§ 瀏覽學位論文書目資料
  
系統識別號 U0002-1007200817234100
DOI 10.6846/TKU.2008.00226
論文名稱(中文) 基於人類視覺系統之H.264視訊展頻浮水印系統
論文名稱(英文) A spread spectrum watermarking scheme of H.264 video based on human visual system
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系碩士在職專班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 96
學期 2
出版年 97
研究生(中文) 張美雀
研究生(英文) Mei-Chueh Chang
學號 794190032
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2008-06-18
論文頁數 73頁
口試委員 指導教授 - 顏淑惠
委員 - 林慧珍
委員 - 許秋婷
關鍵字(中) 視訊浮水印
展頻
人類視覺感官系統
H.264
關鍵字(英) video watermarking
spread spectrum
human visual system (HVS)
H.264
第三語言關鍵字
學科別分類
中文摘要
有鑑於數位科技的進步與多媒體產品的普遍,為了達到智慧財產權保護的目的,本論文提出一個展頻且配合人類視覺感官系統的視訊浮水印技術以兼顧浮水印的強健度與透明性。我們設計一個浮水印嵌入遮罩M,結合Watson’s 人類視覺系統,將浮水印嵌入於I-frame 4x4 DCT的AC係數。同時,我們也提出一個機制以抵擋畫面刪除、調換、複製等可能攻擊。
英文摘要
As an effective method for copyright protection and content integrity verification of intellectual property, digital watermarking has become a very active area in the field of multimedia security. We propose a watermarking scheme of H.264 based on Watson’s human visual system. A 4x4 DCT mask combining Watson’s human visual system on DCT will be designed. Using the mask, a spread spectrum watermarking scheme is given to embed the watermark on AC coefficients of 4x4 DCT blocks. And it provides a way to classify 4x4 DCT blocks into edge, textured, or smooth-blocks, and it also is a reference for watermark embedding strength. We also propose a method to resist the frame dropping, reversing, duplicating attacks.
第三語言摘要
論文目次
目 錄
第一章 、緒論..........................................................................................1
第1.1 節、 研究背景與目的..............................................................................1
第1.2 節、 視訊浮水印技術相關知識..............................................................2
第1.3 節、 共謀攻擊..........................................................................................5
第1.4 節、 論文架構..........................................................................................8
第二章 、相關研究..................................................................................9
第2.1 節、 H.264 視訊浮水印技術相關研究...................................................9
第2.2 節、 H.264 視訊壓縮標準簡介[20~23].................................................13
第2.3 節、 人類視覺感官系統........................................................................19
第2.4 節、 區塊分類........................................................................................22
第三章 、研究方法................................................................................26
第3.1 節、 展頻浮水印....................................................................................27
第3.2 節、 嵌入浮水印....................................................................................29
第3.3 節、 萃取浮水印....................................................................................30
第四章 、實驗結果與討論....................................................................32
第4.1 節、 區塊分類遮罩的適用性測試........................................................32
第4.2 節、 壓縮測試........................................................................................34
第4.3 節、 共謀攻擊測試................................................................................42
第4.4 節、 畫面位置異動攻擊測試................................................................46
第五章 、結論與未來研究方向............................................................53
參考文獻...................................................................................................54
附錄—英文論文......................................................................................56
圖 目 錄
圖2-1. H.264/AVC 的編碼結構圖..........................................................14
圖2-2. 4x4 亮度預測區塊相對位置及其預測之8 個方向...................16
圖2-3. 4x4 亮度預測模式......................................................................16
圖2-4. 16x16 預測...................................................................................17
圖2-5. 8x8 區塊的遮罩圖......................................................................22
圖2-6. 8x8 區塊分類Pseudo Code.........................................................23
圖2-7. 4x4 區塊的遮罩圖......................................................................24
圖2-8. 4x4 區塊分類Pseudo Code.........................................................24
圖3-1. 浮水印嵌入方法.........................................................................26
圖3-2. 浮水印萃取方法.........................................................................26
圖4-1. 區塊分類結果.............................................................................33
圖4-2. 浮水印嵌入前後的畫面.............................................................36
圖4-3. 嵌入後之PSNR 變化.................................................................36
圖4-4. 未嵌入浮水印之萃取結果.........................................................37
圖4-5. (a)嵌入浮水印(w=1)後未經壓縮之萃取結果...........................37
圖4-5. (b) 嵌入浮水印(w=-1)後未經壓縮之萃取結果........................38
圖4-6. 壓縮前後(不同QP)及嵌入前後的比較....................................39
圖4-7. QP=40 壓縮後的畫面..................................................................39
圖4-8. (a)壓縮後(QP=28)之浮水印萃取結果.......................................40
圖4-8. (b)壓縮後(QP=28)之浮水印萃取結果.......................................40
圖4-8. (c)壓縮後(QP=40)之浮水印萃取結果.......................................41
圖4-8. (d)壓縮後(QP=40)之浮水印萃取結果.......................................41
圖4-9. TFA 攻擊之浮水印萃取結果.....................................................44
圖4-10. WER 攻擊之浮水印萃取結果.................................................45
圖4-11. DC 修改示意圖..........................................................................48
圖4-12 編碼區塊(C)及其相鄰的區塊....................................................49
圖4-13.(a) Akiyo 偵測率(未攻擊前)......................................................50
圖4-13.(b) Mobile 偵測率(未攻擊前)....................................................51
圖4-14.(a) Akiyo 偵測率(attack:QP28+deleted+swapped+duplicated).51
圖4-14.(b) Mobile 偵測率(attack:QP28+deleted+swapped+duplicated)
...................................................................................................................52
表 目 錄
表2-1. MPEG-4 及H.264 發展歷史[21]................................................14
表2-2. 量化參數及量化步階表.............................................................18
表2-3. Y quantization matrix ...................................................................19
表2-4. The 8x8 DCT Frequency Sensitivity Table ..................................20
表3-1. ⊗ 運算表.....................................................................................28
表4-1. TFA 攻擊結果..............................................................................43
表4-2. WER 攻擊結果............................................................................45
參考文獻
參考文獻
[1] Motoo Yamamoto, Akira Shiozaki, Motoi Iwata, and Akio
Ogihara,”Correlation-Based Video Watermarking Method Using Inter-Frame
Similarity,” IEICE Trans. Fundamentals, Vol.E89–A, No.1, 2006
[2] Chun-Shien Lua, Jan-Ru Chena,b, Kuo-Chin Fan, “Real-time frame-dependent
video watermarking in VLC domain,” Signal Processing: Image Communication
20, pp. 624–642, 2005
[3] Gwenaël Doërr , Jean-Luc Dugelay, “A guide tour of video watermarking,” Signal
Processing: Image Communication 18, pp. 263–282, 2003
[4] Dengpan Ye, Changfu Zou, Yuewei Dai, Zhiquan Wang, “A new adaptive
watermarking for real-time MPEG videos,” Applied Mathematics and
Computation, 2006
[5] Dimitrios Simitopoulos, Sotirios A. Tsaftaris, Nikolaos V. Boulgouris, Alexia
Briassouli, Michael G. Strintzis, “Fast Watermarking of MPEG-1/2 Streams Using
Compressed-Domain Perceptual Embedding and a Generalized Correlator
Detector,” EURASIP Journal on Applied Signal Processing, pp. 1088–1106, 2004
[6] Gwenaël Doërr and Jean-Luc Dugelay, “Security Pitfalls of Frame-by-Frame
Approaches to Video Watermarking”, IEEE Transactions on Signal Processing,
Vol. 52, No. 10, 2004
[7] Karen Su, Deepa Kundur, and Dimitrios Hatzinakos ,“Statistical Invisibility for
Collusion-Resistant Digital Video Watermarking,” IEEE Transactions on
Multimedia, Vol. 7, No. 1, 2005
[8] Karen Su, Deepa Kundur and Dimitrios Hatzinakos,,“Spatially localized
image-dependent watermarking for statistical invisibility and collusion
resistance,” IEEE Transactions on Multimedia, Vol. 7, No. 1, 2005
[9] Ingemar J. Cox, Senior Member, IEEE, Joe Kilian, F. Thomson Leighton, and
Talal Shamoon,” Secure Spread Spectrum Watermarking for Multimedia,” IEEE
Transactions on Image Processing, Vol. 6, No. 12, 1997
[10] Guo-Zua Wu, Yi-Jung Wang, Wen-Hsing Hsu, “Robust watermark embedding
detection algorithm for H.264 video,” Journal of Electronic Imaging 14(1),
013013, 2005
[11] Dima Pröfrock, Mathias Schlauweg, Erika Müller, “A New
Uncompressed-Domain Video Watermarking Approach Robust to H.264/AVC
Compression,” Proceedings of the Third IASTED International Conference on
Signal Processing, Pattern Recognition, and Applications, pp. 99-104, 2006
[12] Cao-Hua, Zhou Jingli, and Yu Shengsheng, “An implement of fast hiding data
into H.264 bitstream based on intra-prediction coding,” Proceedings of SPIE -
The International Society for Optical Engineering 6043 I, art.No. 60430I, 2005
[13] Maneli Noorkami, Russell M. Mersereau, “compressed-domain video
watermarking for H.264 ,” 2005 Proceedings - International Conference on
Image Processing, ICIP 2, art. No. 1530199, pp. 890-893, 2005
55
[14] Dima Pröfrock, Henryk Richter, Mathias Schlauweg, Erika Müller, “H.264/AVC
video authentication using skipped macroblocks for an erasable watermark,”
Proceedings of SPIE - The International Society for Optical Engineering 5960
(3), pp. 1480-1489, 2005
[15] Maneli Noorkami and Russell M. Mersereau, “Towards robust
compressed-domain video watermarking for H.264,” Security, Steganography,
and Watermarking of Multimedia Contents VIII, Proc. of SPIE-IS&T Electronic
Imaging, SPIE Vol. 6072, 2006
[16] Maneli Noorkami and Russell M. Mersereau, “A Framework for Robust
Watermarking of H.264-Encoded Video With Controllable Detection
Performance,” IEEE Transactions on information forensics and security, Vol. 2,
No. 1, 2007
[17] H. A. Peterson, H. Peng, J. Morgan, and W. Pennebaker, “Quantization of color
image components in the DCT domain,” in Proc. SPIE, vol. 1453, pp. 210–222,
1991
[18] A. Watson, “DCT quantization matrices visually optimized for individual
images,” Proc. SPIE Conf. Human Vision, Visual Processing and Digital Display
IV, vol. 1913 of SPIE Proceedings, pp.202-216, 1993
[19] Ta-Te Lu, Wei-Lun Hsu, Pao-Chi Chang, “Blind Video Watermarking for
H.264,” IEEE CCECE/CCGEI, Ottawa, pp. 2353-2356, 2006
[20] Gary J. Sullivan, Pankaj Topiwala, and Ajay Luthra, “The H.264/AVC Advanced
Video Coding Standard: Overview and Introduction to the Fidelity Range
Extensions,” SPIE Conference on Applications of Digital Image Processing
XXVII Special Session on Advances in the New Emerging Standard: H.264/AVC,
2004
[21] John Wiley and Sons ,“H.264 and MPEG-4 Video Compression: Video Coding
for Next Generation multimedia,” 2003
[22] Thomas Wiegand, Gary J. Sullivan, Gisle Bjøntegaard, and Ajay Luthra,
“Overview of the H.264/AVC Video Coding Standard,” IEEE Transactions on
circuits and systems for video technology, Vol. 13, No. 7, 2003
[23] White Paper: An Overview of H.264 Advanced Video Coding
[24] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, A. Briassouli, and M. G.
Strintzis, “Fast Watermarking of MPEG- 1/2 Streams Using
Compressed-Domain Perceptual Embedding and a Generalized Correlator
Detector,” EURASIP Journal on Applied Signal Processing, pp.1088-1106, 2004
[25] T. Chung, M. Hong, Y. Oh, D. shin, S. Park, “Digital Watermarking for
Copyright Protection of MPEG2 Compressed Video,” IEEE Transactions on
Consumer Electronics, Vol. 44, No. 3, pp. 895-901, 1998
[26] Yucel Altunbasak, Nejat Kamaci, “An Analysis of the DCT Coefficient
Distribution with the H.264 Video Coder,” in Proc. ICASSP’04, Montreal,
Canada, pp.177-180, 2004
論文全文使用權限
校內
紙本論文於授權書繳交後1年公開
同意電子論文全文授權校園內公開
校內電子論文於授權書繳交後1年公開
校外
同意授權
校外電子論文於授權書繳交後1年公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信