跳到主要內容

臺灣博碩士論文加值系統

(44.220.44.148) 您好!臺灣時間:2024/06/18 14:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:賴正偉
研究生(外文):Cheng-Wei Lai
論文名稱:嵌入動作向量場並作位元率-失真最小化的易碎視訊浮水印技術
論文名稱(外文):Fragile Video Watermarking Technique by Motion Field Embedding with Rate-Distortion Minimization
指導教授:郭天穎郭天穎引用關係
指導教授(外文):Tien-Ying Kuo
口試委員:楊士萱黃文增黃文吉
口試委員(外文):Shih-Hsuan YangWen-Tzeng HuangWen-Jyi Hwang
口試日期:2006-07-26
學位類別:碩士
校院名稱:國立臺北科技大學
系所名稱:電機工程系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:62
中文關鍵詞:視訊浮水印H.264標準動作向量易碎浮水印位元率-失真最小化
外文關鍵詞:Video WatermarkingH.264Motion VectorFragile WatermarkingRate-Distortion Minimization
相關次數:
  • 被引用被引用:0
  • 點閱點閱:112
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
最新的視訊壓縮標準H.264採用了可變區塊大小的動作補償,相較於傳統固定區塊大小的動作補償,不僅精確地表示影像中物件的位移,亦提供了更多浮水印嵌入位置的選擇性。本論文中,我們提出一個嵌入於動作向量的易碎視訊浮水印技術。在一般的視訊浮水印技術,大部份把浮水印嵌入於量化後離散餘弦轉換的係數,而僅少部份嵌入於動作向量上,本論文選擇把浮水印嵌入於動作向量,以應用其易碎的特性。我們引入H.264的R-D 成本函數並以統計方式找出適合嵌入動作向量的位置,再用前一張圖框所產生的特徵嵌入於目前圖框的動作向量,以完成其易碎性。我們的浮水印技術在偵測浮水印的時候不需要原來影像的資料,即可判斷出被修改的部份。從實驗結果可證明,我們的浮水印技術可保持最佳的低視訊品質,並具有相當好的易碎性。
Compared with the fixel size block size motion compensation in traditional vedio codec, the variable block size motion compensation in H.264/AVC can not only precisely represent the true motion activity in a macroblock, but also provide more positions for watermark embedding. In literature, most of watermarking techniques embedded watermarks in quantized discrete cosine transform coefficients, while the works related to embedding watermark in motion vector are few. In this thesis, we proposed a fragile video watermarking technique to embed information in motion vector by exploiting its the fragile nature. Based on the statistical analysis of the motion vector using the H.264 Rate-Distortion cost function, we can find out the best locations of motion vectors to embed the extracted feature of the previous video frame, and achieve the fragility. Our scheme does not need the original video sequence for watermark detection. Experimental results show that our watermarking technique can keep the perceptual quality at best effort and still has good fragility.
摘 要 i
ABSTRACT ii
誌 謝 iv
目 錄 v
表目錄 vi
圖目錄 vii
第一章 緒論 1
1.1研究動機與目的 1
1.2 論文組織架構 1
第二章 浮水印相關簡介 3
2.1 時間域及頻率域浮水印簡介 3
2.2 易碎及半易碎浮水印簡介 7
第三章 H.264之相關簡介 12
3.1 H.264之模式決策與動作向量預測 12
3.2 H.264之整數離散餘弦轉換及量化 18
第四章 利用統計動作向量特性嵌入於H.264視訊影像之易碎浮水印 20
4.1 易碎浮水印編碼端演算法 21
4.1.1 萃取浮水印特性 21
4.1.2浮水印嵌入位置的選擇 23
4.1.3私密鑰匙 30
4.1.4浮水印嵌入演算法 30
4.2 易碎浮水印解碼端演算法 31
4.2.1浮水印取出演算法 31
4.2.2 易碎浮水印驗證方法 32
第五章 實驗結果 33
5.1浮水印技術嵌入區域比較 33
5.2浮水印嵌入方法比較 40
5.3浮水印技術文獻比較 47
5.4攻擊實驗 54
5.5實驗結果分析 56
第六章 結論及未來工作 57
參考文獻 58
[1] I. J. Cox, J. A. Bloom and M. L. Miller, “Digital Watermarking,” Principles & Practice, Morgan Kaufmann, 2001.
[2] Z. Zhu, G. Jiang, M. Yu, and X. Wu, “New Algorithm for Video Watermarking,” in Proc. IEEE Int. Conf. on Signal Processing, vol.1, pp. 760 – 763, 26-30 Aug. 2002.
[3] Z. Zhu, G. Jiang, M. Yu, and X. Wu, “New Adaptive Algorithm for Video Watermarking,” in Proc. IEEE Int. Conf. on Computers, Communications, Control and Power Engineering, vol. 1, pp.152 – 155, Oct. 2002.
[4] Y. J. Dai, L. H. Zhang, and Y. Yang, “A New Method of MPEG Video Watermarking Technology,” in Proc. IEEE Int. Conf. on Communication Technology, vol. 2, pp.1845-1847 Apr. 2003.
[5] J. Zhang, J. Li, and L. Zhang , “Video Watermark Technique in Motion Vector, ” in Proc. IEEE Int. Conf. on Computer Graphics and Image, pp. 179 – 182, 15-18 Oct. 2001.
[6] Z. Zhao, N. Yu, and X. Li, “A Novel Video Watermarking Scheme in compressed Domain Based on Fast Motion Estimation,” in Proc. IEEE Int. Conf. on Communication Technology, Apr. 2003.
[7] G. Qiu, P. Marziliano, A. T. S. Ho, D. He, and Q. Sun, “A Hybrid Watermarking Scheme for H.264/AVC Video,” in Proc. IEEE Int. Conf. on Pattern Recognition, vol. 4, pp. 865-868, 23-26 Aug. 2004.
[8] H. X. Wang, Y. N. Li, Z. M. Lu, and S. H. Sun, “Compressed Domain Video Watermarking in Motion Vector,” International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, vol. 3682, pp. 580-586, Melbourne, Australia, 14-16 September, 2005.
[9] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, and M.G. Strintzis, “Compressed Domain Video Watermarking of MPEG Streams,” in Proc. IEEE Int. Conf. on Multimedia and Expo, vol. 1, pp. 569-572, 26-29 Aug. 2002.
[10] C. S. Lu, J. R. Chen, H. Y. Liao, and C. F. Kuo, “Real-Time MPEG2 Video Watermarking in the VLC Domain,” in Proc. IEEE Int. Conf. on Pattern Recognition, vol. 2, pp. 552-555, 11-15 Aug. 2002.
[11] S. W. Kim and S. Suthaharan, “An Entropy Masking Model for Multimedia Content Watermarking,” in Proc. IEEE Int. Conf. on System Sciences, pp. 182-187, 5-8 Jan. 2004.
[12] Q. Li and I. J. Cox, “Using Perceptual Models to Improve Fidelity and Provide Invariance to Valumetric Scaling for Quantization Index Modulation Watermarking,” in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, vol. 2, pp. 1-4, 18-23 Mar. 2005.
[13] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, no. 3, pp. 283-301, May 1998.
[14] A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-Based Watermark Recovering Without Resorting to the Uncorrupted Original Image,” in Proc. IEEE Int. Conf. on Image Processing, vol. 1, pp. 520-523, 26-29 Oct. 1997.
[15] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Watermarking by DCT coefficient removal: a statistical approach to optimal parameter setting,” in Proc. SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, Jan. 1999.
[16] A. Tirkel, G. Rankin, R. V. Schyndel, W. Ho, N. Mee, and C. Osborne, “Electronic Water Mark,” in Proc. DICTA 1993.
[17] P. W. Wong, “A public key watermark for image verification and authentication,” in Proc. IEEE Int. Conf. on Image Processing, vol. 1, Chicago, USA, Oct. 1998.
[18] P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, Oct. 2001.
[19] S. Walton, “Information Authentication for a Slippery New Age,” Dr. Dobbs Journal, vol. 20, pp.18-26, 1995.
[20] P. Yin and H. H. Yu, “Classification of Video Tampering Methods and Countermeasures Using Digital Watermarking,” Proc. SPIE, Multimedia Systems and Applications IV, vol. 4518, pp. 239-246, 2001.
[21] P. Yin and H. H. Yu, “A Semi-fragile Watermarking System for MPEG Video Authentication,” IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4, pp. 3461-3461, 13-17 May 2002.
[22] S. Thiemert, H. Sahbi, and M. Steinebach, “Applying Interest Operators in Semi-fragile Video Watermarking,” Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, Jan. 2005.
[23] Y. Dai, S. Thiemert, and M. Steinebach, “Feature-based Watermarking Scheme for MPEG-I/II Video Authentication,” Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004.
[24] G. Bjontegaar, “Recommended Simulation Condition for H.26L,” ITU-T Q6/SG16, Doc.#VCEG-L38, 9-12 Jan, 2001.
[25] G. Bjontegaard, “Calculation of Average PSNR Differences between RD-curves,” ITU-T Q6/SG16 Doc. #VCEG-M33, 2-4 Apr. 2001.


[26] Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG, “Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264 | ISO/IEC 14496-10 AVC),” ITU-T | ISO/IEC, 2003.
[27] JM Reference Software 9.2, http://bs.hhi.de/~suehring/tml/.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top