(34.239.150.57) 您好!臺灣時間:2021/04/14 22:31
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳信宇
研究生(外文):Hsin-Yu Chen
論文名稱:用於MPEG視訊的資料隱藏與浮水印新技術與其應用之研究
論文名稱(外文):New Data Hiding and Watermarking Techniques for MPEG Videos and Their Applications
指導教授:蔡文祥蔡文祥引用關係
指導教授(外文):Wen-Hsiang Tsai
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2003
畢業學年度:91
語文別:中文
論文頁數:120
中文關鍵詞:資料隱藏MPEG視訊驗證版權保護可視浮水印
外文關鍵詞:data hidingMPEG video authenticationcopyright protectionvisible watermarking
相關次數:
  • 被引用被引用:0
  • 點閱點閱:91
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
伴隨著資訊科技的發展,越來越多的人利用網際網路來傳送MPEG視訊檔案。因此,MPEG視訊檔案非常適合用來傳輸秘密資訊到接收端。在本篇論文中,我們針對MPEG視訊的許多不同應用,提出多個資料隱藏與數位浮水印技術。首先針對秘密通訊,提出一個可以將秘密資訊隱藏在MPEG視訊檔案中的方法,此方法能有效和正確地使用MPEG視訊中的資訊來隱藏資料,這些資訊包括了頻域係數與動態向量。另一方面,先進的資訊科技同時也造成MPEG視訊很容易遭到非法盜用與竄改,因此發展適當的技術來作MPEG視訊的驗證與版權保護是非常需要的。在本論文研究中,我們利用資訊隱藏的技術來作到MPEG視訊的完整性與真實性的驗證,此方法不但能偵測視訊檔案是否有遭到非法竄改,同時也能呈現視訊是如何遭到竄改並定位出遭到竄改的區域。針對MPEG視訊的版權保護,我們也提出了兩個方法。第一個方法是利用不可視的強韌浮水印技術作間接的版權保護,第二個方法是利用可視浮水印的技術作直接的版權保護。實驗結果證明了所提出方法是可行的。

With the advance of information technologies, more and more people are using the Internet for transmitting MPEG videos. Consequently, MPEG videos become suitable cover files for carrying secret data to receiver sites. In this study, several methods for data hiding and watermarking are proposed for various applications using MPEG videos. Proposed first is a method for hiding secret data into MPEG videos for covert communication. Information, including frequency coefficients and motion vectors, in an MPEG video is utilized efficiently and properly in this method to hide data. On the other hand, the advance of information technologies also brings us the serious problem of misuses or tampering of MPEG videos. Therefore, it is compulsory to develop appropriate methods for video authentication and copyright protection. For the purpose of verifying the fidelity and integrity of MPEG videos, a video authentication method based on information hiding techniques is proposed next in this study. The method not only can check whether a video has been tampered with, but also can show where and how the tampering was conducted. For the protection of MPEG video copyrights, two methods based on invisible watermarking and visible watermarking techniques, respectively, are proposed finally in this study, the former being robust for indirect copyright protection, and the latter useful for direct protection. Good experimental results prove the feasibility of the proposed methods.

ABSTRACT (in Chinese) i
ABSTRACT (in English) ii
ACKNOWLEDGEMENTS iii
CONTENTS iv
LIST OF FIGURES vii
LIST OF TABLES x
Chapter 1 Introduction 1
1.1 Motivation 1
1.2 General Review of Related Works 3
1.3 Overview of Proposed Methods 3
1.3.1 Terminologies 3
1.3.2 Brief Descriptions of Proposed Methods 4
1.4 Contributions 7
1.5 Thesis Organization 8
Chapter 2 Review of Related Works and MPEG Standard 9
2.1 Review of Techniques for Video Data Hiding 9
2.2 Review of Techniques for Video Authentication 10
2.3 Review of Techniques for Video Copyright Protection 10
2.4 Review of Techniques for Visible Watermarking in Video 11
2.5 Review of MPEG Standard 11
2.5.1 Structure of MPEG Video Bitstream 12
2.5.2 MPEG Video Compression Techniques 13
2.5.3 Process of Encoding 15
2.5.4 Process of Decoding 16
Chapter 3 Data Hiding in MPEG Video for Covert Communication 17
3.1 Introduction 17
3.1.1 Problem Definition 17
3.1.2 Proposed Idea 18
3.2 Hiding Secret data in MPEG video 19
3.2.1 Process for Hiding Data in I Frames 19
3.2.2 Process for Hiding Data in P Frames 24
3.2.3 Process for Hiding Data in B Frames 29
3.3 Extracting Secret Data from MPEG Video 31
3.3.1 Process for Extracting Data from I Frames 31
3.3.2 Process for Extracting Data from P Frames 34
3.3.3 Process for Extracting Data from B Frames 38
3.4 Experimental Results 40
3.5 Discussions and Summary 43
Chapter 4 Content Verification of MPEG Video by Random Signal Hiding 44
4.1 Introduction 44
4.1.1 Problem Definition 45
4.1.2 Proposed Idea 46
4.2 Embedding Random Signals in MPEG Video 47
4.2.1 Process for Embedding Random Signals in I Frames 48
4.2.2 Process for Embedding Random Signals in P and B Frames 52
4.3 Content Verification 56
4.3.1 Process for Verification of Integrity and Fidelity of I Frames 56
4.3.2 Process for Verification of Fidelity of P and B Frames 62
4.4 Experimental Results 67
4.5 Discussions and Summary 72
Chapter 5 Copyright Protection of MPEG Video by Digital Watermarking Technique 73
5.1 Introduction 73
5.1.1 Problem Definition 74
5.1.2 Proposed Idea 74
5.2 Watermark Embedding Process Based on Quality Control 76
5.3 Watermark Extraction Process 84
5.4 Experimental Results 89
5.5 Discussions and Summary 93
Chapter 6 Copyright Protection of MPEG Video by Removable Visible Watermarking Technique 94
6.1 Introduction 94
6.1.1 Problem Definition 95
6.1.2 Proposed Idea 96
6.2 Embedding Visible Watermarks in MPEG Video 98
6.2.1 Process for Embedding Visible Watermarks in I Frames 99
6.2.2 Process for Embedding Visible Watermarks in P and B Frames 102
6.3 Recovery of Original MPEG Video by Removing Visible Watermarks 105
6.3.1 Process for Recovery of I Frames 105
6.3.2 Process for Recovery of P Frames and B fames 108
6.4 Experimental Results 112
6.5 Discussions and Summary 112
Chapter 7 Conclusions and Suggestions for Future Works 116
7.1 Conclusions 116
7.2 Suggestions for Future Works 117
References 118

[1] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings of the IEEE, vol. 87, issue: 7, pp. 1079-1107, Jul. 1999.
[2] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, pp. 283-301, 1998.
[3] J. J. Chae and B. S. Manjunath, “Data Hiding in Video,” Proceedings of IEEE International Conference of Image Processing, Kobe, Japan, vol. 1, pp. 311-315, Dec 1999.
[4] Jun Zhang et al., “Embedding Watermark in MPEG Video Sequence,” IEEE Fourth Workshop on Multimedia Signal Processing, Cannes, France, pp. 535-540, Oct. 2001.
[5] Jana Dittmann et al., “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, vol. 2, pp. 209-213, June 1999.
[6] M. Schneider and S. F. Chang, “A Robust Content Based Digital Signature for Image Authentication,” Proceedings of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 3, pp. 227-230, Sept. 1996.
[7] D. A. Winne et al., “Spatial Digital Watermark for MPEG-2 Video Authentication and Tamper Detection,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, Florida, USA, vol. 4, pp. 3457-3460, May 2002.
[8] B. G. Mobasseri et al., “Content Authentication and Tamper Detection in Digital Video,” Proceedings of IEEE International Conference on Image Processing, Vancouver, BC, Canada, vol. 1, pp. 458-461, Sept. 2000.
[9] P. Yin and H. H. Yu, “A Semi-fragile Watermarking System for MPEG Video Authentication,” IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, Florida, USA, vol. 4, pp. 3461-3464, May 2002.
[10] R. Du and J. Fridrich, “Lossless Authentication of MPEG-2 Video,” Proceedings of IEEE International Conference on Image Processing, New York, USA, vol. 2, pp. 893-896, Sept. 2002.
[11] Jae Yeon Park et al., “Invertible Semi-fragile Watermarking Algorithm Distinguishing MPEG-2 Compression from Malicious Manipulation,” Proceedings of IEEE International Conference on Consumer Electronics, Los Angles, USA, pp. 18-19, June 2002.
[12] D. Cross and B. G. Mobasseri, “Watermarking for Self-authentication of Compressed Video,” Proceedings of IEEE International Conference on Image Processing, New York, USA, vol. 2, pp. 913-916, Sept. 2002.
[13] J. Dittmann et al., “Media-independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication,” Proceedings of IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 62-67, March 2002.
[14] C. T. Hsu and J. L. Wu, “DCT-based Watermarking for Video,” IEEE Transactions on Consumer Electronics, vol. 44, issue: 1, pp. 206-216, Feb. 1998.
[15] T. Y. Chung et al., “Digital Watermarking for Copyright Protection of MPEG2 Compressed Video,” IEEE Transactions on Consumer Electronics, vol. 44, issue: 3, pp. 895-901, Aug. 1998.
[16] R. B. Wolfgang, “Perceptual Watermarks for Digital Images and Video,” Proceedings of the IEEE, vol. 87, issue: 7, pp. 1108-1126, July 1999.
[17] M. S. Kankanhalli et al., “Adaptive Visible Watermark of Images,” Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, vol. 1, pp. 568-573, June 1999.
[18] S. P. Mohanty et al., “A DCT Domain Visible Watermarking Technique for Images,” Proceedings of IEEE International Conference on Multimedia and Expo, New York, NY, USA, vol. 2, pp. 1029-1032, Aug 2000.
[19] P. M. Chen, “A Visible Watermarking Mechanism using a Statistic Approach,” Proceedings of 5th International Conference on Signal Processing, Beijing, China, vol. 2, pp. 910-913, Aug. 2000.
[20] J. Meng and S. F. Chang, “Embedding Visible Video Watermarks in the Compressed Domain,” Proceedings of IEEE International Conference on Image Processing, Chicago, IL, USA, vol. 1, pp. 474-477, Oct. 1998.
[21] “Coding of moving picture and associated audio information,” ISO/IEC JTC1/SC29/WG11, ISO/IEC 1318-2, 1996.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔