系統識別號 | U0002-1007200817234100 |
---|---|
DOI | 10.6846/TKU.2008.00226 |
論文名稱(中文) | 基於人類視覺系統之H.264視訊展頻浮水印系統 |
論文名稱(英文) | A spread spectrum watermarking scheme of H.264 video based on human visual system |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士在職專班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 96 |
學期 | 2 |
出版年 | 97 |
研究生(中文) | 張美雀 |
研究生(英文) | Mei-Chueh Chang |
學號 | 794190032 |
學位類別 | 碩士 |
語言別 | 繁體中文 |
第二語言別 | |
口試日期 | 2008-06-18 |
論文頁數 | 73頁 |
口試委員 |
指導教授
-
顏淑惠
委員 - 林慧珍 委員 - 許秋婷 |
關鍵字(中) |
視訊浮水印 展頻 人類視覺感官系統 H.264 |
關鍵字(英) |
video watermarking spread spectrum human visual system (HVS) H.264 |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
有鑑於數位科技的進步與多媒體產品的普遍,為了達到智慧財產權保護的目的,本論文提出一個展頻且配合人類視覺感官系統的視訊浮水印技術以兼顧浮水印的強健度與透明性。我們設計一個浮水印嵌入遮罩M,結合Watson’s 人類視覺系統,將浮水印嵌入於I-frame 4x4 DCT的AC係數。同時,我們也提出一個機制以抵擋畫面刪除、調換、複製等可能攻擊。 |
英文摘要 |
As an effective method for copyright protection and content integrity verification of intellectual property, digital watermarking has become a very active area in the field of multimedia security. We propose a watermarking scheme of H.264 based on Watson’s human visual system. A 4x4 DCT mask combining Watson’s human visual system on DCT will be designed. Using the mask, a spread spectrum watermarking scheme is given to embed the watermark on AC coefficients of 4x4 DCT blocks. And it provides a way to classify 4x4 DCT blocks into edge, textured, or smooth-blocks, and it also is a reference for watermark embedding strength. We also propose a method to resist the frame dropping, reversing, duplicating attacks. |
第三語言摘要 | |
論文目次 |
目 錄 第一章 、緒論..........................................................................................1 第1.1 節、 研究背景與目的..............................................................................1 第1.2 節、 視訊浮水印技術相關知識..............................................................2 第1.3 節、 共謀攻擊..........................................................................................5 第1.4 節、 論文架構..........................................................................................8 第二章 、相關研究..................................................................................9 第2.1 節、 H.264 視訊浮水印技術相關研究...................................................9 第2.2 節、 H.264 視訊壓縮標準簡介[20~23].................................................13 第2.3 節、 人類視覺感官系統........................................................................19 第2.4 節、 區塊分類........................................................................................22 第三章 、研究方法................................................................................26 第3.1 節、 展頻浮水印....................................................................................27 第3.2 節、 嵌入浮水印....................................................................................29 第3.3 節、 萃取浮水印....................................................................................30 第四章 、實驗結果與討論....................................................................32 第4.1 節、 區塊分類遮罩的適用性測試........................................................32 第4.2 節、 壓縮測試........................................................................................34 第4.3 節、 共謀攻擊測試................................................................................42 第4.4 節、 畫面位置異動攻擊測試................................................................46 第五章 、結論與未來研究方向............................................................53 參考文獻...................................................................................................54 附錄—英文論文......................................................................................56 圖 目 錄 圖2-1. H.264/AVC 的編碼結構圖..........................................................14 圖2-2. 4x4 亮度預測區塊相對位置及其預測之8 個方向...................16 圖2-3. 4x4 亮度預測模式......................................................................16 圖2-4. 16x16 預測...................................................................................17 圖2-5. 8x8 區塊的遮罩圖......................................................................22 圖2-6. 8x8 區塊分類Pseudo Code.........................................................23 圖2-7. 4x4 區塊的遮罩圖......................................................................24 圖2-8. 4x4 區塊分類Pseudo Code.........................................................24 圖3-1. 浮水印嵌入方法.........................................................................26 圖3-2. 浮水印萃取方法.........................................................................26 圖4-1. 區塊分類結果.............................................................................33 圖4-2. 浮水印嵌入前後的畫面.............................................................36 圖4-3. 嵌入後之PSNR 變化.................................................................36 圖4-4. 未嵌入浮水印之萃取結果.........................................................37 圖4-5. (a)嵌入浮水印(w=1)後未經壓縮之萃取結果...........................37 圖4-5. (b) 嵌入浮水印(w=-1)後未經壓縮之萃取結果........................38 圖4-6. 壓縮前後(不同QP)及嵌入前後的比較....................................39 圖4-7. QP=40 壓縮後的畫面..................................................................39 圖4-8. (a)壓縮後(QP=28)之浮水印萃取結果.......................................40 圖4-8. (b)壓縮後(QP=28)之浮水印萃取結果.......................................40 圖4-8. (c)壓縮後(QP=40)之浮水印萃取結果.......................................41 圖4-8. (d)壓縮後(QP=40)之浮水印萃取結果.......................................41 圖4-9. TFA 攻擊之浮水印萃取結果.....................................................44 圖4-10. WER 攻擊之浮水印萃取結果.................................................45 圖4-11. DC 修改示意圖..........................................................................48 圖4-12 編碼區塊(C)及其相鄰的區塊....................................................49 圖4-13.(a) Akiyo 偵測率(未攻擊前)......................................................50 圖4-13.(b) Mobile 偵測率(未攻擊前)....................................................51 圖4-14.(a) Akiyo 偵測率(attack:QP28+deleted+swapped+duplicated).51 圖4-14.(b) Mobile 偵測率(attack:QP28+deleted+swapped+duplicated) ...................................................................................................................52 表 目 錄 表2-1. MPEG-4 及H.264 發展歷史[21]................................................14 表2-2. 量化參數及量化步階表.............................................................18 表2-3. Y quantization matrix ...................................................................19 表2-4. The 8x8 DCT Frequency Sensitivity Table ..................................20 表3-1. ⊗ 運算表.....................................................................................28 表4-1. TFA 攻擊結果..............................................................................43 表4-2. WER 攻擊結果............................................................................45 |
參考文獻 |
參考文獻 [1] Motoo Yamamoto, Akira Shiozaki, Motoi Iwata, and Akio Ogihara,”Correlation-Based Video Watermarking Method Using Inter-Frame Similarity,” IEICE Trans. Fundamentals, Vol.E89–A, No.1, 2006 [2] Chun-Shien Lua, Jan-Ru Chena,b, Kuo-Chin Fan, “Real-time frame-dependent video watermarking in VLC domain,” Signal Processing: Image Communication 20, pp. 624–642, 2005 [3] Gwenaël Doërr , Jean-Luc Dugelay, “A guide tour of video watermarking,” Signal Processing: Image Communication 18, pp. 263–282, 2003 [4] Dengpan Ye, Changfu Zou, Yuewei Dai, Zhiquan Wang, “A new adaptive watermarking for real-time MPEG videos,” Applied Mathematics and Computation, 2006 [5] Dimitrios Simitopoulos, Sotirios A. Tsaftaris, Nikolaos V. Boulgouris, Alexia Briassouli, Michael G. Strintzis, “Fast Watermarking of MPEG-1/2 Streams Using Compressed-Domain Perceptual Embedding and a Generalized Correlator Detector,” EURASIP Journal on Applied Signal Processing, pp. 1088–1106, 2004 [6] Gwenaël Doërr and Jean-Luc Dugelay, “Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking”, IEEE Transactions on Signal Processing, Vol. 52, No. 10, 2004 [7] Karen Su, Deepa Kundur, and Dimitrios Hatzinakos ,“Statistical Invisibility for Collusion-Resistant Digital Video Watermarking,” IEEE Transactions on Multimedia, Vol. 7, No. 1, 2005 [8] Karen Su, Deepa Kundur and Dimitrios Hatzinakos,,“Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance,” IEEE Transactions on Multimedia, Vol. 7, No. 1, 2005 [9] Ingemar J. Cox, Senior Member, IEEE, Joe Kilian, F. Thomson Leighton, and Talal Shamoon,” Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, 1997 [10] Guo-Zua Wu, Yi-Jung Wang, Wen-Hsing Hsu, “Robust watermark embedding detection algorithm for H.264 video,” Journal of Electronic Imaging 14(1), 013013, 2005 [11] Dima Pröfrock, Mathias Schlauweg, Erika Müller, “A New Uncompressed-Domain Video Watermarking Approach Robust to H.264/AVC Compression,” Proceedings of the Third IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, pp. 99-104, 2006 [12] Cao-Hua, Zhou Jingli, and Yu Shengsheng, “An implement of fast hiding data into H.264 bitstream based on intra-prediction coding,” Proceedings of SPIE - The International Society for Optical Engineering 6043 I, art.No. 60430I, 2005 [13] Maneli Noorkami, Russell M. Mersereau, “compressed-domain video watermarking for H.264 ,” 2005 Proceedings - International Conference on Image Processing, ICIP 2, art. No. 1530199, pp. 890-893, 2005 55 [14] Dima Pröfrock, Henryk Richter, Mathias Schlauweg, Erika Müller, “H.264/AVC video authentication using skipped macroblocks for an erasable watermark,” Proceedings of SPIE - The International Society for Optical Engineering 5960 (3), pp. 1480-1489, 2005 [15] Maneli Noorkami and Russell M. Mersereau, “Towards robust compressed-domain video watermarking for H.264,” Security, Steganography, and Watermarking of Multimedia Contents VIII, Proc. of SPIE-IS&T Electronic Imaging, SPIE Vol. 6072, 2006 [16] Maneli Noorkami and Russell M. Mersereau, “A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance,” IEEE Transactions on information forensics and security, Vol. 2, No. 1, 2007 [17] H. A. Peterson, H. Peng, J. Morgan, and W. Pennebaker, “Quantization of color image components in the DCT domain,” in Proc. SPIE, vol. 1453, pp. 210–222, 1991 [18] A. Watson, “DCT quantization matrices visually optimized for individual images,” Proc. SPIE Conf. Human Vision, Visual Processing and Digital Display IV, vol. 1913 of SPIE Proceedings, pp.202-216, 1993 [19] Ta-Te Lu, Wei-Lun Hsu, Pao-Chi Chang, “Blind Video Watermarking for H.264,” IEEE CCECE/CCGEI, Ottawa, pp. 2353-2356, 2006 [20] Gary J. Sullivan, Pankaj Topiwala, and Ajay Luthra, “The H.264/AVC Advanced Video Coding Standard: Overview and Introduction to the Fidelity Range Extensions,” SPIE Conference on Applications of Digital Image Processing XXVII Special Session on Advances in the New Emerging Standard: H.264/AVC, 2004 [21] John Wiley and Sons ,“H.264 and MPEG-4 Video Compression: Video Coding for Next Generation multimedia,” 2003 [22] Thomas Wiegand, Gary J. Sullivan, Gisle Bjøntegaard, and Ajay Luthra, “Overview of the H.264/AVC Video Coding Standard,” IEEE Transactions on circuits and systems for video technology, Vol. 13, No. 7, 2003 [23] White Paper: An Overview of H.264 Advanced Video Coding [24] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, A. Briassouli, and M. G. Strintzis, “Fast Watermarking of MPEG- 1/2 Streams Using Compressed-Domain Perceptual Embedding and a Generalized Correlator Detector,” EURASIP Journal on Applied Signal Processing, pp.1088-1106, 2004 [25] T. Chung, M. Hong, Y. Oh, D. shin, S. Park, “Digital Watermarking for Copyright Protection of MPEG2 Compressed Video,” IEEE Transactions on Consumer Electronics, Vol. 44, No. 3, pp. 895-901, 1998 [26] Yucel Altunbasak, Nejat Kamaci, “An Analysis of the DCT Coefficient Distribution with the H.264 Video Coder,” in Proc. ICASSP’04, Montreal, Canada, pp.177-180, 2004 |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信