博碩士論文 965202008 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:5 、訪客IP:34.204.171.108
姓名 陳穎凡(Ing-fan Chen)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 植基於數位浮水印之H.264/AVC視訊內容驗證機制
(The H.264/AVC Video Content Authentication Scheme by Using Digital Watermarking)
相關論文
★ 基於QT之跨平台無線心率分析系統實現★ 網路電話之額外訊息傳輸機制
★ 針對與運動比賽精彩畫面相關串場效果之偵測★ 植基於向量量化之視訊/影像內容驗證技術
★ 植基於串場效果偵測與內容分析之棒球比賽精華擷取系統★ 以視覺特徵擷取為基礎之影像視訊內容認證技術
★ 使用動態背景補償以偵測與追蹤移動監控畫面之前景物★ 應用於H.264/AVC視訊內容認證之適應式數位浮水印
★ 棒球比賽精華片段擷取分類系統★ 利用H.264/AVC特徵之多攝影機即時追蹤系統
★ 利用隱式型態模式之高速公路前車偵測機制★ 基於時間域與空間域特徵擷取之影片複製偵測機制
★ 結合數位浮水印與興趣區域位元率控制之車行視訊編碼★ 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制
★ 基於文字與主播偵測之新聞視訊分析系統★ 利用隱式型態模式之自適應車行監控畫面分析系統
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 數位科技的快速發展與先進的資料壓縮技術讓視訊資料的儲存與傳輸變得更為便捷,數位攝影機已經取代了傳統類比式錄影設備而廣泛運用於各種應用中。然而,數位資料易於編修的特性卻使其真實性受到若干質疑。在視訊資料中,片段的插入、刪除、更換或互換是最常見也最容易施行的攻擊方式,這樣的攻擊可在不被察覺的情形下改變資料的內容。本研究針對此類攻擊提出一個基於數位浮水印之視訊內容驗證機制,我們透過數位浮水印的嵌入與正確的偵測與驗證,來確認該視訊的內容順序。在本機制中,數位浮水印在視訊資料被壓縮的過程中被嵌入而在解壓縮的過程中被偵測以增加運算效率。H.264/AVC優異的編碼效能使其被廣泛地運用於多種場合,我們因此選擇將數位浮水印機制建構於H.264/AVC之上。
為了達成浮水印有效嵌入與偵測,以及避免檔案大小的增加,我們將浮水印訊號嵌入於非零的量化係數上,而數位浮水印資訊則包含了影片片段的序號。為了避免浮水印的嵌入造成影片畫質下降,我們根據Watson’’s視訊模型中的亮度遮罩(luminance masking)來調整浮水印的能量,在不影響人眼視覺的情況下增加浮水印的強健度。此外,我們也偵測場景轉換畫面以其產生能夠適度抵抗失真壓縮的雜湊數,再利用此雜湊數產生擾亂浮水印的序列,一方面可以達到浮水印嵌入和偵測的同步,另一方面也增加了浮水印的安全性。在論文中我們對浮水印嵌入與偵測的方式做深入討論,以期確實能實作於H.264/AVC中,並達成預期目標。實驗結果顯示藉由數位浮水印的方式可協助驗證數位影片的完整性與真實性。
摘要(英) Digitization of videos brings a lot of convenience to the transmission and archiving of visual data. However, the ease of manipulation of digital videos gives rise to some concerns about their authenticity, especially when digital videos are employed in the applications of surveillance. In this research, we try to tackle this problem by using the digital watermarking techniques. A practical digital video watermarking scheme for authenticating the H.264/AVC compressed videos is proposed to ensure their correct content order. The watermark signals, which represent the serial numbers of video segments, are embedded into nonzero quantization indices of frames to achieve both the effectiveness of watermarking and the compact data size. The human visual characteristics are taken into account to guarantee the imperceptibility of watermark signals and to attain an efficient implementation in H.264/AVC. The issues of synchronized watermark detections are settled by selecting the shot-change frames for calculating the distortion-resilient hash, which helps to determine the watermark sequence. The experimental results demonstrate the feasibility of the proposed scheme as the embedded watermarks can survive the allowed transcoding processes while the edited segments in the tampered video can be located.
關鍵字(中) ★ 數位浮水印
★ H.264/AVC
★ 資料隱藏
★ 場景轉換偵測
關鍵字(英) ★ Scene-change detection
★ Digital watermark
★ H.264/AVC
★ Information hiding
論文目次 Chapter1 Introduction 1
1.1 Motivation of the Research 1
1.2 Contribution of the Research 3
1.3 Organization of Thesis 4
Chapter2 Preliminaries 6
2.1 Background 6
2.1.1 H.264/AVC Video Compression 6
2.1.2 Digital Watermarking Schemes 9
2.2 The Related Work 12
Chapter3 Watermark Embedding 15
3.1 Framework of watermark embedding 15
3.2 Watson’s Perceptual Model 16
3.3 The Synchronization Issue 19
3.4 Watermark Embedding 23
3.5 The Implementation of the Watermark Embedding 28
3.5.1 Video Encoding 28
3.5.2 Hash Converting 30
3.5.3 Embedding Sequence Generation 31
Chapter4 Watermark Detection 34
4.1 Framework of Watermark Detection 34
4.2 Scene Change Detection 35
4.3 Watermark Detection 37
4.4 The Implementation of the Watermark Detection 40
4.4.1 Video Decoding 40
4.4.2 Detected Watermark Sequence Generation 42
Chapter5 Experimental Results 44
5.1 The Comparison of PSNR Values 44
5.2 The Comparison of Bit-rates 45
5.3 Attacks of Video Editing 46
5.4 Attacks of Video Transcoding 49
5.5 False Alarm Tests 51
Chapter6 Conclusion and Future Work 55
Reference 56
參考文獻 [1] B.B. Zhu, M.D. Swanson, and A.H. Tewfik. When seeing isn’t believing - current multimedia authentication technologies and their applications. In IEEE Signal Processing Magazine, volume 21, pages 40–49, Mar. 2004.
[2] F. Bartolini, A. Tefas, M. Barni, and I. Pitas. Image authentication techniques for surveillance applications. In Proc. IEEE, volume 89, pages 1403–1418, Oct. 2001.
[3] Ingemar Cox, Matthew Miller, and Jeffrey Bloom. Digital Watermarking: Principles and Practice. Morgan Kaufmann, 2001.
[4] F. Hartung and M. Kutter. Multimedia watermarking techniques. Proc. IEEE, 87:1079–1107, 1999.
[5] M. D. Swanson, M. Kobayashi, and A. H. Tewfik. Multimedia data embedding and watermarking technologies. Proc. IEEE, 86:1064–1087, 1998.
[6] R. B.Wolfgang, C. I. Podilchuk, and E. J. Delp. Perceptual watermarking for digital images and video. Proc. IEEE, 87:1108–1126, 1999.
[7] Gang Qiu, P. Marziliano, A.T.S Ho, Dajun He, and Qibin Sun. A hybrid watermarking scheme for H.264/AVC video. In Proceedings of the 17th International Conference on Pattern Recognition, ICPR, volume 4, pages 865–868, August 2004.
[8] Guo-Zua Wu, Yi-Jung Wang, and Wen-Hsing Hsu. Robust watermark embedding/detection algorithm for H.264 video. In Journal of Electronic Imaging, volume 14, Jan.-Mar. 2005.
[9] Ming Yang and N. Bourbakis. A high bitrate information hiding algorithm for digital video content under H.264/AVC compression. In IEEE Int. Sym. On Circuits and Systems, volume 2, pages 935–938, August 2005.
[10] M. Noorkami and R. M. Mersereau. Compressed-domain video watermarking for H.264. In Proceedings of the International Conference on Image Processing, ICIP, volume 2, pages 890–893, September 2005.
[11] M. Noorkami and R. M. Mersereau. A framework for robust watermarking of H.264-encoded video with controllable detection performance. In IEEE Trans. Inf. Forensics Security, volume 2, pages 14–23, Mar. 2007.
[12] Maneli Noorkami and Russell M. Mersereau. Digital video watermarking in P-frames with controlled video bit-rate increase. In IEEE Trans. on Information Forensics and Security, volume 3, pages 441–455, Sep. 2008.
[13] Jing Zhang, A.T.S. Ho, Gang Qiu, and Pina Marziliano. Robust video watermarking of H.264/AVC. In IEEE Transactions on Circuits and System-II: Express Briefs, volume 54, pages 205–209, February 2007.
[14] C. I. Podilchuk and Wenjun Zeng. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications, 16(4), May 1998.
[15] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, and M. G. Strintzis. Compressed-domain video watermarking of MPEG streams. In IEEE Int. Conf. Multimedia and Expo., volume 1, pages 569–572, 2002.
[16] Chun-Shien Lu, Hong-Yuan Mark Liao, and Martin Kutter. Denoising and copy attacks resilient watermarking by exploiting knowledge at detector. In IEEE Transatctions on Image Processing, volume 11, 2002.
[17] Po-Chyi Su, Chun-Chieh Chen, and Hong-Min Chang. Towards effective content authentication for digital videos by employing feature extraction and quantization. In IEEE Trans. on Circuits and Systems for Video Technology, to appear.
[18] I. Katsavounidis, C.-C. Kuo, and Z. Zhang. A new initialization technique for generalized Lloyd iteration. In IEEE Signal Processing Letters, volume 1, pages 144–146, Oct. 1994.
[19] J. R. Hern’andez, M. Amado, and F. P’erez-Gonzalez. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. In IEEE Transactions on Image Processing, volume 9, pages 55–68, Jan. 2000.
指導教授 蘇柏齊(Po-chyi Su) 審核日期 2009-7-24
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明