跳到主要內容

簡易檢索 / 詳目顯示

研究生: 陳堃彰
Kun-Zhang Chen
論文名稱: 適用於壓縮視訊串流服務之溯源數位浮水印設計
Design of Fingerprinting Watermark in Digital Compressed Videos for Streaming Services
指導教授: 蘇柏齊
Po-Chyi Su
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2017
畢業學年度: 105
語文別: 中文
論文頁數: 63
中文關鍵詞: 數位浮水印數位智權保護視訊串流追蹤
外文關鍵詞: digital watermark, digital rights management, video streaming, tracking
相關次數: 點閱:23下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著網路多媒體視訊串流的蓬勃發展,數位多媒體內容易於複製和散佈,如何保障視訊著作權不受非法侵害日趨成為相當重要的議題,而數位浮水印技術被視為一種有效的防範措施。本論文提出實作於視訊串流服務中的數位視訊浮水印設計。透過在壓縮域嵌入浮水印訊號代表合法視訊接收者的相關身分資訊,有效協助追蹤非法視訊拷貝的散佈來源。運用部分解碼、嵌入處理和視訊編碼將浮水印訊號嵌入在視訊畫格中的特定區域,這些區域採用特徵或感興趣點來決定,有助於後續浮水印偵測。藉由嵌入訊號的自我相似特性,使浮水印偵測不需要原始視訊比對。利用移位浮水印設計,根據嵌入訊號的互相關函數表示不同位元,藉此提高浮水印攜載資訊容量。嵌入訊號理當能承受一定程度的轉碼處理或幾何形變轉換攻擊。為了實現視訊串流應用的需求,我們考量浮水印的視覺感知程度、容量、強健性和偵測方法,實驗結果也顯示我們提出架構的可行性。


    With the expeditious development of digital video streaming over the Internet, avoiding the infringement of copyright and illegal distribution of videos has become increasingly important. Digital watermarking techniques may provide an effective solution. In this study, we propose a practical design of fingerprinting watermarking scheme for video streaming services. In order to track the source of the illegal redistribution, we embed the watermark signal representing the identity of a legitimate video recipient in the compressed domain of the transmitted videos. Once a pirated copy is found somewhere, the embedded fingerprint can uniquely determine the malicious subscriber. For the sake of less computational complexity in the streaming server, compressed video would be decoded partially and embedded with the fingerprint in the quantization indices, and then re-encoded. Since the blind detection is performed in the proposed scheme, the feature point extraction such as SURF is necessarily employed to determine the embedding positions of the watermarks, so that embedding and detection can be synchronized against geometrically deformed video. The autocorrelation function is introduced to figure out whether a watermark exists or not, and the message is read by the cross-correlation function. The experimental results demonstrate the feasibility of the proposed scheme.

    中文摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii 目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii 圖目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v 表目錄 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii 一 、 緒論 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 研究動機與目的 . . . . . . . . . . . . . . . . . . . . . 1 1.2 研究貢獻 . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 論文架構 . . . . . . . . . . . . . . . . . . . . . . . . . 3 二 、 相關研究與文獻回顧 . . . . . . . . . . . . . . . . . . . 4 2.1 數位浮水印的應用和需求 . . . . . . . . . . . . . . . . 4 2.2 視訊浮水印相關發展 . . . . . . . . . . . . . . . . . . . 5 三 、 基礎框架與情境 . . . . . . . . . . . . . . . . . . . . . 8 四 、 研究方法 . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.1 決定浮水印嵌入區域 . . . . . . . . . . . . . . . . . . . 12 4.1.1 SURF演算法簡介 . . . . . . . . . . . . . . . . . . . . 13 4.1.2 特徵點分群 . . . . . . . . . . . . . . . . . . . . . . . . 19 4.1.3 選擇浮水印嵌入區域 . . . . . . . . . . . . . . . . . . . 21 4.2 浮水印訊號 . . . . . . . . . . . . . . . . . . . . . . . . 24 4.2.1 浮水印嵌入演算法 . . . . . . . . . . . . . . . . . . . . 24 4.2.2 利用浮水印週期性結構偵測 . . . . . . . . . . . . . . . 26 4.2.3 偵測時以多數決投票機制選擇特徵點 . . . . . . . . . 28 4.3 攜載多位元 . . . . . . . . . . . . . . . . . . . . . . . . 29 4.3.1 可行的解決辦法 ──「Patchwork」 . . . . . . . . . . . 29 4.3.2 利用相關聯的隱藏訊號之方法 . . . . . . . . . . . . . 30 4.3.3 決定峰值的8個位置 . . . . . . . . . . . . . . . . . . . 32 五 、 實驗結果與討論 . . . . . . . . . . . . . . . . . . . . . 35 5.1 實驗環境與各項參數設定 . . . . . . . . . . . . . . . . 35 5.2 利用多張影像模擬場景變換測試 . . . . . . . . . . . . 36 5.2.1 訊號嵌入 . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.2.2 浮水印視訊之失真度測試 . . . . . . . . . . . . . . . . 37 5.2.3 視訊未經攻擊之訊號偵測 . . . . . . . . . . . . . . . . 38 5.2.4 視訊遭攻擊後之訊號偵測 . . . . . . . . . . . . . . . . 40 5.2.5 討論較嚴重的攻擊狀況 . . . . . . . . . . . . . . . . . 41 5.3 探究討論 . . . . . . . . . . . . . . . . . . . . . . . . . 43 六 、 結論 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 參考文獻 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    [1] W. Zeng, H. Yu, and C.-Y. Lin, Multimedia Security Technologies for Digital
    Rights Management. Elsevier, 2006.
    [2] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking
    and Steganography. Morgan Kaufmann, 2007.
    [3] K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting
    Forensics for Traitor Tracing. Hindawi, 2005.
    [4] F. Hartung and B. Girod, “Digital watermarking of raw and compressed
    video,” Proc. SPIE Digital Compression Technologies and Systems for Video
    Communication, pp. 205–213, 1996.
    [5] ——, “Watermarking of MPEG-2 encoded video without decoding and reencoding,”
    Proceedings Multimedia Computing and Networking (MMCN),
    1997.
    [6] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “A video watermarking
    system for broadcast monitoring,” in Proc. SPIE, Security and Watermarking
    of Multimedia Contents, vol. 3657, Apr. 1999, pp. 103–112.
    [7] V. Darmstaedter, J.-F. Delaigle, D. Nicholson, and B. Macq, “A block based
    watermarking technique for MPEG-2 signals: Optimization and validation on
    real digital TV distribution links,” in Proc. European Conference Multimedia Applications, Services and Techniques, Berlin, Germany, May 1998, pp. 190–
    206.
    [8] J. Dittmann, M. Stabenau, and R. Steinmetz, “Robust MPEG video watermarking
    technologies,” in Proc. ACM Multimedia, Bristol, U.K., Sep. 1998,
    pp. 71–80.
    [9] T.-Y. Chung, M.-S. Hong, Y.-N. Oh, D.-H. Shin, and S.-H. Park, “Digital
    watermarking for copyright protection of MPEG-2 compressed video,” IEEE
    Transaction on Consumer Electronics, vol. 44, pp. 895–901, 1998.
    [10] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, and M. G. Strintzis,
    “Compressed-domain video watermarking of MPEG streams,” in IEEE Int.
    Conf. Multimedia and Expo., vol. 1, 2002, pp. 569–572.
    [11] G. C. Langelaar and R. L. Lagendijk, “Optimal differential energy watermarking
    of DCT encoded images and video,” IEEE Trans. on Image Processing,
    vol. 10, no. 1, pp. 148–158, Jan. 2001.
    [12] M. Barni, F. Bartolini, and N. Checcacci, “Watermarking of MPEG-4 video
    objects,” vol. 7, no. 1, pp. 23–32, 2005.
    [13] M.-J. Lee, D.-H. Im, H.-Y. Lee, K.-S. Kim, and H.-K. Lee, “Real-time video
    watermarking system on the compressed domain for high-definition video
    contents: Practical issues,” Digital Signal Processing, vol. 22, no. 1, pp. 190–
    198, 2012.
    [14] L. Wang, H. Ling, F. Zou, and Z. Lu, “Real-time compressed-domain video
    watermarking resistance to geometric distortions,” IEEE Multimedia, vol. 19,
    no. 1, pp. 70–79, 2012.
    [15] J. Zhang, A. Ho, G. Qiu, and P. Marziliano, “Robust video watermarking of
    H.264/AVC,” vol. 54, pp. 205–209, February 2007.
    [16] A. Mansouri, A. Aznaveh, F. Torkamani-Azar, and F. Kurugollu, “A low
    complexity video watermarking in H.264 compressed domain,” IEEE Trans.
    on Inf. Forensics and Security, vol. 5, pp. 649– 657, Dec. 2010.
    [17] M. Noorkami and R. M. Mersereau, “A framework for robust watermarking
    of H.264-encoded video with controllable detection performance,” IEEE
    Trans. on Inf. Forensics and Security, vol. 2, pp. 14–23, Mar. 2007.
    [18] G.-Z. Wu, Y.-J. Wang, and W.-H. Hsu, “Robust watermark embedding/detection
    algorithm for H.264 video,” vol. 14, Jan.-Mar. 2005.
    [19] P.-C. Su, C.-S. Wu, I.-F. Chen, C.-Y. Wu, and Y.-C. Wu, “A practical design of
    digital video watermarking in H.264/AVC for content authentication,” Signal
    Processing: Image Communication, vol. 26, no. 8-9, pp. 413–426, 2011.
    [20] J. J. K. Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital
    image watermarking,” Signal Processing, vol. 66, no. 3, pp. 303–317, May
    1998.
    [21] M. Manoochehri, H. Pourghassem, and G. Shahgholian, “A novel synthetic
    image watermarking algorithm based on discrete wavelet transform
    and fourier-mellin transform,” in Communication Software and Networks
    (ICCSN), 2011 IEEE 3rd International Conference on, May 2011, pp. 265–
    269.
    [22] E. Tsougenis, G. Papakostas, D. Koulouriotis, and V. Tourassis, “Towards
    adaptivity of image watermarking in polar harmonic transforms domain,” Optics
    and Laser Technology, vol. 54, pp. 84 – 97, 2013.
    [23] M. Ali and C. Ahn, “An optimized watermarking technique based on selfadaptive
    de in dwt-svd transform domain,” Signal Processing, vol. 94, no. 1,
    pp. 545–556, 2014.
    [24] G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, “Reversible
    watermarking based on invariant image classification and dynamic
    histogram shifting,” IEEE Transactions on Information Forensics and Security,
    vol. 8, no. 1, pp. 111–120, 2013.
    [25] A. A. Mohammad, “A new digital image watermarking scheme based on
    schur decomposition,” Multimedia Tools and Applications, vol. 59, no. 3,
    pp. 851–883, 2012.
    [26] S. Pereira and T. Pun, “Robust template matching for affine resistant image
    watermarks,” IEEE Trans. Image Process, vol. 9, no. 6, pp. 1123–1129, Jun
    2000.
    [27] M. Kutter, “Watermarking resisting to translation, rotation, and scaling,” in
    SPIE The International Society for Optical Engineering, vol. 3528, 1999, pp.
    423–431.
    [28] P.-C. Su and C.-C. J. Kuo, “Synchronized detection of the block-based watermark
    with invisible grid embedding,” in SPIE Photonics West, San Jose,
    CA, Jan. 2001, pp. 423–431.
    [29] M. Kutter, S. Bhattacharjee, and T. Ebrahimi, “Towards second generation
    watermarking schemes,” in IEEE International Confernece on Image Process,
    vol. 1, 1999, pp. 320–323.
    [30] X. Wang, J. Wu, and P. Niu, “A new digital image watermarking algorithm
    resilient to desynchronization attacks,” IEEE Transactions on Information
    Forensics and Security, vol. 2, no. 4, pp. 655–663, 2007.
    [31] D. Zheng, S. Wang, and J. Zhao, “RST invariant image watermarking al
    gorithm with mathematical modeling and analysis of the watermarking processes,”
    IEEE Transactions on Image Processing, vol. 18, no. 5, pp. 1055–
    1068, 2009.
    [32] H. Tian, Y. Zhao, R. Ni, L. Qin, and X. Li, “LDFT-based watermarking resilient
    to local desynchronization attacks,” IEEE Transactions on Cybernetics,
    vol. 43, no. 6, pp. 2190–2201, Dec 2013.
    [33] H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, “Speeded-up robust features,”
    Computer Vision and Image Understanding, vol. 110, no. 3, pp. 346–359,
    2008.
    [34] D. Arthur and S. Vassilvitskii, “K-means++: The advantages of careful seeding,”
    in Proceedings of the Eighteenth Annual ACM-SIAM Symposium on
    Discrete Algorithms. Philadelphia, PA, USA: Society for Industrial and
    Applied Mathematics, 2007, pp. 1027–1035.
    [35] J. M. S. Prewitt, “Object enhancement and extraction,” Picture Processing
    and Psychopictorics, pp. 75–149, 1970.
    [36] S. Montabone and A. Soto, “Human detection using a mobile platform and
    novel features derived from a visual saliency mechanism,” Image and Vision
    Computing, vol. 28, no. 3, pp. 391 – 402, 2010.
    [37] L. Tong, F. Dai, Y. Zhang, and J. Li, “Prediction restricted H.264/AVC video
    scrambling for privacy protection,” Electronics letters, vol. 46, no. 1, pp. 47–
    49, 2010.
    [38] P.-C. Su, Y.-C. Chang, and C.-Y. Wu, “Geometrically resilient digital image
    watermarking by using interest point extraction and extended pilot signals,”
    IEEE Trans. on Inf. Forensics and Security, vol. 8, no. 12, pp. 1897–1908,
    Dec. 2013.
    [39] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Multibit digital watermarking
    robust against local nonlinear geometrical distortions,” in IEEE International
    Conference on Image Processing, Thessaloniki, Greece, 2001, pp.
    999–1002.
    [40] J. S. Lim, Two-Dimensional Signal and Image Processing. Prentice Hall,
    1990.
    [41] W. Bender, D. Gruhl, Morimoto, and A. Lu, “Techniques for data hiding,”
    IBM Systems Journal, vol. 35, no. 3-4, pp. 313–336, 1996.
    [42] K. Sühring, “H.264/AVC Software JM 18.6,” http://iphome.hhi.de/suehring/
    tml/, 2014, [Online] Available.
    [43] H. Jegou, M. Douze, and C. Schmid, “Hamming embedding and weak geometry
    consistency for large scale image search,” in Proceedings of the 10th
    European conference on Computer vision, vol. 5302. Marseille, France:
    Springer, Oct 2008, pp. 304–317.
    [44] B. Institute, “Tears of Steal,” https://mango.blender.org/download/, 2012,
    [Online] Available.
    [45] Xiph.org, “Video Test Media,” https://media.xiph.org/video/derf/, 2016,
    [Online] Available.

    QR CODE
    :::