跳到主要內容

臺灣博碩士論文加值系統

(44.220.251.236) 您好!臺灣時間:2024/10/05 12:05
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:呂嘉雄
研究生(外文):Chia-Hsiung Liu
論文名稱:脆弱性浮水印在多媒體壓縮之完整性驗證
論文名稱(外文):Integrity Verification of Compressed Multimedia with Fragile Watermarks
指導教授:陳自強陳自強引用關係
指導教授(外文):Oscal T.–C. Chen
學位類別:博士
校院名稱:國立中正大學
系所名稱:電機工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:97
語文別:英文
論文頁數:131
中文關鍵詞:碎弱性浮水印H.264浮水印G.723.1浮水印內容相依性浮水印
外文關鍵詞:G.723.1 watermarkH.264 watermarkcontent-dependent watermarkFragile watermark
相關次數:
  • 被引用被引用:0
  • 點閱點閱:307
  • 評分評分:
  • 下載下載:20
  • 收藏至我的研究室書目清單書目收藏:0
隨著數位化時代的來臨,數位錄音和錄影設備由於使用方便已在日常生活中被廣泛使用,而法院也漸漸接受數位多媒體資料作為證物,然而數位資料易拷貝和儲存的優點卻也產生另一個嚴重的威脅,由於數位多媒體的格式大多是對外公開,故惡意人士只需要修改部分錄音或是錄影的二進位內容,便可以創造出偽造的資料,並進而利用這些偽造過的資料陷害無辜的人士入獄。

在資料中加入碎弱性浮水印是解決上述數位資料易遭到變造的方法之一。在本論文中我們首先提出一套內容相依性浮水印產生機制,利用這套浮水印產生機制,我們可以偵測出數位資料遭到插入、移除和取代竄改的位置,也能判別出惡意人士所使用的竄改方式。除此之外,我們並嘗試改變語音訊號中激發訊號的位置,以便在語音壓縮過程中加入一碎弱性浮水印,根據我們以G.723.1為平台的實驗結果,加入浮水印後對音質之損失並不明顯。除了語音浮水印加入技術外,本文亦針對H.264視訊壓縮標準提出專屬的浮水印加入法,根據實驗結果,該浮水印加入法對於晝質和位元率的影響皆有限。除外,我們更進一步整合上述的語音浮水印和視訊浮水印的技術,形成一音視訊整合浮水印,以保護音視訊資料的完整性。綜合本文所提的各項技術,我們將可提高惡意人士竄改數位資料的難度。
With the advantage of easy copy, storage and, transmission, digital recorders based on compression techniques almost replace analog recording devices in various applications, such as surveillance systems and voice recorders. The media data recorded by these digital devices are also acceptable in a law court. However, these benefits from digital recorders may open a gate to Hell. Techniques of some media compression standards are open so that people can easily change the recorded information, causing someone to be arrested because of the faked data.
Fragile watermark skill is one of the tools to take care of this problem. In this thesis, a content-dependent watermark generating scheme is proposed. By using this scheme, insertion, deletion, and replacement attacks executed in the time domain can be detected. Additionally, two watermark embedding schemes are proposed in this thesis. One can hide information into Code-Excited Linear Prediction (CELP) based compressed speech data; the other can conceal watermarks in H.264 compressed video data. Both of them embed watermarks during the encoding processes and induce low quality decays. Finally, the techniques of speech watermarking and video watermarking schemes are integrated to become a speech-visual watermarking scheme to further protect integrity of speech-visual data. With the abovementioned schemes, it is difficult for the attacker to fake the recorded media data.
CHAPTER 1 INTRODUCTION 1
CHAPTER 2 REVIEW OF WATERMARK TECHNIQUES 7
2.1 REVIEW OF WATERMARK EMBEDDING SCHEMES 7
2.1.1 Low Bit Modulation 8
2.1.2 Spread Spectrum Modulation 9
2.1.3 Quantizer Index Modulation 13
2.1.4 Reversible Watermark 16
2.2 REVIEW OF CONTENT-DEPENDENT WATERMARKING METHODS 17
2.2.1 Block-Based Framework 18
2.2.2 Hierarchical-Based Framework 20
2.2.3 Region-Based Framework 22
2.3 SUMMARY 26
CHAPTER 3 SPEECH WATERMARKING 29
3.1 INTRODUCTION 29
3.2 THEORETICAL FOUNDATION OF CONVENTIONAL WATERMARKS 32
3.3 PROPOSED WATERMARKING SCHEME 37
3.3.1 Design Concept 37
3.3.2 Introduction to G.723.1 Speech Codec and Hash Function 40
3.3.3 Watermark Generation 42
3.3.4 Watermark Embedding 45
3.3.5 Watermark Extraction 48
3.3.6 Watermark Verification 49
3.3.7 Determination of Manner and Location of Attack 50
3.4 RELIABILITY EVALUATION 55
3.4.1 Probability of Missing an Attacked Segment 56
A Probability that a Counterfeited Intersection not Identified 56
B Probability of Missing the First Frame in Each Group 59
3.4.2 Number of Misjudged Frames 61
3.5 COMPUTER SIMULATIONS 61
3.5.1 Preparation 61
3.5.2 Evaluation of Speech Quality 62
3.5.3 Verification Performance of Watermarks 63
3.5.4 Comparison between Proposed and Conventional Schemes 65
3.6 SUMMARY 75
CHAPTER 4 VIDEO WATERMARKING 77
4.1 INTRODUCTION 77
4.2 INTER AND INTRA-PREDICTION OF H.264/AVC 80
4.3 DATA HIDING IN THE INTER-PREDICTION MODE 81
4.3.1 Design Concept 81
4.3.2 Block Type Grouping for Watermarking 86
4.4 DATA HIDING IN THE INTRA-PREDICTION MODE 90
4.4.1 Design Concept 90
4.4.2 Block Type Grouping for Watermarking 91
4.5 PROCEDURE OF PROPOSED WATERMARK EMBEDDING SCHEME 96
4.6 VIDEO WATERMARK EXAMPLE 99
4.7 COMPUTER EXPERIMENTS 101
4.7.1 Performance Evaluations 101
4.7.2 Performance Comparisons 103
4.8 SUMMARY 108
CHAPTER 5 DISCUSSION AND CONCLUSION 109
5.1 DISCUSSION ON SPEECH-VISUAL WATERMARKING 109
5.1.1 Introduction 109
5.1.2 Proposed Speech-Visual Watermarking Scheme 110
5.2 CONCLUSION 111
REFERENCES 113
APPENDIX A: PUBLICATIONS OUT OF THE DISSERTATION WORK 119
VITA 121
[1]Advisory Panel on White House Tapes (1974), Report on a Technical Investigation Conducted for the U.S. District Court for the District of Columbia. [Online]. Available: http://www.aes.org/aeshc/docs/forensic.audio/watergate.
tapes.report.pdf.
[2]Wikipedia, Watergate tapes. [Online]. Available: http://en.wikipedia.org/wiki/
Watergate_tapes.
[3]Oxford University Press, Oxford English Dictionary. [Online]. Available: http://www.oed.com/.
[4]Ingemar J. Cox, Matthew L. Miller and Jeffrey A. Bloom, Digital watermarking and steganography, 2 ed. London: Elsevier, 2008.
[5]Wikipedia, Watermark. [Online]. Available: http://en.wikipedia.org/wiki/
Watermark.
[6]Min-Jen Tsai, Kuang-Yao Yu and Yi-Zhang Chen, "Joint wavelet and spatial transformation for digital watermarking," IEEE Transactions on Consumer Electronics, vol. 46, pp. 237, 2000.
[7]J. Sun and J. Liu, "Data hiding with video independent components," Electronics Letters, vol. 40, pp. 858-859, 2004.
[8]Ruizhen Liu and Tieniu Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Transactions on Multimedia, vol. 4, pp. 121-128, 2002.
[9]Sang-Kwang Lee and Yo-Sung Ho, "Digital audio watermarking in the cepstrum domain," IEEE Transactions on Consumer Electronics, vol. 46, pp. 744-750, 2000.
[10]M. Alghoniemy and A. H. Tewfik, "Geometric Invariance in image watermarking," IEEE Transactions on Image Processing, vol. 13, pp. 145-153, 2004.
[11]Dong Ping, J. G. Brankov, N. P. Galatsanos, Yang Yongyi and F. Davoine, "Digital watermarking robust to geometric distortions," IEEE Transactions on Image Processing, vol. 14, pp. 2140-2150, 2005.
[12]A. Takahashi, R. Nishimura and Y. Suzuki, "Multiple watermarks for stereo audio signals using phase-modulation techniques," Signal Processing, IEEE Transactions on [see also Acoustics, Speech, and Signal Processing, IEEE Transactions on], vol. 53, pp. 806-815, 2005.
[13]O. T.-C. Chen and Wen-Chih Wu, "Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme," IEEE Transactions on Audio, Speech, and Language Processing, vol. 16, pp. 629-638, 2008.
[14]D.J. Coumou and G. Sharma, "Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking," IEEE Transactions on Information Forensics and Security, vol. 3, pp. 153-165, 2008.
[15]M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multimedia data-embedding and watermarking technologies," Proceedings of the IEEE, vol. 86, pp. 1064-1087, 1998.
[16]G. C. Langelaar, I. Setyawan and R. L. Lagendijk, "Watermarking digital image and video data. A state-of-the-art," IEEE Signal Processing Magazine, vol. 17, pp. 20-46, 2000.
[17]C. I. Podilchuk and E. J. Delp, "Digital watermarking: algorithms and applications," IEEE Signal Processing Magazine, vol. 18, pp. 33-46, 2001.
[18]P. Moulin and J.A. O''Sullivan, "Information-theoretic analysis of information hiding," IEEE Transactions on Information Theory, vol. 49, pp. 563-593, 2003.
[19]P. Moulin and R. Koetter, "Data-Hiding Codes," Proceedings of the IEEE, vol. 93, pp. 2083-2126, 2005.
[20]F. Cayre, C. Fontaine and T. Furon, "Watermarking Security: Theory and Practice," IEEE Transactions on Signal Processing, vol. 53, pp. 3976-3987, 2005.
[21]Borko Furht and Darko Kirovski, Multimedia watermarking techniques and applications. Boca Raton, FL: Auerbach Publications, 2006.
[22]H. S. Malvar and D. A. F. Florencio, "Improved spread spectrum: a new modulation technique for robust watermarking," IEEE Transactions on Signal Processing, vol. 51, pp. 898-905, 2003.
[23]I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, 1997.
[24]I.J. Cox, M.L. Miller and A.L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, vol. 87, pp. 1127-1141, 1999.
[25]J.R. Hernandez and F. Perez-Gonzalez, "Statistical analysis of watermarking schemes for copyright protection of images," Proceedings of the IEEE, vol. 87, pp. 1142-1166, 1999.
[26]Qiang Cheng and T. S. Huang, "Robust optimum detection of transform domain multiplicative watermarks," IEEE Transactions on Signal Processing, vol. 51, pp. 906-924, 2003.
[27]P. Moulin and A. Ivanovic, "The zero-rate spread-spectrum watermarking game," IEEE Transactions on Signal Processing, vol. 51, pp. 1098-1117, 2003.
[28]R.B. Wolfgang, C.I. Podilchuk and E.J. Delp, "Perceptual watermarks for digital images and video," Proceedings of the IEEE, vol. 87, pp. 1108-1126, 1999.
[29]M. Kutter and S. Winkler, "A vision-based masking model for spread-spectrum image watermarking," IEEE Transactions on Image Processing, vol. 11, pp. 16-25, 2002.
[30]Wei Liu, Lina Dong and Wenjun Zeng, "Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking," IEEE Transactions on Information Forensics and Security, vol. 2, pp. 645-654, 2007.
[31]P. Bassia, I. Pitas and N. Nikolaidis, "Robust audio watermarking in the time domain," IEEE Transactions on Multimedia, vol. 3, pp. 232-241, 2001.
[32]B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory, vol. 47, pp. 1423-1443, 2001.
[33]F. Bartolini, M. Barni and A. Piva, "Performance analysis of ST-DM watermarking in presence of nonadditive attacks," IEEE Transactions on Signal Processing, vol. 52, pp. 2965-2974, 2004.
[34]F. Perez-Gonzalez, C. Mosquera, M. Barni and A. Abrardo, "Rational dither modulation: a high-rate data-hiding method invariant to gain attacks," IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
[35]Qiao Li and I.J. Cox, "Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking," IEEE Transactions on Information Forensics and Security, vol. 2, pp. 127-139, 2007.
[36]Martin Steinebach and Jana Dittmann, "Watermarking-Based Digital Audio Data Authentication," Eurasip Journal on Applied Signal Processing, vol. 2003, pp. 1001-1015, 2003.
[37]Michiel van der Veen, Fons Bruekers, Arno Van Leest and Stephane Cavin, "High Capacity Reversible Watermarking for Audio," in Proceeding of Security and Watermarking of Multimedia Contents, 2003. pp. 1.
[38]Ping Wah Wong, "A public key watermark for image verification and authentication," in Proceeding of International Conference on Image Processing, 1998. pp. 455-459 vol.1.
[39]Ping Wah Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, pp. 1593-1601, 2001.
[40]M. Utku Celik, G. Sharma, E. Saber and A. Murat Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Transactions on Image Processing, vol. 11, pp. 585-595, 2002.
[41]A. Nikolaidis and I. Pitas, "Region-based image watermarking," IEEE Transactions on Image Processing, vol. 10, pp. 1726-1740, 2001.
[42]Chih-Wei Tang and Hsueh-Ming Hang, "A feature-based robust digital image watermarking scheme," IEEE Transations on Signal Processing, vol. 51, pp. 950-959, 2003.
[43]J. Zhong and S. Huang, "An Enhanced Multiplicative Spread Spectrum Watermarking Scheme," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 1491-1506, 2006.
[44]P. Comesana and F. Perez-Gonzalez, "The impact of the cropping attack on scalar STDM data hiding," IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.
[45]L. Prez-Freire, F. Prez-Gonzlez, T. Furon and P. Comesaa, "Security of Lattice-Based Data Hiding Against the Known Message Attack," IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.
[46]E. Izquierdo and V. Guerra, "An ill-posed operator for secure image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 842-852, 2003.
[47]Chuhong Fei, D. Kundur and R.H. Kwong, "Analysis and design of secure watermark-based authentication systems," IEEE Transactions on Information Forensics and Security, vol. 1, pp. 43-55, 2006.
[48]Chung-Ping Wu and C. C. J. Kuo, "Speech content integrity verification integrated with ITU G.723.1," in Proceeding of IEEE International Conference on Information Technology: Coding and Computing, 2001. pp. 680-684.
[49]Chung-Ping Wu and C. C. J. Kuo, "Fragile speech watermarking based on exponential scale quantization for tamper detection," in Proceeding of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2002. pp. 3305-3308.
[50]Song Yuan and Sorin A. Huss, "Audio watermarking algorithm for real-time speech integrity and authentication," in Proceeding of the Multimedia and Security Workshop, 2004. pp. 220.
[51]Zhe-Ming Lu, Yan Bin and Sheng-He Sun, "Watermarking combined with CELP speech coding for authentication," IEICE Transactions on Information and Systems, vol. 88, pp. 330-334, 2005.
[52]Toshiyuki Sakai and Naohisa Komatsu, "Digital watermarking based on process of speech production," in Proceeding of Security, Steganography, and Watermaking of Multimedia Contents, 2004. pp. 127-137.
[53]Chia-Hsiung Liu and O. T. C. Chen, "Fragile speech watermarking scheme with recovering speech contents," in Proceeding of IEEE Midwest Symposium onCircuits and Systems, 2004. pp. 165-168.
[54]Chia-Hsiung Liu and O. T. C. Chen, "A content-based fragile watermark scheme for speech waveform authentication," in Proceeding of IEEE Midwest Symposium on Circuits and Systems, 2005. pp. 432-435.
[55]M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, pp. 432-441, 2000.
[56]C. T. Li, "Digital fragile watermarking scheme for authentication of JPEG images," IEE Proceedings on Vision, Image and Signal Processing, vol. 151, pp. 460-466, 2004.
[57]G. Yuval, "How to swindle Rabin," Cryptologia, vol. 3, pp. 187-190, 1979.
[58]P. S. L. M. Barreto, H. Y. Kim and V. Rijmen, "Toward secure public-key blockwise fragile authentication watermarking," IEE Proceedings on Vision, Image and Signal Processing, vol. 149, pp. 57-62, 2002.
[59]I. T. Union, ITU-T Recommendation G.723.1, 1996.
[60]R. Rivest, "The md5 message digest algorithm," FRC 1321, 1992.
[61]William Stallings, Cryptography and Network Security: Principles and Practice, 1999.
[62]A. S. Spanias, "Speech coding: a tutorial review," Proceedings of the IEEE, vol. 82, pp. 1541-1582, 1994.
[63]Mordechai T. Abzug, MD5 Homepage (unofficial). [Online]. Available: http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html.
[64]I. T. Union, "ITU-T Recommendation P.862," 2001.
[65]R.V. Cox and P. Kroon, "Low bit-rate speech coders for multimedia communication," IEEE Communications Magazine, vol. 34, pp. 34-41, 1996.
[66]Maneli Noorkami and Russell M. Mersereau, "A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance," IEEE Transactions on Information Forensics and Security, vol. 2, pp. 14-23, 2007.
[67]M. Noorkami and R. M. Mersereau, "Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase," Information Forensics and Security, IEEE Transactions on, vol. 3, pp. 441-455, 2008.
[68]A. Golikeri, P. Nasiopoulos and Z.J. Wang, "An improved scalar quantization-based digital video watermarking scheme for H.264/AVC," in Proceeding of IEEE International Symposium on Circuits and Systems, 2006. pp. 5 pp.
[69]Jing Zhang and Anthony T. S. Ho, "Efficient Robust Watermarking of Compressed 2-D Grayscale Patterns for H.264/AVC," in Proceeding of IEEE Workshop on Multimedia Signal Processing, 2005. pp. 1-4.
[70]Cong-Van Nguyen, D.B.H. Tay and Guang Deng, "A Fast Watermarking System for H.264/AVC Video," in Proceeding of IEEE Asia Pacific Conference on Circuits and Systems, 2006. pp. 81-84.
[71]Yang Hu, Chuntian Zhang and Yuting Su, "Information Hiding Based on Intra Prediction Modes for H.264/AVC," in Proceeding of IEEE International Conference on Multimedia and Expo, 2007. pp. 1231-1234.
[72]R. Iqbal, S. Shirmohammadi and Jiying Zhao, "Hard Authentication of H.264 Video Applying MPEG-21 Generic Bitstream Syntax Description (gBSD)," in Proceeding of IEEE International Conference on Multimedia and Expo, 2007. pp. 875-878.
[73]S.K. Kapotas, E.E. Varsaki and A.N. Skodras, "Data Hiding in H. 264 Encoded Video Sequences," in Proceeding of IEEE Workshop on Multimedia Signal Processing, 2007. pp. 373-376.
[74]T. Wiegand, G.J. Sullivan, G. Bjontegaard and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 560-576, 2003.
[75]Karsten Suhring, H.264/AVC Reference Software. [Online]. Available: http://iphome.hhi.de/suehring/tml/download/.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top