簡易檢索 / 詳目顯示

研究生: 林佑儒
Yu-Ru Lin
論文名稱: 一個基於方塊演算法的強韌視訊浮水印系統
A Robust Video Watermarking System Based On Block Matching Algorithm
指導教授: 許文星
Wen-Hsing Hsu
黃惠俞
Hui-Yu Huang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2006
畢業學年度: 94
語文別: 英文
論文頁數: 66
中文關鍵詞: 數位浮水印視訊強韌方塊演算法
外文關鍵詞: digital watermark, video, robustness, block matching algorithm
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 當網路和貯存設備變得越來越普及時,數位資料越容易且越快速的被散佈。盜版者可以輕易且沒限制的複製大量多媒體資料(圖像,音訊和視訊)。因此,人們越來越關心多媒體智慧財產權的保護。

    數位浮水印是一個有用且正在發展中的技術,它是一種直接在原資料中嵌入額外資訊的技術。理想上,被加入數位浮水印的資料應該和原資料沒有視覺上的差別,而且數位浮水印不可以在受保護資料沒有受損害的情形下輕易的被移除或修改。數位浮水印的應用包括版權的保護,版權擁有者的認證,以及廣播監視。數位浮水印和傳統的密碼保護最大不同在於受密碼保護的資料在經過解碼後就沒有保護的功能了,這些解碼後的資料可以被複製且散布。相對的,受數位浮水印保護的資料不論在什麼情況下,只要遇到有版權的問題時就可以利用浮水印技術從受保護資料中抽取出藏入的資訊,進而解決版權的爭議。

    近幾年有越來越多的研究在討論如何把數位浮水印嵌入影像當中。在影像浮水印系統中,通常把數位浮水印嵌入在空間域或頻率域裡。在空間域可以利用影像強度的改變嵌入浮水印,而在頻率域則可以利用修改轉換係數來嵌入數位浮水印。在空間域常常把數位浮水印嵌入在較低位元的地方,使影像在視覺上察覺不出變化。相對於影像浮水印系統,較少學者在研究視訊浮水印。視訊浮水印主要有兩個方法被考慮,一個是把浮水印嵌入在未經過編碼的視訊中,另一個方法則是把浮水印嵌入在編碼後的資料串當中,例如移動向量。數位資料常常遭受一些故意或非故意的攻擊,例如壓縮,剪裁,增加雜訊,和幾何攻擊等等。因此,在設計浮水印系統時必須把遭受攻擊的情形考慮進去。

    在本篇論文中,我們提出了一個基於方塊演算法的視訊浮水印系統。我們的系統優點是不論遇到故意或非故意的攻擊都有非常高的強韌性。浮水印是嵌入在未經壓縮的視訊資料中,並且在萃取時不需要原本的視訊資料。我們的系統可以經由調整臨界參數,獲得不可視性和強韌性中最佳的平衡。基於安全的理由,浮水印在嵌入的時候會伴隨產生私密安全金鑰。最後的實驗結果將會證實我們的系統在資料遭受多種攻擊後還可以準確的萃取出藏入的浮水印。


    As the internet and storage equipment become more and more popular, the digital data can be distributed easier and faster. The pirates can easily and unlimitedly copy the digital multimedia (images,audio, and video). Therefore, people are more and more attentive to the copyright protection for digital multimedia.

    Digital watermarking is a useful and developing technology, it is the direct embedding of additional information into the original content or host signal. Ideally, there should be imperceptible difference between the watermarked and original signal, and the watermark should be difficult to remove or alter without damaging
    the host signal. In some instances, the amount of information that can be hidden and detected reliably is important. Applications include copyright protection, owner identification, and broadcast monitoring. The evident difference between the watermarking and encryption is that the data is only protected during the transmission using the traditional cryptography. After decrypting, the digital data is no longer protected, it can still be copied and
    distributed. In contrast to traditional cryptography, anyone can use the multimedia data, once the dispute about the ownership of data happened, we can extract the information from the host data to authenticate and characterize the owner by watermarking technique.

    A lot of researches discussed how to embed a watermark into image in recent years. For digital watermarking of image, it often embedded in the spatial/frequency domain. Watermark can be embedded into the image intensity in spatial domain or into image coefficients in transformed domain. In spatial domain, watermark is usually embedded
    into low bits to make it imperceptible. In transformed domain, the image is first orthogonally transformed, then watermark is embedded into transformed coefficients. However, few researches analyzed the watermark techniques in video. As far as the watermarking of a video sequence is concerned, in the literature two approaches are
    considered: watermark insertion on the original raw video data or alternatively on the coded data bit stream such as motion vector. Digital content often suffer some intentional or unintentional attacks such as compression, cropping, add noise, and geometric attack, etc. Therefore, we need to consider those of attacks for
    designing the watermarking system.

    In this thesis, we propose a watermarking system based on block matching algorithm. The advantages of our proposed system are not only the robustness in the signal attack and invisibility but also the robustness in the intentional attack such as cropping. The watermark is mainly embedded in the uncompressed domain, and it is detected without the use of the original video information. Hence, this scheme is powerful and possesses the adjustable threshold value
    to obtain the balance relationships between the imperceptibility and robustness. For the security viewpoint, the watermark embedding usually requires the knowledge of a secret embedding key to perform. The experimental results show that our proposed method can
    successfully detect the watermark from the attacked video especially for video compression.

    1 Introduction 1.1 Motivation 1.2 Digital Watermarking Requirements and Applications 1.3 Thesis Organization 2 Related Works 2.1 Introduction of Watermarking 2.2 Overview of Watermarking Techniques 2.2.1 Zhang et al.'s watermarking method 2.2.2 Lancini et al.'s watermarking method 2.2.3 Kim et al.'s watermarking method 2.2.4 Dong et al.'s watermarking method 2.3 Classification Of Attacks 3 Background 3.1 Block-Matching Algorithm 3.1.1 The Exhaustive Block-Matching Algorithm (EBMA) 3.1.2 2-D-Log Search Algorithm 3.1.3 Three-Step Search Algorithm 3.2 MPEG Video Compression 3.2.1 MPEG-1 3.2.2 MPEG-2 4 Proposed System 4.1 Propose Watermark Scheme Profile 4.1.1 Framework 4.2 Proposed Method 4.2.1 Embedding Process 4.2.2 Detection Process 4.2.3 Definitions 4.2.4 Procedures of Our System 4.2.5 Discussion of Block Matching 4.3 Combined Other Method 4.3.1 Wang's and Pearmain's method 5 Experimental Results 5.1 Experimental Setup 5.1.1 Standard Test videos and Watermark 5.1.2 Parameter Setting 5.1.3 Comparative Method 5.2 Experimental Results 5.2.1 Invisibility 5.2.2 Compression processing 5.2.3 Several Attacks 5.3 Discussions 6 Conclusions and Future Works Bibliography

    [1] J. Zhang, H. Maitre, J. Li, and L. Zhang, "Embedding watermark in mpeg video sequence," IEEE Multimedia Signal Processing, pp. 535-540, 2001.
    [2] R. Lancini, F. Mapelli, and S. Tubaro, "A robust video watermarking technique in the spatial domain," Video Processing and Multimedia Communication, vol. 17, pp. 251-256, 2002.
    [3] T. Y. Kim, H. Choi, K. Lee, and T. Kim, "Embedding watermarks corresponding to one detection watermark," IEEE Sisnal Processing Letters, vol.11, pp. 375-377, 2004.
    [4] P. Dong, J. Brankov, N. Galatsanos, Y. Yang, and F. Davoine, "Digital watermarking robust to geometric distortions," Image Processing, vol. 14,
    pp. 2140-2150, 2005.
    [5] S. Voloshynovskiy, S. Pereira, T. Pun, and J. Kim, "Attacks on digital watermarks: classification, estimation based attacks, and benchmarks," IEEE
    Communications Magazine, vol. 39, pp. 118-126, 2001.
    [6] Y. Wang, J. Ostermann, and Y. Q. Zhang, "Video processing and communication," Prentice Hall, 2001.
    [7] Y. Wang and A. Pearmain, "Blind video mpeg-2 watermarking robust against scaling," in Proc. of IEEE int. Conf. on Image Processing, vol.1, pp. 2159-2162, 2004.
    [8] C. I. Podilchuk and E. J. Delp, "Digital watermarking: algorithms and applications," IEEE Signal Processing Magazine, vol. 18, pp. 33-46, 2001.
    [9] I. J. Cox, F. J. Kilian, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. on Image Processing, vol. 6, pp.1673-1687, 1997.
    [10] C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images," IEEE Trans. on Image Processing, vol. 8, pp. 58-68, 1999.
    [11] J. Cox and M. Linnartz, "Public watermarks and resistance to tampering," in Proc. of IEEE Int. Conf. on Image Processing, vol. 3, pp. 243-246, 1997.
    [12] T. Eugene, M. Eskicioglu, L. Lagendijk, and J. Delp, "Advances in digital video content protection," Proceeding of the IEEE, vol. 93, pp. 171-183, 2005.
    [13] G. Voyatzis and I. Pitas, "The use of watermarks in the protection of digital multimedia products," Proceedings of the IEEE, vol. 87, pp. 1197-1207, 1999.
    [14] F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proceeding of the IEEE, vol. 6, pp. 1079-1107, 1999.
    [15] A. Nikolaidis, S. Tsekeridou, A. Tefas, and V. Solachidis, "A survey on watermarking application scenarios and related attacks," Image processing, vol. 3, pp. 991-994, 2001.
    [16] S. J. Lee and S. H. Jung, "A survey of watermarking techniques applied to multimedia," in Proc. of 2001 Industrial Electronics, vol. 1, pp. 272-277, 2001.
    [17] K. Hashida and A. Shiozaki, "A method of embedding robust watermarks into digital color images," IElCE Trans. Fundamentals, vol. 81, pp. 198-206, 1998.
    [18] E. T. Lin and E. J. Delp, "A review of fragile image watermarks," Multimedia and Security Workshop at ACM Multimedia, 1999.
    [19] M. Yeung and B. L. Yeo, "Fragile watermarking of three- dimensional objects," in Proc. of IEEE Int. Conf. on Image Processing, vol. 8, pp. 96-100, 1998.
    [20] C. Vleeschouwer, J. Delaigle, and B. Macq, "Invisibility and application functionalities in perceptual watermarking-an overview," Proceeding of the
    IEEE, vol. 90, pp. 64-77, 2002.
    [21] F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," in Proc. of IEEE Int. Conf. Image Processing, vol. 1, pp. 528-531, 1997.
    [22] J. W. Seok and J. W. Hong, "Audio watermarking for copyright protection of digital audio data," Electron. Lett., vol. 37, pp. 60-61, 2001.
    [23] M. Alghoniemy and A. H. Tew‾k, "Geometric distortion correction through image normalization," ICME Multimedia Expo,, vol. 3, pp. 1291-1294, 2000.
    [24] S. Craver, N. Memon, B. L. Yeo, and M. Yeung, "On the invertibility of invisible watermarking techniques," in Proc. of IEEE Conf. Image Processing, vol. 1, pp. 540-543, 1997.
    [25] Z. Zhongjie, G. Jiang, M. Yu, and W. Xunwei, "New algorithm for video watermarking," in Proc. of int. Conf. on Signal Processing, vol. 1, pp. 760-763, 2002.
    [26] D. Yuanjun, L. Zhang, and Y. Yang, "A new method of mpeg video watermarking technology," Commuication Technology Proceedings, vol. 2, pp.2003, 1845-1847.
    [27] L. Zina, H. Liang, N. Xinxin, and Y. Yang, "A robust video watermarking in motion vectors," in Proc. of int. Conf. on Signal Processing, vol. 3, pp.2004, 2358-2361.
    [28] J. Jiang and G. Feng, "The spatial relationship of dct coefficients between a block and it's sub-block," IEEE Trans. on Signal Processing, vol. 50, pp.1160-1169, 2002.
    [29] S. Thiemert, T. Vogel, J. Dittmann, and M. Steinebach, "A high-capacity block based video watermark," in Proc. of the 30th Euromicro Conference,
    pp. 457-460, 2004.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE