跳到主要內容

臺灣博碩士論文加值系統

(35.173.42.124) 您好!臺灣時間:2021/07/26 11:38
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:劉鴻勳
研究生(外文):Hung-Hsun Liu
論文名稱:利用可變長度碼改變技術之即時數位視訊版權管理系統
論文名稱(外文):Real Time Digital Video Right Management System Via VLCs Modification Technique
指導教授:張隆紋張隆紋引用關係
指導教授(外文):Long-Wen Chang
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:28
中文關鍵詞:數位版權管理數位浮水印可變長度碼即時性
外文關鍵詞:Digital rights managementDigital watermarkingVLCsReal time
相關次數:
  • 被引用被引用:0
  • 點閱點閱:154
  • 評分評分:
  • 下載下載:9
  • 收藏至我的研究室書目清單書目收藏:0
近年來由於網際網路的蓬勃發展,越來越多的數位內容被廣泛使用,由於數位內容具有容易取得,容易複製,容易假造等特性,如何保障數位內容的擁有者或提供者的權利變成一個很重要的議題。數位版權管理系統用來保護數位內容的版權和商業交易的公平性,數位版權管理系統一般包括數位內容的加密,存取控制,數位複製的限制,版權證明,數位散佈的追蹤等多項機制。數位浮水印提供一個可行的技術,藉由在音樂,影片,影像等多媒體資料中嵌入一不可視的訊號,包括版權證明及數位複製的限制資訊,達到保護數位版權防止非法複製和散佈的目的。因此,數位浮水印在現今數位版權管理系統中扮演重要角色。

數位影片的浮水印技術可以嵌入在未壓縮或已壓縮的數位影片中。由於數位影片內容容量大,解碼和反量化的運算量高,所以我們考慮在已壓縮的數位影片中嵌入浮水印,透過我們所提出的方法,挑選並直接修改適當的可變長度碼,省去反離散餘弦轉換和反量化的高運算量,同時儘量減少可變長度碼修改前後的差異性,達到人眼視覺的不可視性。除此之外,我們兼顧嵌入資訊的安全性,利用私密金鑰和虛擬隨機亂數序列產生器保護嵌入資訊不被第三者所獲知。

實驗上我們以MPEG-1為例,發展出一套即時的數位影片浮水印技術,由於只需透過簡單的查表法且不需要原始影片即可析出影片內所隱藏的資訊,所以析出浮水印的運算量需求極低,因此可以播放影片同時進行浮水印的析出,不僅如此,我們所提出的方法也可以應用在MPEG-2和MPEG-4等數位影片中。
With the rapid growth of the Internet recently, more and more digital content are in widespread use. Because digital content are easily obtained, duplicated, and forged, how to protect the copyright of the digital content providers has become an important issue. Digital rights management systems are required to protect rights and business. DRM systems typically incorporate encryption, conditional access, copy control mechanisms, media identification and distribution tracing. Digital watermarking is a technology which embeds an invisible signal including owner identification and copy control information into multimedia data such as audio, video, images, for copyright protection against illegal copying and distribution. Thus, digital watermarking is an essential component of modern DRM systems.

The watermark can be either embedded in the uncompressed video sequence or the compressed video sequence. In this paper, we embed the watermark in I-pictures of the MPEG video sequence by modifying VLCs (Variable Length Codes) directly to avoid inverse DCT (Discrete Cosine Transform) and inverse quantization. The modification of VLCs is intended to minimize the perceptual degradation of video quality caused by the embedded watermark. Furthermore, our proposed watermarking scheme protects the embedded information by means of a secret key and a PRNG (Pseudo Random Number Generator) to generate a random binary sequence for watermarking.

We apply three MPEG-1 video sequences to test our proposed real-time watermarking scheme for digital video. Since the watermark can be extracted by simple table lookup without using original video sequences, the computational overhead is very small. Therefore, the decoding of the watermarked video sequence can be real time for viewing. The proposed algorithm can be easily applied to MPEG-2 and MPEG-4 videos also.
Abstract
1 Introduction............................................1
2 The MPEG Compression Algorithm
2.1 MPEG layered structure................................3
2.2 MPEG GOP structure....................................4
2.3 Coding of I-pictures..................................5
3 The Proposed Algorithm
3.1 VLCs modification concept.............................9
3.2 The watermark embedding scheme with VLCs modification
concept..............................................13
3.3 The watermark extracting scheme without original video
stream...............................................15
4 Experimental Results...................................17
5 Conclusion.............................................26
Reference
[1] R. Barnett, “Digital watermarking: Applications,
techniques, and challenges,” IEE Electronics &
Communication Engineering Journal, vol.11, no.4,
pp.173-183, 1999.
[2] F. Hartung, M. Kutter, “Multimedia watermarking
techniques,” Proceedings of the IEEE: Special Issue on
Identification and Protection of Multimedia Content 87
(7) (1999) 1079-1107.
[3] R.B. Wolfgang, C.I. Podilchuk, E.J. Delp, “Perceptual
watermarks for digital images and video,” Proceedings
of the IEEE: Special Issue on Identification and
Protection of Multimedia Content 87 (7) (1999) 1108-
1126.
[4] Jian-Chyn Liu, Shu-Yuan Chen, “Fast two-layer image
watermarking without referring to the original image
and watermark,” Image and Vision Computing 19 (2001)
1083-1097.
[5] S. Katzenbeisser, F. Petitcolas, “Information hiding
techniques for steganography and digital
watermarking,” Artech House, Norwood, 2000.
[6] Frank Y. Shih, Scott Y.T. Wu, “Combinational image
watermarking in the spatial and frequency domains,”
Pattern Recognition, vol.36, April 2002.
[7] C.T. Hsu, J.L. Wu, “Hidden digital watermarks in
images,” IEEE Trans. Image Processing, vol.8, no.1,
Jan. 1999, pp.58-68.
[8] Minoru Kuribayashi, Hatsukazu Tanaka, “A new digital
watermarking scheme applying locally the wavelet
transform,” IEICE Trans. Fundamentals, vol.84, no.10,
Oct. 2001.
[9] C.T. Hsu, J.L. Wu, “Image watermarking by wavelet
decomposition,” Academy of Information and Management
Sciences Journal, vol.3, no.1, pp.70-86, 2000.
[10] J.K. Ruanaidh, W.J. Dowling, F.M. Boland, “Phase
watermarking of digital images,” Proc. IEEE Int.
Conf. Image Processing, vol.3, pp.239-242, Laussane,
Sept. 1996.
[11] M. George, J.Y. Chouinard, N.D. Georganas, “Digital
watermarking of images and video using direct sequence
spread spectrum techniques,” Proc. Can. Conf. on
Elec. and Comp. Engg., Edmonton, May 1999.
[12] Tae-Yun Chung, Min-Suk Hong, Young-Nam Oh, Dong-Ho
Shin, Sang-Hui Park, “Digital watermarking for
copyright protection of mpeg2 compressed video,” IEEE
Trans. Consumer Electronics, vol.44, no.3, August 1998.
[13] C.T. Hsu, J.L. Wu, “DCT-based watermarking for
video,” IEEE Trans. Consumer Electronics, vol.44,
no.1, pp.206-216, Feb. 1998.
[14] Frank Hartung, Friedhelm Ramme, “Digital rights
management and watermarking of multimedia content for
m-commerce applications,” IEEE Communications
Magazine, November 2000.
[15] A.O. Waller, G. Jones, T. Whitley, J. Edwards, D.
Kaleshi, A. Munro, B. MacFarlane, A. Wood, “Securing
the delivery of digital content over the Internet,”
Electronics & Communication Engineering Journal,
October 2002.
[16] Gerrit C. Langelaar, Reginald L. Lagendijk, Jan
Biemond, “Real-time labeling of mpeg2 compressed
video,” Visual Communication & Image Representation
Journal, vol.9, no.4, pp.256-270, December 1998.
[17] Y.K. Lee, L.H. Chen, “Secure error-free steganography
for jpeg images,” I.J. Pattern Recognition and
Artificial Intelligence, vol.17, no.6, pp.967-982,
Sept. 2003.
[18] Joan L. Mitchell, William B. Pennebaker, Chad E. Fogg,
Didier J. Legall, “MPEG video compression standard,”
Champman & Hall, 1996.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top