| 研究生: |
王春清 Wang, Chuen-Ching |
|---|---|
| 論文名稱: |
應用於數位廣播系統之數位浮水印新技術 New Technologies of Digital Watermarking for Digital Broadcasting System |
| 指導教授: |
戴顯權
Tai, Shen-Chuan |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
| 論文出版年: | 2003 |
| 畢業學年度: | 91 |
| 語文別: | 英文 |
| 論文頁數: | 91 |
| 中文關鍵詞: | 智慧財產權 、數位廣播系統 、易碎型浮水印 、移動向量 |
| 外文關鍵詞: | intellectual property right, digital broadcasting system, fragile watermarking, motion vector |
| 相關次數: | 點閱:111 下載:4 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,拜數位科技發展之賜,使我們進入了多媒體通信的資訊時代裡,在這個資訊時代中,許多服務提供者(service providers)也都希望利用數位化的方式藉由網路如數位廣播網路將數位化的內容(如影像、視訊、聲樂)帶給收視(聽)者。然而,由於數位內容本身具有易於複製的特性,因此,數位媒體很可能在網路傳輸過程中被攔截或被合法使用者作非法的複製或轉售,服務提供者之智慧財產權(intellectual property right)將因而失去保障,此將嚴重影響數位廣播系統的發展。本論文將針對此問題,研究發展數位廣播領域裡的一個重要新技術—數位浮水印技術,以輔助數位廣播之蓬勃發展。在本論文裡,將利用數位浮水印新技術以保護數位媒體之智慧擁有者及使用者之權益,使數位媒體內容可更安全地使用於數位廣播網路應用上。
我們提出了一些有效的新方法來保護數位多媒體的智產權保護與認證。本論文除了將視覺密碼技術(visual cryptography)應用於強健浮水印(robust watermarking)技術作為智產權保護之研究外,另我們提出一種易碎型浮水印(fragile watermarking)應用於衛星通信廣播網路上。
在強健行浮水印方面,我們以視覺密碼技術將浮水印轉換成公開浮水印及私密浮水印,而僅將公開浮水印隱藏於原始影像,至於私密浮水印則保留於智財權擁有者。因此,縱然於演算法公開的情況之下,駭客亦很難以統計方法或其他方法萃取浮水印。所以,我們的方法比傳統方法具有更高的安全性。
在易碎型浮水印方面,我們在視訊傳送端將浮水印資訊透過雜湊函數隱藏於MPEG2之視訊流(video stream)裡的移動向量(motion vector)上;而在偵測端(monitoring station),則可判讀移動向量相關資料而解回浮水印資訊。因此,解讀浮水印資訊是否完整,可以即時判斷衛星視訊內容是否遭竄改或惡意干擾。我們的策略是若偵測出遭惡意竄改或干擾,則可採取進一步行動(如快速偵測出干擾源之位置),以赫阻不法行為達到保護收視者之權益。
實驗結果顯示,我們所提出的視覺密碼的強健浮水印方法除具有更高安全性外,並且可抵抗多種主要信號如JPEG壓縮、切割(cropping)、模糊化(blurring)、銳利化(sharpening)等處理及攻擊;而易碎型浮水印則可即時偵測出數位媒體遭破壞或更改內容,因此,我們所提出的方法可應用於數位廣播系統,以保護服務提供者之智慧財產權及收視(聽)者之權益。
In recent years, we have entered the era of multimedia information due to the widespread development of important technique-digitalization. In this age, many service providers really hope that they can use networks, such as digital broadcasting system, to deliver the digital content (video, image, audio, etc.) to the viewers or listeners. However, the digital media is very easy to copy or resell illegally because of the digital content with the property of easy duplicating. This leads to intellectual property right’s (IPR) infringement of multimedia content and the serious obstruction of the development of digital broadcasting system. To solve these problems, we have developed new technologies, concentrating on the digital watermarking schemes, to support the development of digital broadcasting. Two major purposes of digital watermarking are to protect the intellectual property right of multimedia content from piracy for the service providers and to identify the authentication of multimedia content for users.
In this dissertation, we would propose some practical and effective methods for the protection of owner copyright and the user authentication of images and videos in digital broadcasting network. First, we focus on robust watermarking strategies using the schemes of visual cryptography to protect the intellectual property right of service provider. Then, a fragile watermarking, which can be applied to the interference detection in satellite communication network, is proposed for protecting the programs of digital broadcasting video.
In robust watermarking, a visual cryptography technique is proposed as a way of solving copyright protection problems for digital images. Our watermarking method employs a visual cryptography to separate the watermark into two parts, a public watermark and a secret watermark. For watermarking security, only the public watermark is inserted into the original image, while the owner holds the secret watermark. Without the secret watermark, it is almost impossible to extract the watermark even if the embedding algorithm is published.
In fragile watermarking, to provide the content authentication of video sequence, the watermark information is embedded into the video sequence of MPEG-2 streams by modifying the motion vector. In the monitoring end, the watermark can be extracted from the watermarked motion vector. Hence, the monitoring station can detect the authorized code from watermarked signals to authenticate the video contents. If the watermarked signal has no authorization information, the watermarking algorithm can easily detect the illegal use, and thus make a decision (such as detecting the location of interfered source) for prohibiting the illegal content to distribute in public broadcasting network.
Various experiments on the proposed robust watermarking method are presented to demonstrate the robustness to most common image processing operations such as JPEG compression, cropping, blurring and sharpening. The fragile watermarking method can detect the content modification and unauthorized use of multimedia. Consequently, our watermarking methods can provide both the protections of ownership copyright and consumer right in digital broadcasting system.
[1] F. Kuo, W. Effelsberg, J.J. Garcia-Luna-Aceves,” Multimedia Communications-- Protocols and Applications,” Prentice, 1998.
[2] Halsall, ”Multimedia Communications-- Applications, Networks, Protocols and Standards,” Addison-Weseley, 2001.
[3] 戴顯權,陳瀅如,王春清, “多媒體通信原理、標準與系統,”紳籃出版社, 2000.
[4] U. Black, “ Second Generation Mobile & Wireless Networks,” Prentice, 1999.
[5] I. J. Cox, M. L. Miller and J. A. Bloom, “Digital watermarking,” Mogran Kaufmann, 2002.
[6] ETSI EN 300 401: Radio broadcasting system; ”Digital Audio Broadcasting (DAB) to mobile, portable and fixed receiver”, September 2000.
[7] G. W. Braudaway, K. A. Magerlein and F. Mintzer, “Protecting publicly-available images with a visible image watermark,” In the Proceeding of SPIE, Vol. 2659, pp.126-133,1996.
[8] I. J. Cox, J. Kilian, F T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, Vol.6, No. 12, pp.1673-1687,1997.
[9] C. I. Podilchunk, W. Zeng, “Image-adaptive watermarking using visual models,” IEEE Journal Sel. Areas in Comm., Vol.16 No.4, pp.525-539, May 1998.
[10] C. Hsu and J. Wu, “Hidden digital watermarks in images,” IEEE Trans. on Image Processing, Vol. 8, No. 1, pp.58-68, JANUARY 1999.
[11] K. Hashida and A. Shiozaki, “A method of embedding robust watermarks into digital color images,” IEICE Trans. Found. Vol. E81-A, No.10, pp.2133-2137, 1998.
[12] D. Kundur and D. Hatzinakos, “Improved robust watermarking through attack characterization,” OPTICS EXPRESS, Vol.3, No.12, 1998, pp.485-490.
[13] K. Hara, T. Shimomura and T. Hasegawa, “An improved method of embedding data into pictures by modulo masking,” IEEE Trans. on Comm., Vol.36, No.3, pp.315-331,1988.
[14] C. Hsu and J. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. on Circuits and Sys.-II Analog and Digital Signal Processing, Vol.45, No.8 August 1998, pp.1097-1101.
[15] R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional polygonal models through geometric and topological modifications, ” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp.551-560, 1998.
[16] G. Voyatzis and I. Pitas “Applications of toral automorphisms in image watermarking,” Proc. of IEEE International Conference on Image processing, Vol. 2, pp.237-240, 1996.
[17] S. Low and N. Maxemchuk, “Performance comparison of two text marking methods,” IEEE Journal on Selected Areas in Communications, Vol. 16, No.4, pp.561-572, 1998.
[18] D. Anand, U.C. Niranjan, “Watermarking medical images with patient information,” Proceeding of 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vol. 20, No. 2, pp.703-706, 1998.
[19] J. Choi, S. Park, D. Han and S. Park,” A 2048 complex point FFT architecture for digital audio broadcasting system,” IEEE Int. Symp. on Circ. and Sys., pp. 693-696, May, 2000.
[20] J. A. Huisken et al., “Specification, partitioning and design of a DAB channel decoder”, IEEE Special Publications in VLSI Signal Processing, Vol. 6, pp. 21-29, Oct. 1993
[21] T. Fukami, A. Tanaka, K. Fukuaga, K. Momura, and S. Kobayashi, “On-Chip Baseband Decoder for a DAB Receiver,” in Proc. IEEE Custom Integrated Circuit Conference, pp. 400-401, 1998.
[22] A. Delaruelle, J. Huisken, J. V. Loon, and F. Welten, “A Chip Set for a Digital Audio Broadcasting Channel Decoder,” in Proc. IEEE Custom Integrated Circuit Conference, pp. 13.4.1-13.4.4, 1995.
[23] H. Lo, M. Shieh, and C. Wu, “Design of an efficient FFT processor for DAB system,” IEEE Int. Symposium on Circuits and Systems, Vol. 4, pp. 654-657, 2001.
[24] J. Cho, N. Cho, K. Bang, M. Park, H. Jun, H. Park and D. Hong, “PC-based receiver for Eureka-147 digital audio broadcasting,” IEEE Trans. on Broadcasting, Vol. 47, pp. 95-102, June 2001.
[25] ISO/IEC Int’l Standard IS 11172-3, “Information Technology – Coding of Moving Pictures and Associated Audio for Digital Storage Media at up to about 1.5 M bits/s – Part 3: Audio.”
[26] P. Noll, “MPEG Digital Audio Coding”, IEEE Signal Processing Magazine, pp. 59-81, Sep. 1997.
[27] K. Konstantinides, “Fast subband filtering in MPEG audio coding”, IEEE Signal Processing Letters, Vol. 1, No. 2, pp. 26-28, February 1994.
[28] T. Tsai, T. Chen, and L. Chen, “An MPEG audio decoder chip”, IEEE Trans. on Consumer Electronics, Vol. 41, No. 1, pp. 89-96, Feb. 1995.
[29] P. Shelswell, “The COFDM modulation system: the heart of digital audio broadcasting”, Electronics & Communication Engineering Journal, Vol. 7, pp. 127-136, June 1995.
[30] W.Y. Zou, and Y. Wu, “COFDM: An Overview”, IEEE Transactions on Broadcasting, Vol. 41, No. 1, pp. 1-8, March 1995.
[31] A.V. Oppenheim and R.V. Schafer, “Discrete-Time Signal Processing”, Prentice Hall, 1989, ISBN 0-13-216771-9.
[32] Y. H. Lam, and R. W. Stewart, “Digital filtering for audio coding”, IEE Colloquium on Digital Filters: An Enabling Technology, pp. 10/1~10/11, 1998.
[33] ISO-IEC JTC1/SC29/WG11 “Coding of Moving Pictures and Associate Audio” 13818-3. Nov. 1994.
[34] P. Shelswell, “The COFDM modulation system: the heart of digital audio broadcasting,” Electronics & Communication Engineering Journal, pp. 127-136, Jun, 1995.
[35] W. Y. Zou, and Y. Wu, “COFDM: An Overview,” IEEE Transactions on Broadcasting, Vol. 41, No. 1, pp. 1-8 March 1995.
[36] H. Usuba, S. Kakiuchi, and K. Yamauchi, “A prototype DAB receiver,” in Proc. IEEE International Conference on Consumer Electronics, pp. 52-53, 1996.
[37] T. Fukami, A. Tanaka, K. Fukuaga, K. Momura, and S. Kobayashi, “On-Chip Baseband Decoder for a DAB Receiver,” in Proc. IEEE Custom Integrated Circuit Conference, pp. 400-401, 1998.
[38] A. Delaruelle, J. Huisken, J. V. Loon, and F. Welten, “A Chip Set for a Digital Audio Broadcasting Channel Decoder,” in Proc. IEEE Custom Integrated Circuit Conference, pp. 13.4.1-13.4.4, 1995.
[39] A. Delaruelle, J. Huisken, J. van Loon, and F. Welten, “A Channel Demodulator IC for Digital Audio Broadcasting,” IEEE Custom Integrated Circuits Conference, 1994.
[40] C. Ediz, M. Richard, and K. Izzet, “An extensible complex fast Fourier transform processor chip for real-time spectrum analysis and measurement”, IEEE Transactions on Instrumentation and Measurement, Vol. 47, No. 1, pp. 95-99, February 1998.
[41] Tsung-Han Tsai, Thou-Ho Chen, and Liang-Gee Chen, “An MPEG audio decoder chip,” IEEE Trans. on Consumer Electronics, Vol. 41, No. 1, pp. 89-96, Feb, 1995.
[42] Y. Francois, M. Lever and P. Urcun, ” A MUSICAM source codec for digital audio broadcasting and storage ”, IEEE CCITT Conference, 1991.
[43] K. Konstantinides, “Fast subband filtering in MPEG audio coding”, IEEE Signal Processing Letters, Vol. 1, No. 2, pp. 26-28, February 1994.
[44] Rao, K. R., “Discrete Cosine Transform: algorithm, advantage, applications”, Academic Press, 1990.
[45] Winnie Lau, Alex chwu, ”A common transform engine for MPEG & AC3 audio decoder”, Int. Conf. on ICCE, pp. 202-203, 1997.
[46] N. Naor and A. Shamir “Visual Cryptography,” Advances in Cryptology Eurocrypt’94, Springer-Verlag, Berlin, pp.1-12, 1995.
[47] S. Droste, “New results on visual cryptography,” Advances in Cryptology- EUROCRYPT’96, Lecture Notes in Computer Science, No.1109, pp.401-415, Springer-Verlag, 1996.
[48] Journal: W. Zeng and B. Liu, "A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images," IEEE Trans. on Image Processing, Vol. 8, pp.1534-1548, Nov., 1999.
[49] Journal: C. T. Hsu and J. Wu, "Hidden digital watermarks in images," IEEE Trans. on Image Processing, Vol. 8, pp. 58-68, Jan., 1999.
[50] Proceeding: P. Bas, J. -M. Chassery and F. Davoine, "Using the Fractal Code to Watermark Images," 1998 Int. Conf. on Image Processing, Vol. 1, pp. 469-473, 1998.
[51] http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/
[52] Smith, W.W., Jr.; Steffes, P.G., “ Time delay techniques for satellite interference location system”, IEEE Transactions on Aerospace and Electronic Systems, Vol. 25 Issue: 2 , Mar 1989, pp. 224 –231
[53] William Whitfield Smith and Jr. Paul G. Steffes, “A satellite interference locating system using differential time and phase measurement techniques” IEEE Aerospace and Electronics Systems Magazine, Vol. 6 Issue: 3, Mar 1991, pp. 3 –7
[54] http://www.tls2000.com/Site/GlobalNetwork.html.
[55] R. Rivest, “The MD5 Message-Digest Algorithm”, Network Working Group Request for Comments: 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992.
[56] J. Touch, “Report on MD5 Performance”, Network Working Group Request for Comments: 1810, ISI Category: Informational, June 1995.
[57]Touch, J., Optimized MD5 software, ftp://ftp.isi.edu/pub/hpcc-papers/touch /md5-opt.tar.
[58] Wernek, S.B. ”A Satellite Monitoring System,” Tenth International Conference on Digital Satellite Communications, Vol.2, 1995, 15-19 May, 1995, pp. 661 -665
[59] Robusto, M.J.; Wheeler, M.E.; Keel, H.R.; Luz, F.H., “INTELSAT's traffic monitoring systems” Tenth International Conference on Digital Satellite Communications, Vol. 2, 15-19 May, 1995, pp. 666 –673
[60] http://www.spacedaily.com/news/cyberwar-02f.html
[61] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, 66:283-301, 1998.
[62]B. Zhu M. D. Swanson and A. H. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Selected Areas in Communications, 16(4): 540-550, May 1998.
[63]G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-time labeling methods for MPEG compressed video,” in Proc. 18th Symp. Information Theory in the Benelux, Veldhoven, The Netherlands, May 1997.
[64] I. J. Cox and J. -P. M. G. Linnartz, “Some general methods for tampering with watermarks,” IEEE Journal on Selected Areas in Communications, 16(4): 587-593, May 1998.
[65] A. S. Lewis and G. Knowles, “Image compression using the 2-D wavelet transform,” IEEE Trans. Image Processing, Vol. 1, No. 2, pp. 244-250, Apr. 1992.
[66] Mauro Barni, Franco Bartolini, and Alessandro Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Processing, Vol. 10, No. 5, pp. 783-791, May 2001.
[67]Fred Jordan, Martin Kutter, and Touradj Ebrahimi, ISO/IEC JTC1/SC29/WG11/MPEG97/July 1997, m2218.
[68]CCIR Recommendation 601-1:1990, “Encoding parameters of digital television for studios.”