簡易檢索 / 詳目顯示

研究生: 李建緯
Jian-Wei Lee
論文名稱: 運用動態臨界值且可抵抗串連攻擊的多頻帶視訊浮水印
Collusion-resistant Multi-channel Video watermarking using Blind threshold
指導教授: 許秋婷
Chiou-Ting Hsu
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2004
畢業學年度: 92
語文別: 英文
論文頁數: 63
中文關鍵詞: 浮水印動態臨界值串連攻擊多頻帶視訊
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 中文摘要
      在本篇論文中,提出了一個有效的數位視訊浮水印的方法。數位視訊浮水印在許多應用領域上扮演著很重要的角色,例如拷貝控制、使用者身份識別、以及廣播監控等等。視訊浮水印相對於影像浮水印的主要困難處在於多了時間軸這一項元素;攻擊端可利用此項資訊去破壞所藏入數位浮水印的內容,或是達到使偵測端無法正確偵測數位浮水印所在的位置。
    我們的方法主要是根據各視訊畫面內容來執行空間局部數位浮水印的藏入,因此可抵抗線性串連攻擊和數位浮水印位置不同調的問題。為了能夠增強對其他一般攻擊(如:模糊攻擊及壓縮攻擊)的抵抗力,我們運用區塊機制來產生所要藏入的數位浮水印。此外,為了改善在相同的浮水印藏入強度下視訊的品質,我們根據人眼視覺系統以相對不同的強度將浮水印藏入不同的頻帶裡。最後,我們利用了一個動態臨界值來決定偵測浮水印的結果。實驗結果證實了上述的機制可以有效的抵抗空間軸上平均濾波器的攻擊、時間軸上數個畫面平均的攻擊、以及動態影像壓縮的攻擊。


    ABSTRACT
    This paper proposes an effective approach for video watermarking. Video watermarking plays an important role in many applications such as copy control, owner identification, broadcast monitoring, and so on. The main difficulty comes from the temporal dimension because it provides useful information for attackers to remove or desynchronize the embedding watermark.
    We propose a video watermarking method motivated from the spatially localized image-dependent (SLIDE) sub-frame watermarking system to resist the linear collusion attacks and de-synchronization attacks. In order to enhance the robustness to other common attacks, such as averaging and compression attacks, we generate watermarks by the block-based mechanism. In addition, in order to improve the imperceptibility under the same embedding strength, we embed watermarks in multi-channels by Human Visual System (HVS). Finally, we employ a blind threshold technique to determine the detection result. Our experimental results demonstrate that the above mechanisms are effective to resist spatial average filtering attacks, temporal frame averaging attacks, and MPEG compression attacks.

    List of Contents 中文摘要.....................................................................................i Abstract......................................................................................ii 1 INTRODUCTION 1 1.1 Video watermarking attacks 3 1.1.1 De-synchronization attacks 3 1.1.2 Linear collusion attacks 4 1.1.3 Statistical invisibility 5 2 BACKGROUND AND MOTIVATION 8 2.1 Related works 8 2.1.1 Frame-based watermarking 8 2.1.2 Line-based watermarking 9 2.1.3 Periodic watermarking 10 2.1.4 Compressed-domain watermarking 10 2.2 SLIDE sub-frame watermarking 11 2.3 Motivation 12 3 PROPOSED APPROACH 14 3.1 Embedding 14 3.1.1 Harris corner detector 15 3.1.2 Block-based watermark pattern generation 17 3.1.3 Full-frame watermark generation 18 3.1.4 Embedding strength mask 18 3.1.5 Watermark embedding 20 3.2 Detection 20 3.2.1 Watermark estimation 21 3.2.2 Correlation computation 22 3.2.3 Blind threshold estimation 22 3.2.4 Threshold selection 25 4 DISCUSSION AND EXPERIMENTAL RESULTS 29 4.1 Comparison of corner point extractors 29 4.2 Block-based mechanism 31 4.2.1 Analysis of robustness to averaging attacks 31 4.2.2 Drawback 35 4.2.3 Experiments 36 4.3 Threshold selection 37 4.4 Pre-process of feature points extraction 38 5 CONCLUSION AND FUTURE WORK 53 5.1 Conclusion 53 5.2 Future work 53 6 REFERENCES 55 APPENDIX 58

    REFERENCES
    [1] K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility for Collusion-resistant Digital Video Watermarking–PartⅠ: Theoretical considerations,” http://ee.tamu.edu/~deepa/pdf/kundur1.pdf.
    [2] K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility for Collusion-resistant Digital Video Watermarking–PartⅡ: A Novel Approach,” http://ee.tamu.edu/~deepa/pdf/kundur2.pdf.
    [3] C. Harris, and M. Stephen, "A combined corner and edge detector," Proc. Of 4th Alvey Vision Conf., pp. 147-151, Aug. 1988.
    [4] D. Simitopoulos, D. Koutsonanos, and M. G. Strintzis, “Robust Image Watermarking Based on Generalized Radon Transformations,” IEEE Trans. Circuits and Systems for Video Technology, vol. 13, no.8, pp.732-745, Aug. 2003.
    [5] M. Barni, F. Bartolini, and A. Piva, “Multichannel Watermarking of Color Images,” IEEE Trans. Circuits and Systems for Video Technology, vol. 12, no. 3, pp. 142-156, Mar. 2002.
    [6] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, vol. 66, no. 3, pp. 357-372, May 1998.
    [7] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann Publisher, 2001.
    [8] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
    [9] E. T. Lin, and E. J. Delp, “Temporal synchronization in video watermarking,” Security and Watermarking of Multimedia Contents Ⅳ, Proc. SPIE, vol. 4675, pp. 478-490, Apr. 2002.
    [10] K. Su, D. Kundur, and D. Hatzinakos, “A novel approach to collusion-resistant video watermarking,” Security and Watermarking of Multimedia Contents Ⅳ, Proc. SPIE, vol. 4675, pp. 491-502, Jan. 2002.
    [11] F. Deguillaume, G. Csuka, and T. Pun, “Countermeasures for unintentional and intentional video watermarking attacks,” Security and Watermarking of Multimedia Contents Ⅱ, Proc. SPIE, vol. 3971, pp. 346-357, Jan. 2000.
    [12] F. Hartung, and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, vol. 66, pp. 283-301, 1998.
    [13] Mitchell D. Swanson, Bin Zhu, and Ahmed T. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 540-550, May 1998.
    [14] R. C. Gonzalez, and R. E. Woods, Digital Image Processing 2nd, Tom Robbins Publisher, 2001.
    [15] G. Doërr, and J.L. Dugelay, “A guide tour of video watermarking,” Signal Processing: Image Communication, vol. 18, no. 4, pp. 263-282, Apr. 2003.
    [16] D. Kundur, and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proc. IEEE Internet. Conf. Image Processing ’97, pp. 544-547, Oct. 1997.
    [17] Brian Chen and Gregory W. Wornell, “Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia,” Journal of VLSI signal processing, vol. 27, pp. 7-33, 2001.
    [18] A. M. Alattar, E. T. Lin, and M. U. Celik, “Digital Watermarking of Low Bit-Rate Advanced Simple Profile MPEG-4 Compressed Video,” IEEE Trans. Circuit and System for Video Technology, vol. 13, no.8, pp.787-800, Aug. 2003.
    [19] J. R. Hernandez and F. Perez-Gonzalez, “Statistical analysis of watermarking schemes for copyright protection of images,” Proc. IEEE, vol. 87, pp. 1142-1143, Jul. 1999.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE