跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.11) 您好!臺灣時間:2025/09/24 00:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:翁筱貞
研究生(外文):Hsiao-Jen Weng
論文名稱:軟式萃取子區塊極性之金匙視訊浮水印系統
論文名稱(外文):Key-based Video Watermarking on MPEG-2
指導教授:張寶基
指導教授(外文):Pao-Chi Chang
學位類別:碩士
校院名稱:國立中央大學
系所名稱:電機工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2003
畢業學年度:91
語文別:中文
論文頁數:63
中文關鍵詞:軟式萃取資料隱藏金匙浮水印視訊浮水印
外文關鍵詞:data hidingvideo watermarkingsoft decision
相關次數:
  • 被引用被引用:2
  • 點閱點閱:175
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0

在本篇論文中,我們提出軟式萃取子區塊極性之金匙視訊浮水印系統,此系統建構於MPEG-2上能同時完成浮水印嵌入與視訊壓縮。浮水印雖僅嵌入於I畫面,卻會經由移動預估編碼機制傳播到P與B畫面中,因此在萃取端提出兩種考慮視訊時間軸上相關性的權重計算方式,以之參考所有畫面資訊,視訊群組為單位軟式萃取子區塊極性來解得浮水印。
我們將浮水印嵌入在低頻離散餘弦係數。低頻係數首先合成子區塊,以區塊極性選出適合加入浮水印的區塊,區塊極性並且和浮水印進行Tri-state XOR(TXOR)的運算以產生金匙。金匙記錄浮水印嵌入的區塊位置,因此在萃取端能取代原始視訊訊號,與區塊極性進行TXOR運算即可解出浮水印。
實驗結果顯示此視訊浮水印系統具有良好的透明度,嵌入浮水印的畫面其PSNR值與未嵌入者相近,而萃取端參考所有種類畫面的資訊軟式萃取子區塊極性的確能夠提升浮水印的強韌性。


In this thesis, we propose a key-based video watermarking system in which the watermark embedding and the video encoding are processed at the same time on MPEG-2. Since the watermark information would propagate to P/B frames through the motion compensated coding, the watermark is embedded in a single I frame but can be extracted from all frames in the same group of pictures (GOP).
The watermark is embedded in the low frequency DCT coefficients based on the block polarity. The block polarity is operated with the watermark by Tri-state XOR to generate the secret key, which labels the block locations of the embedded watermark. In the decoding end, the key is operated with the block polarity by Tri-state XOR to get the extracted watermark from all kinds of frames. Finally, the watermark over a GOP can be calculated by a weighted voting procedure according to the frame types and the displacements of the pixels.
The simulation results show that the system has great imperceptibility that the PSNR of the watermarked frames are almost the same as the un-watermarked and more accurate normalized correlation (NC) can be obtained as well.


摘要………………………………………………………………I
Abstract…………………………………………………………II
目錄………………………………………………………………III
圖目………………………………………………………………V
表目………………………………………………………………VII
第一章緒論..........................................1
1.1研究動機與目的...................................1
1.2 相關研究........................................4
1.3 論文架構........................................6
第二章視訊浮水印技術................................7
2.1數位浮水印之應用.................................7
2.2視訊浮水印之功能需求.............................9
2.3視訊浮水印技術之發展.............................12
2.4 MPEG-2視訊壓縮標準..............................14
2.4.1 基本編碼物件..................................14
2.4.2 編碼流程......................................16
2.4.3 解碼流程......................................21
第三章金匙視訊浮水印系統............................22
3.1 系統架構........................................22
3.2 視訊浮水印之嵌入................................24
3.2.1 隨機重排......................................25
3.2.2 子區塊合成....................................26
3.2.3 子區塊極性映射................................27
3.2.4 金匙之產生....................................29
3.2.5 禁區淨空......................................31
3.3 視訊浮水印之偵測................................32
3.3.1 子區塊極性投票................................33
3.3.2 浮水印萃取....................................36
3.3.3 浮水印相似度評估..............................37
3.3.4 權重之設計....................................37
第四章實驗結果與討論................................42
4.1 模擬環境........................................42
4.2 分析禁區的影響..................................44
4.2.1 禁區範圍與浮水印透明度........................44
4.2.2 禁區範圍與浮水印強韌性........................51
4.3 浮水印強韌性測試................................52
4.3.1 基本壓縮攻擊測試..............................53
4.3.2 子區塊極性投票分析............................53
第五章結論與未來展望................................60
參考文獻............................................61


[1] C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithms and applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001.
[2] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
[3] T.T. Lu, L.L. Lee and P.C. Chang, “A key-based image watermarking system using subblock composition in DCT domain,” Proc. Multimedia Technology and Applications Conference, pp. 157-163, Irvine, CA, Nov. 2001.
[4] J. Lee and C. S. Won, “Authentication and correction of digital watermarking images,” Electronics Letters, vol. 35, no. 11, pp. 886-887, May 1999.
[5] M. Barni, F. Bartolini, R. Caldelli, V. Cappellini, A. De Rosa, and A. Piva, “Robust frame-based watermarking for digital video,” 12th International Workshop on Database and Expert Systems Applications, pp. 825-829, 2001.
[6] J. Huang and Y. Q. Shi, “Adaptive image watermarking scheme based on visual masking,” Electronics Letters, vol. 34, no. 8, pp. 748-750, April 1998.
[7] Z. H. Wei, P. Qin and Y. Q. Fu, “Perceptual digital watermark of images using Wavelet transform,” IEEE Transactions on Consumer Electronics, vol. 44, no. 4, pp. 1267-1272, Nov. 1998.
[8] C. T. Hsu and J. L. Wu, “DCT-based watermarking for video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998.
[9] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks for digital images and video,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1108 -1126, July 1999.
[10] I. J. Cox, J. Kilian, F.T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673 -1687, Dec. 1997.
[11] F. Hartung and B. Girod, “Digital watermarking of uncompressed and uncompressed video,” Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
[12] S. G. Miaou and C. M. Chen, “A robust image watermarking technique based on Wavelet transform and human visual systems,” J. of Computers, Vol. 13, No. 1, pp. 21-31, March 2001.
[13] I. J. Cox, M. L. Miller and J.A. Bloom, Digital watermarking, Morgan Kaufmann, 2002.
[14] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers and J. K. Su, “Attacks on digital watermarks: classification, estimation based attacks, and benchmarks,” IEEE Communications Magazine, vol. 39, no. 8, pp. 118-126, Aug. 2001.
[15] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Attacks on copyright marking systems,” in David Aucsmith (Ed), Information Hiding, Second International Workshop, IH'98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219-239.
[16] Fabien A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Processing, vol. 17, no. 5, pp. 58—64, Sept. 2000.
[17] Stirmark Benchmark 4.0 is available on “http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/”
[18] S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet and T. Pun, “Second generation benchmarking and application oriented evaluation,” in Information Hiding Workshop III, Pittsburgh, PA, USA, April 2001.
[19] Official Optimark Page: http://poseidon.csd.auth.gr/optimark/
[20] S.W. Sun, T.T. Lu, and P.C. Chang, “Image watermarking synchronization by significant MSB plane matching,” Proc. Third IEEE Pacific Rim Conference on Multimedia 2002, pp. 468-476, Hsin-Chu, Taiwan, Dec. 2002.
[21] S.W. Sun and P.C. Chang, “Video Watermarking Synchronization Based on Profile Statistics,” to appear in IEEE Carnahan 2003, Taipei, Taiwan, Oct. 2003.
[22] E. T. Lin and E. J. Delp, “Temporal Synchronization in Video Watermarking,” Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents IV, vol. 4675, January 20-25, 2002, San Jose, CA.
[23] T. Y. Chung, M. S. Hong, Y. N. Oh, D. H. Shin and S. H. Park, “Digital watermarking for copyright protection of MPEG2 compressed video,” IEEE Transactions on Consumer Electronics, vol. 44, no.3, pp. 895-901, Aug. 1998.
[24] J. Zhang, H. Maitre, J. Li, and L. Zhang, “Embedding watermark in MPEG video sequence,” IEEE Fourth Workshop on Multimedia Signal Processing, pp. 535-540, 2001.
[25] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” Proceedings of XIV Brazilian Symposium on Computer Graphics and Image Processing, pp. 179-182, Oct. 2001.
[26] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-Time labeling of MPEG-2 compressed video,” Journal of Visual Communication and Image Representation, vol. 9, no. 4, pp. 256-270, 1998.
[27] ISO/IEC TTC1/SC29/WG11 13818-2 Information technology— Generic coding of moving pictures and associated audio information: video, 1995.
[28] C. S. Lu, J. R. Chen, H. Y. Mark Liao and K. C. Fan, “Real-Time MPEG2 Video Watermarking in the VLC Domain,” Proc. 16th IAPR Int. Conf. on Pattern Recognition, Quebec, Canada, Vol. II, August 11-15, 2002.
[29] P.C. Chang and T.H. Lee, “Precise and Fast Error Tracking for Error-Resilient Transmission of H.263 Video,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 10, No. 4, pp. 600-607, June 2000.
[30] T.H. Lee and P.C. Chang, “Error Robust H.263 Video Coding with Video Segment Regulation and Precise Error Tracking,” IEICE Trans. on Communications, vol. E84-B, no. 2, pp.317-324, Feb. 2001.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top