跳到主要內容

臺灣博碩士論文加值系統

(98.84.18.52) 您好!臺灣時間:2024/10/15 04:26
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:簡國峰
研究生(外文):Kuo-Feng Chien
論文名稱:在MPEG-4視訊上做資訊隱藏之研究及其在版權保護及安全監控上之應用
論文名稱(外文):A Study on Information Hiding in MPEG4 Videos and Applications to Copyright Protection and Security Surveillance
指導教授:蔡文祥蔡文祥引用關係
指導教授(外文):Wen-Hsiang Tsai
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學與工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
畢業學年度:94
語文別:英文
論文頁數:98
中文關鍵詞:視訊資訊隱藏安全監控數位浮水印
外文關鍵詞:MPEG-4Information hidingWatermarkingVideoSurveillance
相關次數:
  • 被引用被引用:0
  • 點閱點閱:226
  • 評分評分:
  • 下載下載:21
  • 收藏至我的研究室書目清單書目收藏:0
隨著多媒體科技與計算機網路的快速發展,越來越多的多媒體資料利用網際網路傳輸。本論文針對MPEG-4視訊檔案利用資訊隱藏及數位浮水印技術做版權保護、驗證及資料連結之研究與應用。在版權保護方面,我們提出一個利用主動式可視浮水印技術及限制影片播放次數的方法對被下載到客戶端的MPEG-4視訊檔案做直接性的版權保護。在視訊驗證方面,我們利用資訊隱藏的技術針對監控視訊檔案作完整性與真實性的驗證,因為監控視訊檔案裡可能會出現有嫌疑或犯罪的行為,經常成為非法使用者惡意破壞或修改的對象。在資料連結方面,我們提出一個有效率的搜尋方法在監控視訊檔案中找出可疑的動作或是特定的人物,藉由資訊隱藏的技術在視訊檔案裡藏進索引資料。最後我們提出了相關的實驗結果證明了所提方法之可行性。
With the advance of multimedia technologies and the popularity of computer networks, more and more multimedia data, especially digital videos, are transmitted through the Internet quickly. In this study, several methods for information hiding applications, namely, copyright protection, authentication, and data association, are proposed using MPEG-4 videos as cover media. For copyright protection, in order to protect the ownership of downloaded videos at the client site, a method using an active visible watermarking technique and limiting video play counts is proposed. Due to the insecurity of transmitting data on the Internet, receivers cannot make sure that digital videos received from the Internet are authentic. Therefore, an authentication method for verifying the integrity and fidelity of MPEG-4 videos, especially of surveillance videos, is proposed next. Because a surveillance video might contain scene frames including suspicious or criminal acts, malicious users might tamper with it for misrepresentation. Therefore, an effective method for searching a surveillance video for infrequent motions or specific events using an information hiding technique is proposed finally. Good experimental results show the feasibility of the proposed methods.
Chapter 1 Introduction 1
1.1 Motivation 1
1.2 General Review of Related Works 2
1.3 Overview of Proposed Methods 3
1.3.1 Terminologies 3
1.3.2 Brief Descriptions of Proposed Methods 4
1.4 Contributions 6
1.5 Thesis Organization 6
Chapter 2 Review of Related Works and MPEG-4 Standard 7
2.1 Review of Techniques for Visible Watermarking in Video 7
2.2 Review of Techniques for Active Agent 7
2.3 Review of Techniques for Video Authentication 8
2.4 Review of Techniques for Video Data Hiding 9
2.5 Review of MPEG-4 Standard 9
2.5.1 Brief Descriptions of MPEG-4 Standard 9
2.5.2 Structure of MPEG-4 Video Bitstream 11
Chapter 3 Copyright Protection of MPEG-4 Videos by Active Watermarking and Limited Play Counts 13
3.1 Introduction 13
3.1.1 Problem Definition 14
3.1.2 Proposed Idea and System Configuration 14
3.2 Scheme for Video Play-Count Limitation 16
3.2.1 Idea of Proposed Scheme 16
3.2.2 Detailed Algorithm 17
3.3 Embedding Visible Watermarks in MPEG-4 Videos 20
3.3.1 Proposed Idea 20
3.3.2 Process for Embedding Visible Watermarks in I Frames 21
3.3.3 Process for Embedding Visible Watermarks in P and B Frames 23
3.4 Recovery of Original Videos by Removing Visible Watermarks 27
3.4.1 Process for Extraction of Personal Data 27
3.4.2 Process for Recovery of I Frames 28
3.4.3 Process for Recovery of P and B Frames 30
3.5 Experimental Results 32
3.6 Discussions and Summary 38
Chapter 4 Authentication of Surveillance Video Sequences and Contents by Hiding Motion Vector Information 39
4.1 Introduction 39
4.1.1 Problem Definition 40
4.1.2 Proposed Idea of Authentication 41
4.2 Embedding of Authentication Signals in Surveillance Videos 42
4.2.1 Principle of Authentication Signals 42
4.2.2 Process for Generating Authentication Signals by Analyzing Motion Vectors in P Frames 43
4.2.3 Process for Embedding Authentication Signals in I Frames 46
4.3 Authentication of Video Sequences and Contents 49
4.3.1 Idea for Authentication 49
4.3.2 Process for Extracting Authentication Signals Using Voting Technique 51
4.3.3 Detection and Verification of Temporal Tampering for Suspected Videos 54
4.3.4 Detection and Verification of Spatial Tampering for Suspected Videos 55
4.4 Experimental Results 59
4.5 Discussion and Summary 63
Chapter 5 Searches of Motions in Surveillance Videos by Image Watermarking Technique 64
5.1 Introduction 64
5.1.1 Problem Definition 65
5.1.2 Proposed Idea 65
5.2 Detection and Classification of Moving Objects 66
5.2.1 Review of Employed Method of Human Detection 66
5.2.2 Detailed Algorithm 68
5.3 Real-Time Embedding of Moving Object Information 71
5.3.1 Principle of Proposed Method 71
5.3.2 Proposed Embedding Process 72
5.4 Extraction of Moving Object Information 74
5.4.1 Principle of Proposed Method 74
5.4.2 Proposed Extraction Process 75
5.5 Experimental Results 77
5.6 Discussions and Summary 79
Chapter 6 Searches of Targeted Persons in Recorded Videos by Hiding of Special Information 81
6.1 Introduction 81
6.1.1 Problem Definition 82
6.1.2 Proposed Idea and System Configuration 83
6.2 Review of Smart Card Techniques 83
6.2.1 A Brief Introduction to Smart Cards 83
6.2.2 Reading Personal Identification Data from Smart Cards 84
6.3 Real-time Embedding of Personal Identification Data into Videos 86
6.3.1 Principle of Proposed Method 87
6.3.2 Proposed Embedding Process 87
6.4 Experimental Results 90
6.5 Discussions and Summary 93
Chapter 7 Conclusions and Suggestions for Future Works 94
7.1 Conclusions 94
7.2 Suggestions for Future Works 95
References 96
[1] J. Meng and S. F. Chang, “Embedding Visible Video Watermarks in the Compressed Domain,” Proceedings of IEEE International Conference on Image Processing, Chicago, IL, USA, vol. 1, pp. 474-477, Oct. 1998.

[2] M. S. Kankanhalli et al., “Adaptive Visible Watermarking of Images,” Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, vol. 1, pp. 568-573, June 1999.

[3] S. P. Mohanty et al., “A DCT Domain Visible Watermarking Technique for Images,” Proceedings of IEEE International Conference on Multimedia and Expo, New York, NY, USA, vol. 2, pp. 1029-1032, Aug. 2000.

[4] P. M. Chen, “A Visible Watermarking Mechanism using A Statistic Approach,”, Proceedings of IEEE International Conference on Signal Processing, Beijing, China, vol. 2, pp. 910-913, Aug. 21-25, 2000.

[5] H. Y. Chen and W. H. Tsai, “Verification of MPEG Video Contents by Random Signal Hiding,” Proceedings of IPPR Conference on Computer Vision, Graphics, and Image Processing, Kinmen, Taiwan, pp. 692-701, Aug. 16-18, 2003.

[6] M. Schneider and S. F. Chang, “A Robust Content Based Digital Signature for Image Authentication,” Proceedings of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 3, pp. 227-230, Sept. 1996.

[7] D. He et al., “An Object Based Watermarking Solution for MPEG4 Video Authentication,” Proceedings of IEEE International Symposium on Acoustics, Speech, and Signal Processing, Hong Kong, vol. 3, pp. 537-540, Apr. 6-10, 2003.

[8] F. Bartolini et al., “Image Authentication Techniques for Surveillance Applications”, Proceedings of the IEEE, vol. 89, issue: 10, pp. 1403-1418, Oct. 2001.

[9] P. Yin and H. H. Yu, “A Semi-fragile Watermarking System for MPEG Video Authentication,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, Florida, USA, vol. 4, pp. 3461-3464, May 2002.

[10] R. Du and J. Fridrich, “Lossless Authentication of MPEG-2 Video,” Proceedings of IEEE International Conference on Image Processing, New York, NY, USA, vol. 2, pp. 893-896, Sept. 2002.

[11] D. A. Winne et al., “Spatial Digital Watermark for MPEG-2 Video Authentication and Tamper Detection,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, Florida, USA, vol. 4, pp. 3457-3460, May 2002.

[12] J. Dittmann et al., “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, vol. 2, pp. 209-213, June 1999.

[13] H. H. Yu, et al., “Smart Media: Empower Media with Active Data Hiding,” Proceedings of 6th International Computer Science Conference on Active Media Technology, Hong Kong, China, Vol. 2252, pp. 5-16, December 19-29, 2001.

[14] N. K. Lo and W. H. Tsai, “A Study on Active Information Hiding and Applications,” Master Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, June, 2004.

[15] Y. C. Chuang and W. H. Tsai, “Active Information Hiding in FLASH and HTML Files,” Master Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, June, 2005.

[16] J. J. Chae and B. S. Manjunath, “Data Hiding in Video,” Proceedings of IEEE International Conference of Image Processing, Kobe, Japan, vol. 1, pp. 311-315, Dec 1999.

[17] F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, vol. 66, pp. 283-301, 1998.

[18] A. Giannoula and D. Hatzinakos, “Compressive Data Hiding For Video Signals,” Proceedings of IEEE International Conference of Image Processing, Barcelona, Spain, vol. 1, pp. 529-532, Sept. 14-17, 2003.

[19] Y. Wang and A. Pearmain, “Robust Data Hiding in MPEG-2 Video Against Transcoding,” Proceedings of EUROSIP Conference of Video/Image Processing and Multimedia Communications, Zagreb, Croatia, vol. 2, pp. 695-700, July 2-5, 2003.

[20] J. Y. Lee and S. I. Yoo, “An Elliptical Boundary Model for Skin Color Detection,” Proceedings of The International Conference on Imaging Science, Systems, and Technology, Las Vegas, USA, pp. 579-584, June 2002.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊