| 研究生: |
翁筱貞 Hsiao-Jen Weng |
|---|---|
| 論文名稱: |
軟式萃取子區塊極性之金匙視訊浮水印系統 Key-based Video Watermarking on MPEG-2 |
| 指導教授: |
張寶基
Pao-Chi Chang |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 電機工程學系 Department of Electrical Engineering |
| 畢業學年度: | 91 |
| 語文別: | 中文 |
| 論文頁數: | 63 |
| 中文關鍵詞: | 軟式萃取 、資料隱藏 、金匙浮水印 、視訊浮水印 |
| 外文關鍵詞: | data hiding, video watermarking, soft decision |
| 相關次數: | 點閱:24 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在本篇論文中,我們提出軟式萃取子區塊極性之金匙視訊浮水印系統,此系統建構於MPEG-2上能同時完成浮水印嵌入與視訊壓縮。浮水印雖僅嵌入於I畫面,卻會經由移動預估編碼機制傳播到P與B畫面中,因此在萃取端提出兩種考慮視訊時間軸上相關性的權重計算方式,以之參考所有畫面資訊,視訊群組為單位軟式萃取子區塊極性來解得浮水印。
我們將浮水印嵌入在低頻離散餘弦係數。低頻係數首先合成子區塊,以區塊極性選出適合加入浮水印的區塊,區塊極性並且和浮水印進行Tri-state XOR(TXOR)的運算以產生金匙。金匙記錄浮水印嵌入的區塊位置,因此在萃取端能取代原始視訊訊號,與區塊極性進行TXOR運算即可解出浮水印。
實驗結果顯示此視訊浮水印系統具有良好的透明度,嵌入浮水印的畫面其PSNR值與未嵌入者相近,而萃取端參考所有種類畫面的資訊軟式萃取子區塊極性的確能夠提升浮水印的強韌性。
In this thesis, we propose a key-based video watermarking system in which the watermark embedding and the video encoding are processed at the same time on MPEG-2. Since the watermark information would propagate to P/B frames through the motion compensated coding, the watermark is embedded in a single I frame but can be extracted from all frames in the same group of pictures (GOP).
The watermark is embedded in the low frequency DCT coefficients based on the block polarity. The block polarity is operated with the watermark by Tri-state XOR to generate the secret key, which labels the block locations of the embedded watermark. In the decoding end, the key is operated with the block polarity by Tri-state XOR to get the extracted watermark from all kinds of frames. Finally, the watermark over a GOP can be calculated by a weighted voting procedure according to the frame types and the displacements of the pixels.
The simulation results show that the system has great imperceptibility that the PSNR of the watermarked frames are almost the same as the un-watermarked and more accurate normalized correlation (NC) can be obtained as well.
[1] C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithms and applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001.
[2] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
[3] T.T. Lu, L.L. Lee and P.C. Chang, “A key-based image watermarking system using subblock composition in DCT domain,” Proc. Multimedia Technology and Applications Conference, pp. 157-163, Irvine, CA, Nov. 2001.
[4] J. Lee and C. S. Won, “Authentication and correction of digital watermarking images,” Electronics Letters, vol. 35, no. 11, pp. 886-887, May 1999.
[5] M. Barni, F. Bartolini, R. Caldelli, V. Cappellini, A. De Rosa, and A. Piva, “Robust frame-based watermarking for digital video,” 12th International Workshop on Database and Expert Systems Applications, pp. 825-829, 2001.
[6] J. Huang and Y. Q. Shi, “Adaptive image watermarking scheme based on visual masking,” Electronics Letters, vol. 34, no. 8, pp. 748-750, April 1998.
[7] Z. H. Wei, P. Qin and Y. Q. Fu, “Perceptual digital watermark of images using Wavelet transform,” IEEE Transactions on Consumer Electronics, vol. 44, no. 4, pp. 1267-1272, Nov. 1998.
[8] C. T. Hsu and J. L. Wu, “DCT-based watermarking for video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998.
[9] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks for digital images and video,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1108 -1126, July 1999.
[10] I. J. Cox, J. Kilian, F.T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673 -1687, Dec. 1997.
[11] F. Hartung and B. Girod, “Digital watermarking of uncompressed and uncompressed video,” Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
[12] S. G. Miaou and C. M. Chen, “A robust image watermarking technique based on Wavelet transform and human visual systems,” J. of Computers, Vol. 13, No. 1, pp. 21-31, March 2001.
[13] I. J. Cox, M. L. Miller and J.A. Bloom, Digital watermarking, Morgan Kaufmann, 2002.
[14] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers and J. K. Su, “Attacks on digital watermarks: classification, estimation based attacks, and benchmarks,” IEEE Communications Magazine, vol. 39, no. 8, pp. 118-126, Aug. 2001.
[15] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Attacks on copyright marking systems,” in David Aucsmith (Ed), Information Hiding, Second International Workshop, IH''98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219-239.
[16] Fabien A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Processing, vol. 17, no. 5, pp. 58–64, Sept. 2000.
[17] Stirmark Benchmark 4.0 is available on “http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/”
[18] S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet and T. Pun, “Second generation benchmarking and application oriented evaluation,” in Information Hiding Workshop III, Pittsburgh, PA, USA, April 2001.
[19] Official Optimark Page: http://poseidon.csd.auth.gr/optimark/
[20] S.W. Sun, T.T. Lu, and P.C. Chang, “Image watermarking synchronization by significant MSB plane matching,” Proc. Third IEEE Pacific Rim Conference on Multimedia 2002, pp. 468-476, Hsin-Chu, Taiwan, Dec. 2002.
[21] S.W. Sun and P.C. Chang, “Video Watermarking Synchronization Based on Profile Statistics,” to appear in IEEE Carnahan 2003, Taipei, Taiwan, Oct. 2003.
[22] E. T. Lin and E. J. Delp, “Temporal Synchronization in Video Watermarking,” Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents IV, vol. 4675, January 20-25, 2002, San Jose, CA.
[23] T. Y. Chung, M. S. Hong, Y. N. Oh, D. H. Shin and S. H. Park, “Digital watermarking for copyright protection of MPEG2 compressed video,” IEEE Transactions on Consumer Electronics, vol. 44, no.3, pp. 895-901, Aug. 1998.
[24] J. Zhang, H. Maitre, J. Li, and L. Zhang, “Embedding watermark in MPEG video sequence,” IEEE Fourth Workshop on Multimedia Signal Processing, pp. 535-540, 2001.
[25] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” Proceedings of XIV Brazilian Symposium on Computer Graphics and Image Processing, pp. 179-182, Oct. 2001.
[26] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-Time labeling of MPEG-2 compressed video,” Journal of Visual Communication and Image Representation, vol. 9, no. 4, pp. 256-270, 1998.
[27] ISO/IEC TTC1/SC29/WG11 13818-2 Information technology– Generic coding of moving pictures and associated audio information: video, 1995.
[28] C. S. Lu, J. R. Chen, H. Y. Mark Liao and K. C. Fan, “Real-Time MPEG2 Video Watermarking in the VLC Domain,” Proc. 16th IAPR Int. Conf. on Pattern Recognition, Quebec, Canada, Vol. II, August 11-15, 2002.
[29] P.C. Chang and T.H. Lee, “Precise and Fast Error Tracking for Error-Resilient Transmission of H.263 Video,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 10, No. 4, pp. 600-607, June 2000.
[30] T.H. Lee and P.C. Chang, “Error Robust H.263 Video Coding with Video Segment Regulation and Precise Error Tracking,” IEICE Trans. on Communications, vol. E84-B, no. 2, pp.317-324, Feb. 2001.