參考文獻 [1] Shiguo Lian, Zhongxuan Liu, Zhen Ren, and Haila Wang. Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology, 17, no. 6:774–778, Jun. 2007.
[2] T.Wiegand, G. J. Sullivan adn G. Bjontegaard, and A. Luthra. Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology, 13:560–576, Jul. 2003.
[3] Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG. Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264 — ISO/IEC 14496-10 AVC). ITU-T, Doc. JVT-G050r1, Mar. 2003.
[4] Iain. E. G. Richardson. H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia. Chichester, UK: John Wiley & Sons, 2003.
[5] Iain E. G. Richardson. Video Codec Design: Developing Image and Video Compression Systems. John Wiley & Sons, Apr. 2002.
[6] K. K. Parhi and T. Nishitani (eds). Digital Signal Processing for Multimedia Systems. Marcel Dekker, Inc., 1999.
[7] F. Pereira and T. Ebrahimi (eds). The MPEG-4 Book, IMSC Press. Prentice Hall PTR, Jul. 2002.
[8] P.G. Howard and J.S. Vitter. Arithmetic coding for data compression. IEEE Proceedings, 82:857–865, Jun. 1994.
[9] D. Marpe, G. Blattermann, G. Heising, and T. Wiegand. Video compression using context-based adaptive arithmetic coding. IEEE International Conference on Image Processing, 3:558–561, 2001.
[10] JidongWang, Y. Fan, T. Ikenaga, and S. Goto. A partial scramble scheme for H.264 video. 22-25:802–805, Oct. 2007.
[11] Cai Mian, Jia Jia, and Yan Lei. An H.264 video encryption algorithm based on entropy coding. 2:41–44, Nov. 2007.
[12] S. Spinsante, F. Chiaraluce, and E. Gambi. Masking video information by partial encryption of H.264/AVC coding parameters.
[13] C. Bergeron and C. Lamy-Bergot. Compliant selective encryption for H.264/AVC video streams. pages 1–4, Nov. 2005.
[14] Jaejin Lee and Chee Sun Won. A watermarking sequence using parities of error control coding for image authentication and correction. IEEE Transactions on Consumer Electronics, 46:313–317, May 2000.
[15] Ping WahWong and N. Memon. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10:1593–1601, Oct. 2001.
[16] R. Z. Wang, C. F. Lin, and J. C. Lin. Image Hiding by Optimal LSB Substitution and Genetic Algorithm, volume 34. Pattern Recognition, Mar. 2001.
[17] J. Fridrich, M. Goljan, and Rui Du. Invertible authentication watermark for JPEG images. IEEE International Conference on Information Technology: Coding and Computing, pages 223–227, Apr. 2001.
[18] Min Wu and Bede Liu. Watermarking for image authentication. Proceedings of IEEE International Conference on Image Processing, 2:437–441, 1998.
[19] I. J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6:1673–1687, Dec. 1997.
[20] Jiwu Huang, Y.Q. Shi, and Yi Shi. Embedding image watermarks in DC components. IEEE Transactions on Circuits and Systems for Video Technology, 10:974–979, Sep. 2000.
[21] J.R. Hernandez, M. Amado, and F. Perez-Gonzalez. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9:55–68, Jan. 2000.
[22] B. Jeon J. Ahn, H. Shim and I. Choi. Digital video scrambling method using intra prediction mode. LNCS, 3333:386–393, Nov. 2004.
指導教授 蘇柏齊(Po-Chyi Su) 審核日期 2009-7-24 推文 facebook plurk twitter funp google live udn HD myshare reddit netvibes friend youpush delicious baidu 網路書籤 Google bookmarks del.icio.us hemidemi myshare