跳到主要內容

臺灣博碩士論文加值系統

(44.192.92.49) 您好!臺灣時間:2023/06/08 07:25
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:楊竣宇
研究生(外文):Chun-Yu Yang
論文名稱:劇院盜錄之位置偵測
論文名稱(外文):Piracy Locating in Cinemas
指導教授:吳家麟
指導教授(外文):Ja-Ling Wu
口試委員:李明穗陳文進
口試委員(外文):Ming-Sui LeeWen-Chin Chen
口試日期:2013-07-10
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:45
中文關鍵詞:劇院盜錄盜錄偵測相機校正
外文關鍵詞:Piracy locatingIn-theatre piracyCamera calibration
相關次數:
  • 被引用被引用:0
  • 點閱點閱:172
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
由於盜版電影的猖獗, 電影業者每年損失上百億美元, 而這些盜
版電影的來源, 則多半是經由手持攝錄影機在劇院內偷拍而來。因
此,過去幾年都在不斷地研究防止盜錄的方法, 而其中之一最有效的
方法就是透過特殊的方法找出盜錄者, 並將其繩之於法。本論文採用
過去的相機校準方法並且提出一套修正的方法, 如此一來, 便可透
過校準的相機, 找出盜錄者的位置。此外,因3D電影畫面重疊的特
性, 電影業者認為3D電影難以盜錄, 但我們將在此論文提出3D電影
的盜錄方法, 並針對此情況,提出有效的定位方法來找出盜錄者。最
後我們建立了一個新的資料庫, 並利用它做了一系列的驗證及實驗來
證明本論文方法的有效性。

Most copyright infringement or piracy in cinemas is committed by recording the theatre screen with handheld camcorders. As a result of piracy, the worldwide motion picture industry lost almost 18.2 billion U.S. dollars annually. Therefore, efforts have been put forth to prevent illicit videotaping using hidden cameras. One of the most effective ways to cease piracy is to directly locate the pirate and hand them to law enforcement officials. Hence,
in this thesis, we solved it by relating this piracy locating problem to the traditional camera calibration problems. Via the traditional camera calibration method and our revised method using constraints especially for cinemas, the pirate location can be estimated. Moreover, by pointing out a potential crisis that even 3D films are recordable, we specifically solve the piracy locating problem for 3D films. Finally, to show the effectiveness of the new methods as well as to compare it with previous ones, we run a series of simulations and experiments based on real positions acquired from our database, which is especially built for this research.

致謝ii
中文摘要iii
Abstract iv
1 Introduction 1
2 Related Works 5
2.1 Locating Piracy via Movie Soundtrack . . . . . . . . . 5
2.2 Locating Piracy via Movie Scene . . . . 6
2.2.1 Watermarking Scheme . . . . . . . . 6
2.2.2 Non-Watermarking Scheme . . . . . . . . . 6
3 Preliminaries 8
3.1 Camera Model . . . . . . . . . . . . . . . . . . 8
3.1.1 Intrinsic Parameters . . . . . . . . . . . . . . . 9
3.1.2 Extrinsic Parameters . . . . . . . . . . . . . . . 9
3.2 2D Homography . . . . . . . . . . . . . . . . . . . 11
4 Piracy Locating 13
4.1 Camera Calibration with One View . . . . . . . . 13
4.1.1 Orthonormal Constraint from R . . . . . . . . . 14
4.1.2 Parallelogram Constraint from Movie Scene . . . . 15
4.2 Camera Calibration with Two Views . . .. . . 18
4.2.1 Separating Two Views . . . . . . . . . . . . . . 18
4.2.2 Combining Two Views . . . . . . . . . . . . . . 18
4.3 Scenario for Piracy Locating . . . . . . . . . . 21
5 Evaluation and Discussion 23
5.1 Establishment of Dataset . . . . . . . . . . 23
5.1.1 Environment . . . . ... . . . . . . . . . . 23
5.1.2 Equipment . . . . . . . . . . . . . . . . . 24
5.1.3 Content . . . . . . . . . . . . . . . . 25
5.2 Evaluation on Simulated Data . . . . . . . . . . . . 25
5.2.1 Effectiveness . . . . . . . . . . . . . . . . . . . 25
5.2.2 Limitation . . . . . . . . . . . . . . . 27
5.3 Experiment on Real Data . . . . . . . . . . . . . . . . . . . 28
6 Conclusions 40
Bibliography 42

[1] http://www.mpaa.org/.
[2] http://www.thebusinessofentertainment.com/index.html.
[3] J. Bloom and C. Polyzois. Watermarking to track motion picture theft. In Signals,
Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar
Conference on, volume 1, pages 363–367 Vol.1, 2004.
[4] P. Bourdon, S. Thiebaud, J.-J. Sacr’e, and D. Doyen. A metamerism-based method to
prevent camcorder movie piracy in digital theaters. In Multimedia and Expo (ICME),
2010 IEEE International Conference on, pages 468–473, 2010.
[5] C.-Y. Chiu, C.-S. Chen, and L.-F. Chien. A framework for handling spatiotemporal
variations in video copy detection. Circuits and Systems for Video Technology, IEEE
Transactions on, 18(3):412–417, 2008.
[6] C.-Y. Chiu, H.-M. Wang, and C.-S. Chen. Fast min-hashing indexing and robust
spatio-temporal matching for detecting video copies. ACM Trans. Multimedia Comput.
Commun. Appl., 6(2):10:1–10:23, Mar. 2010.
[7] B. Chupeau, A. Massoudi, and F. Lefebvre. In-theater piracy: finding where the
pirate was. pages 68190T–68190T–10, 2008.
[8] P. Dong, J. Brankov, N. Galatsanos, Y. Yang, and F. Davoine. Digital watermarking
robust to geometric distortions. Image Processing, IEEE Transactions on,
14(12):2140–2150, 2005.
[9] M. Epstein and D. A. Stanton. Method and device for preventing piracy of video
material from theater screens, US Patent US6529600, March 2003.
[10] J. A. Fancher, D. H. Sitrick, and G. P. Sitrick. Movie film security system utilizing
infrared patterns, US Patent US6559883, May 2003.
[11] M. A. Fischler and R. C. Bolles. Random sample consensus: A paradigm for model
fitting with applications to image analysis and automated cartography. Communications
of the ACM, 24(6):381–395, 1981.
[12] A. Garboan, M. Mitrea, and F. Preteux. Cinematography sequences tracking by
means of fingerprinting techniques. annals of telecommunications - annales des
telecommunications, 68(3-4):187–199, 2013.
[13] J. Haitsma and T. Kalker. A watermarking scheme for digital cinema. In Image
Processing, 2001. Proceedings. 2001 International Conference on, volume 2, pages
487–489 vol.2, 2001.
[14] A. Hampapur, K. Hyun, and R. M. Bolle. Comparison of sequence matching techniques
for video copy detection. pages 194–201, 2001.
[15] M. A. Isnardi, J. Lubin, and M. Tinker. Camcorder jamming techniques using high
frame rate displays, US Patent US20090129746, May 2009.
[16] I. Karybali and K. Berberidis. Efficient spatial image watermarking via new perceptual
masking and blind detection schemes. Information Forensics and Security,
IEEE Transactions on, 1(2):256–274, 2006.
[17] N. Lazic and P. Aarabi. Communication over an acoustic channel using data hiding
techniques. Multimedia, IEEE Transactions on, 8(5):918–924, 2006.
[18] M.-J. Lee, K.-S. Kim, and H.-K. Lee. Digital cinema watermarking for estimating
the position of the pirate. Multimedia, IEEE Transactions on, 12(7):605–621, 2010.
[19] M.-J. Lee, K.-S. Kim, H.-Y. Lee, T.-W. Oh, Y.-H. Suh, and H.-K. Lee. Robust
watermark detection against d-a/a-d conversion for digital cinema using local autocorrelation
function. In Image Processing, 2008. ICIP 2008. 15th IEEE International
Conference on, pages 425–428, 2008.
[20] D. G. Lowe. Distinctive image features from scale-invariant keypoints. Int. J. Comput.
Vision, 60(2):91–110, Nov. 2004.
[21] Y. Nakashima, R. Tachibana, and N. Babaguchi. Maximum-likelihood estimation of
recording position based on audio watermarking. In Intelligent Information Hiding
and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference
on, volume 2, pages 255–258, 2007.
[22] Y. Nakashima, R. Tachibana, and N. Babaguchi. Watermarked movie soundtrack
finds the position of the camcorder in a theater. Multimedia, IEEE Transactions on,
11(3):443–454, 2009.
[23] J. O’Ruanaidh and T. Pun. Rotation, scale and translation invariant digital image
watermarking. In Image Processing, 1997. Proceedings., International Conference
on, volume 1, pages 536–539 vol.1, 1997.
[24] S. Pereira and T. Pun. Robust template matching for affine resistant image watermarks.
Image Processing, IEEE Transactions on, 9(6):1123–1129, 2000.
[25] R. Roopalakshmi and G. R. M. Reddy. A novel spatio-temporal registration framework
for video copy localization based on multimodal features. Signal Processing,
93(8):2339 – 2351, 2013. !ce:title¿Indexing of Large-Scale Multimedia Signals!/
ce:title¿.
[26] D. Wu, X. Zhou, and X. Niu. A novel image hash algorithm resistant to print–scan.
Signal Processing, 89(12):2415 – 2424, 2009. !ce:title¿Special Section: Visual Information
Analysis for Security!/ce:title¿.
[27] T. Yamada, S. Gohshi, and I. Echizen. Ir hiding: A method to prevent video reshooting
by exploiting differences between human perceptions and recording device characteristics. In H.-J. Kim, Y. Shi, and M. Barni, editors, Digital Watermarking,
volume 6526 of Lecture Notes in Computer Science, pages 280–292. Springer Berlin
Heidelberg, 2011.
[28] Z. Zhang, C. Cao, R. Zhang, and J. Zou. Video copy detection based on speeded up
robust features and locality sensitive hashing. In Automation and Logistics (ICAL),
2010 IEEE International Conference on, pages 13–18, 2010.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
1. 夏長樸:〈「發六百年來儒林所不及知者」——全祖望續補《宋元學案》的學術史意義〉,《臺大中文學報》第34期(2011年6月),頁115-144。
2. 黃進興:〈「學案」體裁補論〉,《食貨月刊》,第16卷第9期(1987年12月),頁372-375。
3. 黃進興:〈「學案」體裁產生的思想背景:從李紱的「陸子學譜」談起 〉,《漢學研究》第2卷第1期總第3期(1984年6月),頁201-221。
4. 陳錦忠:〈黃宗羲《明儒學案》著成因緣與其體例性質略探〉,《東海學報》,第25卷(1984年6月),頁111-139。
5. 阮芝生:〈學案體裁源流初探〉,《史原》,第2卷(1971年10月),頁57-75。
6. 陳逢源:〈宋儒聖賢系譜論述之分析——朱熹道統觀淵源考察〉,《政大中文學報》第13期(2010年6月),頁75-115。
7. 陳逢源:〈先秦聖賢系譜論述與儒學歷史意識——朱熹道統觀之淵源考察〉,《國立中央大學人文學報》第41期(2010年1月),頁1-64。
8. 張壽安:〈打破道統.重建學統——清代學術思想史的一個新觀察〉,《中央研究院近代史研究所集刊》第52期(2006年6月),頁53-111。
9. 陳逢源:〈道統的建構——重論朱熹四書編次〉,《東華漢學》第3期(2005年5月),頁223-251。
10. 張永儁:〈宋儒之道統觀及其文化意識〉,《國立臺灣大學文史哲學報》第38期,(1990年12月),頁273-312。
11. 黃進興:〈道統與治統之間:從明嘉靖九年(1530)孔廟改制談起〉,《中央研究院歷史語言研究所集刊》第61本第4分(1990年12月),頁917-941。
12. 黃進興:〈清初政權意識形態之探究:政治化的「道統觀」〉,《中央研究院歷史語言研究所集刊》第58本第1分(1987年3月),頁105-131。
13. 黃進興:〈學術與信仰:論孔廟從祀制與儒家道統意識〉,《新史學》第5卷第2期(1994年6月),頁1-82。