§ 瀏覽學位論文書目資料
  
系統識別號 U0002-1601200911300300
DOI 10.6846/TKU.2009.00519
論文名稱(中文) 一個基於SVMs之多媒體浮水印技術
論文名稱(英文) A Multimedia Watermarking Technique Based on SVMs
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系博士班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 97
學期 1
出版年 98
研究生(中文) 王佳仁
研究生(英文) Chia-Jen Wang
學號 891190133
學位類別 博士
語言別 英文
第二語言別
口試日期 2009-01-12
論文頁數 62頁
口試委員 指導教授 - 顏淑惠(105390@mail.tku.edu.tw)
委員 - 徐道義
委員 - 施國琛
委員 - 黃心嘉
委員 - 林慧珍
委員 - 顏淑惠
關鍵字(中) 數位浮水印
支持向量機器
可容忍位置圖
基於場景的視訊浮水印
共謀攻擊
關鍵字(英) Digital watermarking
support vector machine (SVM)
tolerable position map (TPM)
scene-based video watermarking
collusion attack
第三語言關鍵字
學科別分類
中文摘要
數位浮水印是一項能夠提供數位媒體保護與驗證的重要技術。藉由以往在數位浮水印、支持向量機器(SVMs)與可容忍位置圖(TPM)所進行的研究與相關經驗,在本論文中將對於特徵的選擇與TPM的產生方式提供一整體研究。
在本論文中提出一系列的靜態影像浮水印技術。經由實驗證實,本論文所提之靜態影像數位浮水印技術,不僅承襲此一系列浮水印技術的良好特質,更重要的是在各方面的效能提升。尤其在運算時間的降低與抵擋低通濾波尤其顯著。

本論文更將所提之靜態影像浮水印拓展至以場景為基礎之動態影片浮水印技術。藉由本論文所提之技術,在一段場景中經由每個畫面的浮水印萃取,最後終能取出完整之浮水印。在本論文中還探討了壓縮與共謀攻擊,實驗結果顯示,本論文所提以SVMs為基礎之浮水印技術是有效與具體可行。
英文摘要
Digital watermarking is an important technique for protection and identification of the content of digital multimedia. From our previous work on digital watermarking technique based on support vector machines (SVMs) and tolerable position map (TPM), a thorough study on feature selection and TPM generation is conducted. The improved system is endorsed by a complete set of experiments. It not only inherits the good characteristics from the original algorithm, but also shows significant improvements on time consumption as well as the robustness of low-pass filtering attacks. The proposed algorithm is also extended to a scene-based video watermarking technique. The excellent performance on NC values is achieved by averaging extracted watermarks from many frames of one scene into the final extracted watermark. The issue on collusion attacks is also detailed discussed. Our video watermarking technique is shown to be robust to video compression and collusion attacks. The proposed video watermarking technique has its novelty and practicability on SVM-applications.
第三語言摘要
論文目次
Table of Contents

List of Figures	III
List of Tables	V
Chapter 1 Introduction	1
Chapter 2 Related Works	4
Chapter 3 Support Vector Machines	8
Chapter 4 The Watermarking Scheme for Still Images	12
4.1 Embedding Algorithm	13
4.1.1 Training information embedding	13
4.1.2 Owner’s signature embedding	17
4.2 Extraction Algorithm	18
4.2.1 X-SVM training for signature extraction	18
4.2.2 Signature extraction	19
4.3 Experimental Results	19
Chapter 5 Improved Scheme for Still Images	25
5.1 The overview of improved watermarking scheme	25
5.2 Features Analysis	27
5.3 Tolerable Position Map (TPM)	33
5.4 The Preprocess of the Watermark Embedding	40
5.5 Experimental Results for Improved Watermarking Scheme	40
5.5.1 Attack free results	41
5.5.2 Performance improvement of improved algorithms	44
5.5.3 Evaluation on various attacks	46
Chapter 6 The watermarking scheme for videos	49
6.1 The proposed scene-based video watermarking algorithm	49
6.2 Robustness to collusion attacks	53
6.3 Experiments for the video watermarking algorithm	57
Chapter 7 Conclusions	60
REFERENCES	61
 
List of Figures
Fig. 1: A linear separating hyperplane.	8
Fig. 2: The diagram of embedding system.	12
Fig. 3: A binary sequence of a watermark.	13
Fig. 4: (center element), its 4-neighbors, and the corresponding surroundings (shaded beige and yellow).	15
Fig. 5: Mask for 8-neighbors feature 1.	15
Fig. 6: Mask for cross-shaped feature 2.	16
Fig. 7: Mask for X-shaped feature feature 3.	16
Fig. 8: Owner’s signature embedding procedure.	18
Fig. 9: Host images and watermark image.	21
Fig. 10: Error rate for experimental images.	24
Fig. 11: PSNR for experimental images.	24
Fig. 12: The diagram of the watermark embedding system.	26
Fig. 13: 8-neighbors feature 1.	28
Fig. 14: Cross-shaped feature 2.	28
Fig. 15: Diamond-shaped feature 3.	29
Fig. 16: X-shaped feature 4.	29
Fig. 17: Performance on one feature used only.	30
Fig. 18: Performance on two features used.	30
Fig. 19: Performance on three features used.	31
Fig. 20: Performance on all four features used.	31
Fig. 21: Tolerable Position Maps.	35
Fig. 22: Performance on the TPM generated by JPEG.	36
Fig. 23: Performance on the TPM generated by blurring.	36
Fig. 24: Performance on the TPM generated by sharpening.	37
Fig. 25: Performance on the TPM generated by JPEG & blurring.	37
Fig. 26: Performance on the TPM generated by sharpening & blurring.	38
Fig. 27: Performance on the TPM generated by sharpening & JPEG	38
Fig. 28: Discarding and scribbling attacks and corresponding results	46
Fig. 29: The frames order for embedding procedure in one scene	54

 
List of Tables
Table 1: Common Kernel Functions.	11
Table 2: Lena.	22
Table 3: Peppers.	22
Table 4: Baboon.	22
Table 5: Airplane.	23
Table 6: House.	23
Table 7: Lena	42
Table 8: Peppers	43
Table 9: Baboon	43
Table 10: Airplane	43
Table 11: Sailboat	44
Table 12: comparison between the improved and original methods	45
Table 13: NC values for discarding and scribbling	47
Table 14: NC values for JPEG and JPEG2000 compression	47
Table 15: NC values for rotation attacks	48
Table 16: Snatch of testing videos	58
Table 17: Robustness for video application and video compression (NC values)	58
Table 18: NC values of the video watermarking scheme for no attack and compression attack	58
Table 19: Results of the proposed video watermarking scheme for WER attack	59
參考文獻
[1] P. Tsai, Y. C. Hu, C. C. Chang, “A color image watermarking scheme based on color quantization,” Signal Processing 84, pp. 95-106 (2004).
[2] M. Kutter, F. Jordan, F. Bossen, “Digital Signature of Color Images using Amplitude Modulation,” Electronics Imaging 7(2), pp.326–332 (1997).
[3] P. T. Yu, H. H. Tsai, D. W  Sun, “Digital Watermarking of Color Images Using Support Vector Machines,” 2003 National Computer Symposium (NCS'03) (2003).
[4] Y. G. Fu, R. M. Shen, L. P. Shen, X. S. Lei, “Reliable Information Hiding Based on Support Vector Machine,” INFORMATICA, Vol. 16, No. 3, pp.333–346 (2005). 
[5] T. Amornraksa , K. Janthawongwilai, “Enhanced images watermarking based on amplitude modulation,” Image and Vision Computing, pp.111–119 (2006).
[6] S. Joo, Y. Suh, J. Shin, H. Kikuchi, “A New Robust Watermark Embedding into Wavelet DC Components,” ETRI Journal, VOL. 24, NO. 5, pp.401-404 (2002).
[7] J. L. Liu, D. C. Lou , M. C. Chang, H. K. Tso, “A robust watermarking scheme using self-reference image,” Computer Standards & Interfaces, pp.356-367 (2006).
[8] R. Ni, Q. Ruan, H. D. Cheng, “Secure semi-blind watermarking based on iteration mapping and image features,” Pattern Recognition 38, pp. 357-368 (2005).
[9] C. S. Shieh, H. C. Huang, F. H. Wang, J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognition, pp. 555-565 (2004).
[10] F. Y. Shih, Y. T. Wu, “Enhancement of image watermark retrieval based on genetic algorithms,” Journal of visual communication & image representation, pp. 115–133 (2005).
[11] S. H. Yen, C. J. Wang, “SVM Based Watermarking Technique,” Tamkang Journal of Science and Engineering, vol. 9, no. 2, pp.141-150, June (2006).
[12] S. H. Yen, C. J. Wang, and Y. T. Kao, “A Watermarking Scheme Based on SVM and Tolerable Position Map,” 2006 IEEE Conference on System, Man, and Cybernetics, pp.3170-3175 (2006).
[13] V. Vapnik, “The Nature of Statistical Learning Theory, Springer-Verlag,” New York, (1995).
[14] C. J. C. Burges, “A tutorial on support vector machines for pattern recognition,” Data Mining and Knowledge Discovery, Vol. 2, No. 2, pp. 121-167 (1998).
[15] J. C. Platt, “Fast training of support vector machines using sequential minimal optimization, Advances in Kernel Methods - Support Vector Learning,” B. Schölkopf, C. Burges, and A. Smola, eds., MIT Press, pp. 185-208 (1999).
[16] J. C. Platt, Adult and Web Site. http://www.research.microsoft.com/~jplatt
[17] S. S. Keerthi, S. K. Shevade, C. Bhattacharyya, K. R. K. Murthy, “Improvements to Platt’s SMO Algorithm for SVM Classifier Design,” Neural Computation, Vol. 13, pp. 637-649 (2001).
[18] C. W. Hsu, C. C. Chang, and C. J. Lin, “A Practical Guide to Support Vector Classification,”  http://www.csie.ntu.edu.tw/~cjlin/papers/
[19] G. Doërr , J. L. Dugelay, “A guide tour of video watermarking,” Signal Processing: Image Communication, pp. 263–282 (2003).
[20] G. Doërr and J. L. Dugelay, “Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking,” IEEE Transactions on Signal Processing, Vol. 52, No. 10, pp. 2955 – 2964 (2004).
[21] S. Biswas, S. R. Das, E. M. Petriu, “An Adaptive Compressed MEPEG-2 Video Watermarking Scheme,” IEEE Transactions on Instrumentation and Measurement, vol.54, No.5, pp. 1853 – 1861 (2005).
[22] H. Shu, L. P. Chau, “A new scene change feature for video transcoding,” IEEE International Symposium on Circuits and Systems, pp. 4582 – 4585 (2005).
[23] Y. Zhai, M. Shah, “A general framework for temporal video scene segmentation,” Tenth IEEE International Conference on Computer Vision, pp. 1111 – 1116 (2005).
[24] M. Holliman, W.Macy, M. Yeung, “ Robust frame-dependent video watermarking,” Proc. SPIE, Security and Watermarking of Multimedia contents II, Vol. 3971, pp. 186-197 (2000).
[25] http://www.on2.com/downloads/vp7-personal
論文全文使用權限
校內
紙本論文於授權書繳交後2年公開
同意電子論文全文授權校園內公開
校內電子論文於授權書繳交後2年公開
校外
同意授權
校外電子論文於授權書繳交後2年公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信