| 研究生: |
方怡仁 Fang, Yi-Ren |
|---|---|
| 論文名稱: |
應用均值調制技術在視頻中加浮水印 Watermarking in Video Using Mean Modulation Technique |
| 指導教授: |
王明習
Wang, Ming-Shi |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系碩士在職專班 Department of Engineering Science (on the job class) |
| 論文出版年: | 2018 |
| 畢業學年度: | 106 |
| 語文別: | 中文 |
| 論文頁數: | 52 |
| 中文關鍵詞: | 數位浮水印 、I畫片 、均值調制技術 、不可視 、強健 |
| 外文關鍵詞: | digital watermark, I-frame, Mean Modulation Technique, invisible, robust |
| 相關次數: | 點閱:123 下載:5 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
因網路上的數位影像資料有著非常容易被儲存、傳播、修改的特性,所以各種未經授權的數位影像資料被非法盜用與偽造的事件層出不窮。這對作者及所有權者的權益造成嚴重的損失,也對商業發展與社會大眾帶來極其負面的影響,也會影響到商業團體的經濟利益。因此,數位媒體的智慧財產權保護措施便成了一個非常重要且熱門的研究議題,也因而產生了維護數位媒體版權與完整性的相關技術。透過數位浮水印(Digital Watermark)的技術來達到保護智慧財產權是很好的一種方式。目前浮水印技術的研究,主要著重於不可視型浮水印技術來保護影像或視頻資料。本論文的目的是使用均值調制技術在每組視頻(Group of Video , GOV)的I畫片中嵌入強健的浮水印,以產生有能力抵抗攻擊的不可視型強健浮水印視頻。所嵌入的浮水印是屬於不可見式浮水印(invisible watermark),可以為視頻內容提供身份驗證和版權保護。
Since digital video data on the Internet is easily stored, copied transmitted, and modified. Various unauthorized digital data are incessantly illegally acquired and forged. It results in a large loss for the rights of authors and owners. It also results a very negative impact on business development, and also affects the economic benefits of business. Therefore, intellectual property protection for digital data is a very important issue and hot research topic. Digital watermark is one of the good ways to maintain media copyright and integrity. The purpose of this research is to use the Mean Modulation Technique to embed a robust watermark in the I-frames of each Group of Video (GOV) for providing authentication and copyright protection for video content.
[1]Hood, A.A. and Janwe, N.J., “Robust Video Watermarking Techniques and Attacks on Watermark – A Review”, International Journal of Computer Trends and Technology, Vol.4, No.1,pp.30-33 , 2013.
[2]Zhou Zude, Ai Qingsong, and Liu Quan, “A SVD-based Digital Watermarking Algorithm for 3D Mesh Models”, The 8 th International Conference on Signal Processing, Piscataway, Vol.4, pp.16-20, 2006.
[3]張真誠、黃國峰、陳同孝,電子影像技術(Electronic Imaging Techniques),松崗電腦 圖書資料股份有限公司,2000 年 12 月.
[4]Zainab J. Ahmed and Loay E. George , “Robust Watermarking for Video Using Mean Modulation Technique”, Iraqi Journal of Science, Vol. 58, No.4C, pp. 2412-2426, January 2017.
[5]Zainab J. Ahmed and Loay E. George , “Robust Watermarking for Video Using Modulation Technique on RGB Domain”, British Journal of Applied Science & Technology, Vol. 14, No.1,pp. 1-10, 2016.
[6]https://www.axis.com/en-us/learning/web-articles/technical-guide-to-network-video/video-compression
[7]陳同孝、張真誠、黃國峰,數位影像處理技術(Digital Image Processing Techniques), 松崗電腦圖書資料股份有限公司,2001 年 1 月.
[8]Chun-Shien Lu, Hong-Yuan Mark Liao, “Multipurpose Watermarking for Image Authentication and Protection,” IEEE Trans. Image Processing, Vol.10, pp. 1579-1592,2001.
[9]Sabu Emmanuel and Mohan S. Kankanhalli, “ Mask-based interactive watermarking protocol for video”, Proceedings of SPIE, Vol. 4518,pp.247-258, 2001.
[10]黃國峰 ,張真誠 ,黃明祥 ,"漫談數位浮水印技術 ",資訊安全通訊 , 第五卷第四期 , 頁11-17,September 1999.
[11]Iain E. Richardson,The H.264 Advanced Video Compression Standard,Wiley Publication, 2010.
[12]Tanima Dutta ,“Robust Compressed Domain Video Watermarking for H.264/AVC” , Indian Institute of Technology Guwahati 781039 ,pp.2-136 ,2014.
[13]Nasir D. Memon and Ping Wah Wong,” Protectig digital media cotent,” Communications of the ACM, Vol.41,No.7,pp.35-43, July 1998.
[14]Marwen Hasnaoui,“MPEG-4 AVC stream watermarking,” Cryptography and Security. InstitutNational des Télécommunications, 2014. English.
[15]Stéphane Bounkong, Borémi Toch, David Saad,and David Lowe, “ICA for Watermarking Digital Images”, The Journal of Machine Learning Research, Vol.4,No.7-8, pp.1471-1498, January 2003.
[16]Min-Shiang Hwang, Chin-Chen Chang,and Kuo-Feng Hwang, “A Watermarking Technique Based on One-Way Hash Functions”, IEEE Transactions on Consumer Electronics, vol. 45 , no. 2,pp. 286-294, May 1999.
[17]Chun-Shien Lu, and Hong-Yuan Mark Liao,“Structural digital signature for image authentication: An Incidental Distortion Resistant Scheme”, IEEE Transactions on Multimedia, vol. 5, no. 2,pp.161-173, Jun. 2003.
[18]J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, Vol.13, No.5, pp. 285-287, May 2006.
[19]A. Mansouri, A.M. Aznaveh,F.T. Azar, and F. Kurugollu. “A Low ComplexityVideo Watermarking in H.264 Compressed Domain”,IEEE Transaction on Information Forensics and Security, vol.5,no.4,pp.649-657, 2010.
[20]李淑芝,张翔,邓小鸿,吴晓燕,一種抗重壓縮的 H.264/AVC視頻水印算法,江西理工大学,信息工程学院,应用科学学院,江西赣州341000.
[21]https://read01.com/zh-tw/KBKPG5.html#.W1DDo9IzadG
[22]David Salomon and Giovanni Motta,Handbook of data compression, Springer 5th Edition,2010.