跳到主要內容

臺灣博碩士論文加值系統

(3.231.230.177) 您好!臺灣時間:2021/07/28 14:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:李建緯
研究生(外文):Jian-Wei Lee
論文名稱:運用動態臨界值且可抵抗串連攻擊的多頻帶視訊浮水印
論文名稱(外文):Collusion-resistant Multi-channel Video watermarking using Blind threshold
指導教授:許秋婷許秋婷引用關係
指導教授(外文):Chiou-Ting Hsu
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:63
中文關鍵詞:浮水印動態臨界值串連攻擊多頻帶視訊
相關次數:
  • 被引用被引用:0
  • 點閱點閱:75
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
中文摘要
  在本篇論文中,提出了一個有效的數位視訊浮水印的方法。數位視訊浮水印在許多應用領域上扮演著很重要的角色,例如拷貝控制、使用者身份識別、以及廣播監控等等。視訊浮水印相對於影像浮水印的主要困難處在於多了時間軸這一項元素;攻擊端可利用此項資訊去破壞所藏入數位浮水印的內容,或是達到使偵測端無法正確偵測數位浮水印所在的位置。
我們的方法主要是根據各視訊畫面內容來執行空間局部數位浮水印的藏入,因此可抵抗線性串連攻擊和數位浮水印位置不同調的問題。為了能夠增強對其他一般攻擊(如:模糊攻擊及壓縮攻擊)的抵抗力,我們運用區塊機制來產生所要藏入的數位浮水印。此外,為了改善在相同的浮水印藏入強度下視訊的品質,我們根據人眼視覺系統以相對不同的強度將浮水印藏入不同的頻帶裡。最後,我們利用了一個動態臨界值來決定偵測浮水印的結果。實驗結果證實了上述的機制可以有效的抵抗空間軸上平均濾波器的攻擊、時間軸上數個畫面平均的攻擊、以及動態影像壓縮的攻擊。
ABSTRACT
This paper proposes an effective approach for video watermarking. Video watermarking plays an important role in many applications such as copy control, owner identification, broadcast monitoring, and so on. The main difficulty comes from the temporal dimension because it provides useful information for attackers to remove or desynchronize the embedding watermark.
We propose a video watermarking method motivated from the spatially localized image-dependent (SLIDE) sub-frame watermarking system to resist the linear collusion attacks and de-synchronization attacks. In order to enhance the robustness to other common attacks, such as averaging and compression attacks, we generate watermarks by the block-based mechanism. In addition, in order to improve the imperceptibility under the same embedding strength, we embed watermarks in multi-channels by Human Visual System (HVS). Finally, we employ a blind threshold technique to determine the detection result. Our experimental results demonstrate that the above mechanisms are effective to resist spatial average filtering attacks, temporal frame averaging attacks, and MPEG compression attacks.
REFERENCES
[1] K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility for Collusion-resistant Digital Video Watermarking–PartⅠ: Theoretical considerations,” http://ee.tamu.edu/~deepa/pdf/kundur1.pdf.
[2] K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility for Collusion-resistant Digital Video Watermarking–PartⅡ: A Novel Approach,” http://ee.tamu.edu/~deepa/pdf/kundur2.pdf.
[3] C. Harris, and M. Stephen, "A combined corner and edge detector," Proc. Of 4th Alvey Vision Conf., pp. 147-151, Aug. 1988.
[4] D. Simitopoulos, D. Koutsonanos, and M. G. Strintzis, “Robust Image Watermarking Based on Generalized Radon Transformations,” IEEE Trans. Circuits and Systems for Video Technology, vol. 13, no.8, pp.732-745, Aug. 2003.
[5] M. Barni, F. Bartolini, and A. Piva, “Multichannel Watermarking of Color Images,” IEEE Trans. Circuits and Systems for Video Technology, vol. 12, no. 3, pp. 142-156, Mar. 2002.
[6] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, vol. 66, no. 3, pp. 357-372, May 1998.
[7] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann Publisher, 2001.
[8] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
[9] E. T. Lin, and E. J. Delp, “Temporal synchronization in video watermarking,” Security and Watermarking of Multimedia Contents Ⅳ, Proc. SPIE, vol. 4675, pp. 478-490, Apr. 2002.
[10] K. Su, D. Kundur, and D. Hatzinakos, “A novel approach to collusion-resistant video watermarking,” Security and Watermarking of Multimedia Contents Ⅳ, Proc. SPIE, vol. 4675, pp. 491-502, Jan. 2002.
[11] F. Deguillaume, G. Csuka, and T. Pun, “Countermeasures for unintentional and intentional video watermarking attacks,” Security and Watermarking of Multimedia Contents Ⅱ, Proc. SPIE, vol. 3971, pp. 346-357, Jan. 2000.
[12] F. Hartung, and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, vol. 66, pp. 283-301, 1998.
[13] Mitchell D. Swanson, Bin Zhu, and Ahmed T. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 540-550, May 1998.
[14] R. C. Gonzalez, and R. E. Woods, Digital Image Processing 2nd, Tom Robbins Publisher, 2001.
[15] G. Doërr, and J.L. Dugelay, “A guide tour of video watermarking,” Signal Processing: Image Communication, vol. 18, no. 4, pp. 263-282, Apr. 2003.
[16] D. Kundur, and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proc. IEEE Internet. Conf. Image Processing ’97, pp. 544-547, Oct. 1997.
[17] Brian Chen and Gregory W. Wornell, “Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia,” Journal of VLSI signal processing, vol. 27, pp. 7-33, 2001.
[18] A. M. Alattar, E. T. Lin, and M. U. Celik, “Digital Watermarking of Low Bit-Rate Advanced Simple Profile MPEG-4 Compressed Video,” IEEE Trans. Circuit and System for Video Technology, vol. 13, no.8, pp.787-800, Aug. 2003.
[19] J. R. Hernandez and F. Perez-Gonzalez, “Statistical analysis of watermarking schemes for copyright protection of images,” Proc. IEEE, vol. 87, pp. 1142-1143, Jul. 1999.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top