| 研究生: |
陳穎凡 Ing-fan Chen |
|---|---|
| 論文名稱: |
植基於數位浮水印之H.264/AVC視訊內容驗證機制 The H.264/AVC Video Content Authentication Scheme by Using Digital Watermarking |
| 指導教授: |
蘇柏齊
Po-chyi Su |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 畢業學年度: | 97 |
| 語文別: | 英文 |
| 論文頁數: | 69 |
| 中文關鍵詞: | 數位浮水印 、H.264/AVC 、資料隱藏 、場景轉換偵測 |
| 外文關鍵詞: | Scene-change detection, Digital watermark, H.264/AVC, Information hiding |
| 相關次數: | 點閱:15 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
數位科技的快速發展與先進的資料壓縮技術讓視訊資料的儲存與傳輸變得更為便捷,數位攝影機已經取代了傳統類比式錄影設備而廣泛運用於各種應用中。然而,數位資料易於編修的特性卻使其真實性受到若干質疑。在視訊資料中,片段的插入、刪除、更換或互換是最常見也最容易施行的攻擊方式,這樣的攻擊可在不被察覺的情形下改變資料的內容。本研究針對此類攻擊提出一個基於數位浮水印之視訊內容驗證機制,我們透過數位浮水印的嵌入與正確的偵測與驗證,來確認該視訊的內容順序。在本機制中,數位浮水印在視訊資料被壓縮的過程中被嵌入而在解壓縮的過程中被偵測以增加運算效率。H.264/AVC優異的編碼效能使其被廣泛地運用於多種場合,我們因此選擇將數位浮水印機制建構於H.264/AVC之上。
為了達成浮水印有效嵌入與偵測,以及避免檔案大小的增加,我們將浮水印訊號嵌入於非零的量化係數上,而數位浮水印資訊則包含了影片片段的序號。為了避免浮水印的嵌入造成影片畫質下降,我們根據Watson''s視訊模型中的亮度遮罩(luminance masking)來調整浮水印的能量,在不影響人眼視覺的情況下增加浮水印的強健度。此外,我們也偵測場景轉換畫面以其產生能夠適度抵抗失真壓縮的雜湊數,再利用此雜湊數產生擾亂浮水印的序列,一方面可以達到浮水印嵌入和偵測的同步,另一方面也增加了浮水印的安全性。在論文中我們對浮水印嵌入與偵測的方式做深入討論,以期確實能實作於H.264/AVC中,並達成預期目標。實驗結果顯示藉由數位浮水印的方式可協助驗證數位影片的完整性與真實性。
Digitization of videos brings a lot of convenience to the transmission and archiving of visual data. However, the ease of manipulation of digital videos gives rise to some concerns about their authenticity, especially when digital videos are employed in the applications of surveillance. In this research, we try to tackle this problem by using the digital watermarking techniques. A practical digital video watermarking scheme for authenticating the H.264/AVC compressed videos is proposed to ensure their correct content order. The watermark signals, which represent the serial numbers of video segments, are embedded into nonzero quantization indices of frames to achieve both the effectiveness of watermarking and the compact data size. The human visual characteristics are taken into account to guarantee the imperceptibility of watermark signals and to attain an efficient implementation in H.264/AVC. The issues of synchronized watermark detections are settled by selecting the shot-change frames for calculating the distortion-resilient hash, which helps to determine the watermark sequence. The experimental results demonstrate the feasibility of the proposed scheme as the embedded watermarks can survive the allowed transcoding processes while the edited segments in the tampered video can be located.
[1] B.B. Zhu, M.D. Swanson, and A.H. Tewfik. When seeing isn’t believing - current multimedia authentication technologies and their applications. In IEEE Signal Processing Magazine, volume 21, pages 40–49, Mar. 2004.
[2] F. Bartolini, A. Tefas, M. Barni, and I. Pitas. Image authentication techniques for surveillance applications. In Proc. IEEE, volume 89, pages 1403–1418, Oct. 2001.
[3] Ingemar Cox, Matthew Miller, and Jeffrey Bloom. Digital Watermarking: Principles and Practice. Morgan Kaufmann, 2001.
[4] F. Hartung and M. Kutter. Multimedia watermarking techniques. Proc. IEEE, 87:1079–1107, 1999.
[5] M. D. Swanson, M. Kobayashi, and A. H. Tewfik. Multimedia data embedding and watermarking technologies. Proc. IEEE, 86:1064–1087, 1998.
[6] R. B.Wolfgang, C. I. Podilchuk, and E. J. Delp. Perceptual watermarking for digital images and video. Proc. IEEE, 87:1108–1126, 1999.
[7] Gang Qiu, P. Marziliano, A.T.S Ho, Dajun He, and Qibin Sun. A hybrid watermarking scheme for H.264/AVC video. In Proceedings of the 17th International Conference on Pattern Recognition, ICPR, volume 4, pages 865–868, August 2004.
[8] Guo-Zua Wu, Yi-Jung Wang, and Wen-Hsing Hsu. Robust watermark embedding/detection algorithm for H.264 video. In Journal of Electronic Imaging, volume 14, Jan.-Mar. 2005.
[9] Ming Yang and N. Bourbakis. A high bitrate information hiding algorithm for digital video content under H.264/AVC compression. In IEEE Int. Sym. On Circuits and Systems, volume 2, pages 935–938, August 2005.
[10] M. Noorkami and R. M. Mersereau. Compressed-domain video watermarking for H.264. In Proceedings of the International Conference on Image Processing, ICIP, volume 2, pages 890–893, September 2005.
[11] M. Noorkami and R. M. Mersereau. A framework for robust watermarking of H.264-encoded video with controllable detection performance. In IEEE Trans. Inf. Forensics Security, volume 2, pages 14–23, Mar. 2007.
[12] Maneli Noorkami and Russell M. Mersereau. Digital video watermarking in P-frames with controlled video bit-rate increase. In IEEE Trans. on Information Forensics and Security, volume 3, pages 441–455, Sep. 2008.
[13] Jing Zhang, A.T.S. Ho, Gang Qiu, and Pina Marziliano. Robust video watermarking of H.264/AVC. In IEEE Transactions on Circuits and System-II: Express Briefs, volume 54, pages 205–209, February 2007.
[14] C. I. Podilchuk and Wenjun Zeng. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications, 16(4), May 1998.
[15] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, and M. G. Strintzis. Compressed-domain video watermarking of MPEG streams. In IEEE Int. Conf. Multimedia and Expo., volume 1, pages 569–572, 2002.
[16] Chun-Shien Lu, Hong-Yuan Mark Liao, and Martin Kutter. Denoising and copy attacks resilient watermarking by exploiting knowledge at detector. In IEEE Transatctions on Image Processing, volume 11, 2002.
[17] Po-Chyi Su, Chun-Chieh Chen, and Hong-Min Chang. Towards effective content authentication for digital videos by employing feature extraction and quantization. In IEEE Trans. on Circuits and Systems for Video Technology, to appear.
[18] I. Katsavounidis, C.-C. Kuo, and Z. Zhang. A new initialization technique for generalized Lloyd iteration. In IEEE Signal Processing Letters, volume 1, pages 144–146, Oct. 1994.
[19] J. R. Hern’andez, M. Amado, and F. P’erez-Gonzalez. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. In IEEE Transactions on Image Processing, volume 9, pages 55–68, Jan. 2000.