跳到主要內容

簡易檢索 / 詳目顯示

研究生: 李明倫
Ming-lun Li
論文名稱: 應用於H.264/AVC視訊內容認證之適應式數位浮水印
Content-Adaptive Digital Watermarking in H.264/AVC for Video Authentication
指導教授: 蘇柏齊
Po-chyi Su
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
畢業學年度: 95
語文別: 中文
論文頁數: 46
中文關鍵詞: 視訊浮水印H.264/AVC影像內容分析人類視覺模組
外文關鍵詞: video watermarking, Human Visual Model, image content analysis, H.264/AVC
相關次數: 點閱:9下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於數位技術的進步,傳統的類比資料轉為數位格式儲存,不論是收藏或是攜帶都更為便利;網際網路的發達,也促進了數位資料的普及;此外,多媒體編碼技術的進步,數位資料所需的容量越來越小,對於上述的網路傳輸與儲存也變得更為方便。
    然而,數位資料所遇到的問題也接踵而來。由於數位資料易於複製的特性,使用者可以輕易的對其複製散播,使得創作者的智慧財產權受損。更甚者,利用偽造、變更、剪接等方式,對其內容更改,破壞原先內容的含義,進而做為己用。以監視系統為例,數位監視影像因為內容易於更改的特性,大幅降低了影像的公信力與可靠性。因此,我們提出了一個完善的數位浮水印機制,對於數位影像的內容加以驗證,由萃取出的浮水印,可判斷數位影像內容是否遭受竄改、加入畫面、移除畫面或是畫面調換等剪輯攻擊。
    我們以區塊DC值做為畫面之特徵,利用畫面內容分析的方式,判斷畫面場景切換以及影像雜湊值,再由場景內之畫面內容與單一畫面的雜湊值做為浮水印序列的生成參數,利用人類視覺模組依據畫面適應性地調整浮水印能量,在不破壞畫面品質下,盡可能地增強浮水印的強健性。
    利用我們所提出的浮水印方法,嵌入的浮水印將顯示影像畫面或片段的順序,因此任何企圖更改影像片段順序或是以刪除或插入畫面來改變視訊內容的攻擊都將被偵測出來。此外,本研究方法不但能在維持原始影像品質下,對影像內容做有效的驗證,還能夠抵抗重新壓縮等攻擊。我們相信本研究所提出之H.264/AVC視訊壓縮與數位浮水印整合機制,將對建立更完美的多媒體資訊架構作出貢獻。


    Digital contents have become increasingly popular nowadays due to their convenience of transferring and storage. In addition, the rapid growth of broadband networks and advanced coding technologies make creation and distribution of digital contents much easier and faster than ever. However, digital contents can be easily modified and the malicious tampering of data may change the meaning of contents. In this research, we propose a digital watermarking scheme under the framework of H.264/AVC. The watermark is embedded into video frames to ensure the correct frame order. Such attacks as frame dropping, swapping or insertion can be reflected from the unambiguous watermark detection.
    We use DC values of blocks as the features of the image, which can help determine whether a shot change occurs. The image hash value is calculated by content analysis and used to generate the watermark sequence. The watermarking scheme uses a human perceptual model to adjust the watermark energy so that the watermark robustness can be enhanced without degrading the visual quality.
    By integrating the watermarking approach with H.264/AVC, we can make the watermark embedding/detection be done in a very efficient manner. The content-analysis mechanism not only makes the watermark imperceptible but simplifies the watermark detection process. The experimental results show that the embedded watermark can survive transcoding processes such as changing quality parameters or the coding structure. Besides, the frame modification attacks will be revealed by the successful watermark extraction.

    第一章 緒論 1 1-1 研究目的與動機 1 1-2 論文架構 3 第二章 相關技術探討 4 2-1 數位浮水印之相關簡介 4 2-1-1 數位浮水印的需求與應用 6 2-1-2 視訊浮水印簡介 9 2-2 H.264/AVC視訊編碼標準簡介 11 2-2-1 H.264/AVC編解碼流程 12 2-2-2 H.264/AVC關鍵技術 15 第三章 數位浮水印架構 16 3-1 浮水印嵌入與偵測 16 3-1-1 以人類視覺模組提升浮水印嵌入品質 17 3-1-2 畫面DC圖生成 20 3-2 視訊浮水印嵌入流程 22 3-2-1 浮水印序列生成 24 3-2-2 視訊浮水印嵌入步驟 29 3-3 視訊浮水印偵測與驗證流程 30 3-3-1 畫面DC圖重建 30 3-3-2 浮水印序列重建 31 3-3-3 視訊浮水印偵測 31 3-3-4 視訊浮水印偵測步驟 31 3-4 利用浮水印對視訊畫面之驗證 32 第四章 實驗結果 37 4-1 實驗環境參數 37 4-2 嵌入浮水印之影像品質評估 37 4-3 浮水印偵測結果 39 4-4 利用影像重新編碼之攻擊 40 第五章 結論與未來工作展望 43 第六章 參考文獻 44

    [1]J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying,” in Proc. Infocom’94, pp. 1278–1287
    [2] L. F. Turner, “Digital data security system,” Patent IPN WO 89/08915, 1989.
    [3] M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. IEEE ICIP, vol. I, Santa Barbara, CA, Oct. 1997, pp. 680–683.
    [4] M. Schneider and S. F. Chang, “A robust content based digital signature for image authentication,” in Proc. IEEE ICIP, vol. III, Lausanne, Switzerland, Sept. 1996, pp. 227–230.
    [5] E. T. Lin, c. I. Podilchuk and E. J. Delp, “Detection of image alterations using semi-fragile watermarks,” Proc. of the SPIE Int. Con. on Security and Watermarking of Multimedia Contents II, Vol. 3971, 2000.
    [6] K. 1. Hashida and A. Shiozaki, “A method of embedding robust watermarks into digital color images”, IElCE Trans. Fundamentals, Vol. E81-, NO. IO, pp. 2133-3237, 1998
    [7] I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. on Image Processing, pp. 1673-1687, 1997.
    [8] C.S. Lu, S.K. Huang, C.J. Sze, and H.Y.M. Liao., “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, pp.209-224, Dec. 2000.
    [9] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., vol. 66, no. 3, pp. 283–301, May 1998.
    [10] T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A video watermarking system for broadcast monitoring,” in Proc. SPIE—SecurityWatermarking Multimedia Contents, vol. 3657, pp. 103–112 , 1999
    [11] F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun., vol. 2952, Oct. 1996, pp. 205–213.
    [12] M. Swanson, B. Zhu, and A. Tewfik, “Multiresolution video watermarking using perceptual models and scene segmentation,” in Proc. IEEE Int. Conf. Image Processing 1997 (ICIP ’97), vol.2, Santa Barbara, CA, Oct. 1997, pp. 558–561.
    [13] Eckhard Koch and Jian Zhao, “Towards robust and hidden image copyright labeling,” in IEEE international Workshop on Nonlinear Signal and Image Processing, pp.452-455, Marmaras, Greece, Jun. 1995.
    [14] F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun., vol. 2952, Oct. 1996, pp. 205–213.
    [15] F. Hartung and B. Girod, “Fast public-key watermarking of compressed video,” in Proc. IEEE Int. Conf. on Image Processing 1997 (ICIP ’97), vol. 1, Santa Barbara, CA, Oct. 1997, pp. 528–531.
    [16] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, no. 3, pp. 283–301, May 1998.
    [17] F. Hartung, J. K. Su, and B. Girod, “Spread spectrum watermarking: Malicious attacks and counterattacks,” in Proc. SPIE Security and Watermarking of Multimedia Contents 99, San Jose, CA, Jan. 1999.
    [18] F. Jordan, M. Kutter, and T. Ebrahimi, “Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video,” ISO/IEC Doc. JTC1/SC29/WG11 MPEG97/M2281, July 1997.
    [19] A. M. Alattar, E. T. Lin, and M. U. Celik, "Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video," IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp. 787-800, August 2003.
    [20] Noorkami, Maneli; Mersereau, Russell M. “Towards robust compressed-domain video watermarking for H.264” Security, Steganography, and Watermarking of Multimedia Contents VIII. Edited by Delp, Edward J., III; Wong, Ping Wah. Proceedings of the SPIE, Volume 6072, pp. 489-497 (2006).Feb 2006.
    [21] Ingemar J. Cox Matthew L. Miller Jeffery A. Bloom; DIGITAL WATERMARKING, p215-p218.
    [22] G. Qiu, P. Marziliano, A. T. Ho, D. He, and Q. Sun, “A hybrid watermarking scheme for H.264/AVC video,” in Proceedings of the 17th International Conference on Pattern Recognition, 4, pp. 865–868, Aug. 2004.
    [23] M. Noorkami and R. M. Mersereau, “Compressed-domain video watermarking for H.264,” in Proceedings of International Conference on Image Processing (ICIP),Genoa,Italy, Sep. 2005.
    [24] G.-Z. Wu and Y.-J. Wang, “Robust watermark embedding/detection algorithm for H.264,” Journal of Electronic Imaging 14, Jan. 2005.
    [25] A. B. Watson, “Perceptual optimization of DCT color quantization matrices,” in Proc. IEEE Int. Conf. Image Processing, Austin, TX, 1994.

    QR CODE
    :::