(3.227.233.78) 您好!臺灣時間:2019/10/15 16:57
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
本論文永久網址: 
line
研究生:林瑜綸
研究生(外文):Yu-lun Lin
論文名稱:網路電話之額外訊息傳輸機制
論文名稱(外文):A Novel Data Transmission Scheme on Voice over Internet Protocol
指導教授:蘇柏齊
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:53
中文關鍵詞:VoIPH.264/AVCG.729
外文關鍵詞:VoIPH.264/AVCG.729
相關次數:
  • 被引用被引用:0
  • 點閱點閱:39
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在資訊數位化與網路化的趨勢下,以網際網路傳遞訊息已非常普及。傳統方法採用加解密技術保護訊息,將明文資料轉換為無法識別的亂碼,僅讓擁有解碼金鑰的接收者可正確解讀資訊,因而確保了資料的安全性。然而,在資料傳遞的過程中仍有可能被截獲並且破譯。另外,傳輸加密資料在某些場合中是不被允許的,或是對於訊息的加密反而招致竊聽者或攻擊者的興趣。因此,如何加強資料傳遞的隱蔽性以確保訊息安全是項重要的議題。
本論文中提出在網路電話Voice over Internet Protocol (VoIP) 系統上的額外訊息傳輸機制。我們利用H.264/AVC視訊來達成有效的資料傳輸,另外記錄並告知接收端每單位資料量所需要的編碼宏塊數,讓接收者可檢視封包宏塊開始位置與前個封包的結束位置來判斷是否發生封包遺失以利重新傳遞。這些關於訊息大小與單位資料量所需宏塊數資訊將以G.729音訊封包傳送,同時減低了視訊處理的工作量。實驗結果將顯示本機制的實用性。

With the rapid growth of networking technologies and digital data, content transmission on the Internet has become a common operation. Traditionally, we encrypt the data to make them unreadable so that only the recipient who owns the decryption key can read the data successfully. Nevertheless, it is still possible that the eavesdropper may still intercept the data for further analysis. Besides, the application of cryptography in certain occasions may not be allowed. The encrypted data may even arouse the interest from the eavesdroppers. Therefore, how to transmit the data in a more secured way has been an important research issue.
In this research, an additional data transmission scheme in Voice over Internet Protocol (VoIP) is designed. The H.264/AVC bit-stream is responsible for transmission the major data. The file size and the number of macroblocks for embedding a data unit are carried in G.729. By signaling the start and the end of macroblocks in H.264/AVC for embedding a data unit, we can know whether the packet lost has occurred and the retransmission can be applied. The experimental results will show the feasibility of the proposed method.

中文摘要 i
Abstract ii
誌謝 iii
目錄 iv
附圖目錄 vi
表格目錄 viii
第一章 緒論 1
1.1 研究動機與目的 1
1.2 研究貢獻 2
1.3 論文架構 3
第二章 相關研究與文獻回顧 4
2.1 VoIP技術架構簡介 4
2.1.1 SIP通訊協定 4
2.1.2 SIP元件 4
2.1.3 利用Asterisk建立VoIP環境 6
2.1.4 利用Linphone做為IP語音電話 7
2.2 H.264之預測編碼模式 8
2.2.1 Intra預測編碼 8
2.2.2 Intra預測編碼 10
2.2.3 冗餘係數編碼 11
2.3 G.729編碼標準介紹 12
2.3.1 L0 L1 L2 L3參數簡介 12
2.3.2 P1 P2參數簡介 13
2.3.3 C1 C2 S1 S2參數簡介 13
2.3.4 GA GB參數簡介 14
2.4 相關研究 14
第三章 提出之方法 17
3.1 基本介紹 17
3.2 視訊資料嵌入 17
3.3.1 嵌入位置 18
3.3.2 資料隱藏演算法 19
3.3 音訊資料嵌入 20
3.3.1 傳送端的嵌入 21
3.3.2 接收段的取出 22
3.4 VoIP資料傳輸機制 23
3.4.1 單位資料與單位資料宏塊數 23
3.3.2 音訊封包組 24
3.3.3 音訊封包標籤 25
3.3.4 傳送者音訊封包的嵌入 26
3.3.5 接收者音訊封包的嵌入 27
3.3.6 視訊資料暫存器 28
第四章 實驗結果 32
4.1 實驗環境參數及視訊格式 32
4.2 資料單位比較 32
4.3 有線網路及無線網路的影響 34
4.4 傳輸距離的影響 35
第五章 結論與未來方向 37
參考文獻 38

[1]Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker “Digital Watermarking and Steganography,” Morgan Kaufmann Publishers Inc. San Francisco, CA, USA ©2008.
[2]Dawen Xu, Rangding Wang, Yun Q. Shi, “An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,” Journal of Visual Communication and Image Representation Volume 25, Issue 2, February 2014
[3]Y. Li, H.-X. Chen, and Y. Zhao, “A new method of data hiding based on H.264 encoded video sequences,” in Proc. IEEE Int. Conf. Signal Processing, ICSP, Oct. 2010, pp. 1833–1836
[4]SU-WAN PARK AND SANG UK SHIN, “Authentication and Copyright Protection Scheme for H.264/AVC and SVC,” Department of Information Security Graduate School Pukyong National University Busan, 608-737, Korea
[5]M. Carli, M. Farais, E. D. Gelasca, R. Tedesco, and A. Neri, “Quality assessment using data hiding on perceptually important areas,” in Proc. IEEE Int. Conf. Image Processing, ICIP, Sep. 2005, pp. III-1200-3–III-1200-3
[6]S. Kapotas and A. Skodras, “A new data hiding scheme for scene change detection in H.264 encoded video sequences,” in Proc. IEEE Int. Conf. Multimedia Expo ICME, Jun. 2008, pp. 277–280.
[7]F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Communication, Vol. 2952, Los Angeles, CA, 1996, pp. 205–213.
[8]F. Hartung, B. Girod, “Watermarking of MPEG-2 encoded video without decoding and re-encoding,” in Proceedings Multimedia Computing and Networking (MMCN), San Jose, CA, 1997.
[9]V. Darmstaedter, J.-F. Delaigle, D. Nicholson, B. Macq, “A block based watermarking technique for MPEG-2 signals: Optimization and validation on real digital TV distribution links,” in Proc. European Conference Multimedia Applications, Services and Techniques, Berlin, Germany, 1998, pp. 190–206.
[10]J. Dittmann, M. Stabenau, R. Steinmetz, “Robust MPEG video watermarking technologies,” in Proc. ACM Multimedia, Bristol, U.K., 1998, pp. 71–80.
[11]T.-Y. Chung, M.-S. Hong, Y.-N. Oh, D.-H. Shin, S.-H. Park, “Digital watermarking for copyright protection of MPEG-2 compressed video,” IEEE Transaction on Consumer Electronics 44 (1998) 895–901.
[12]D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, M. G. Strintzis, “Compressed-domain video watermarking of MPEG streams,” in: IEEE Int. Conf. Multimedia and Expo., Vol. 1, 2002, pp. 569–572.
[13]G. C. Langelaar, R. L. Lagendijk, “Optimal differential energy watermarking of DCT encoded images and video,” IEEE Trans. on Image Processing 10 (1) (2001) 148–158.
[14]M. Barni, F. Bartolini, N. Checcacci, “Watermarking of MPEG-4 video objects,” IEEE Transactions on Multimedia 7 (1) (2005) 23–32.
[15]A. M. Alattar, E. T. Lin, and M. U. Celik, “Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video,” IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp. 787-800, August 2003.
[16]J. Zhang, A. Ho, G. Qiu, P. Marziliano, Robust video watermarking of H.264/AVC,” IEEE Transactions on Circuits and System-II: Express Briefs, Vol. 54, 2007, pp. 205–209.
[17]A. Mansouri, A. Aznaveh, F. Torkamani-Azar, F. Kurugollu, “A low complexity video watermarking in H.264 compressed domain,” IEEE Transactions on Information Forensics and Security 5 (2010) 649– 657.
[18]M. Yang, N. Bourbakis, “A high bitrate information hiding algorithm for digital video content under H.264/AVC compression,” IEEE Int. Sym. On Circuits and Systems, Vol. 2, 2005, pp. 935–938.
[19]Ersin Esen and A. Aydin Alatan, “Robust video data hiding using forbidden zone data hiding and selective embedding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 21, no. 8, Aug. 2011 pp.1130-1138,
[20]G. Qiu, P. Marziliano, A. Ho, D. He, Q. Sun, “A hybrid watermarking scheme for H.264/AVC video,” Proceedings of the 17th International Conference on Pattern Recognition, ICPR, Vol. 4, 2004, pp. 865–868.
[21]M. Noorkami, R. M. Mersereau, “Compressed-domain video watermarking for H.264,” Proceedings of the International Conference on Image Processing, ICIP, Vol. 2, 2005, pp. 890–893.
[22]G.-Z. Wu, Y.-J. Wang, W.-H. Hsu, “Data Hiding Techniques for G.729 and MELP Speech Coding” Master’s thesis, National Central University, 2002
[23]Maneli Noorkami, Russell M.Mersereau, “Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase”

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔