| 研究生: |
蔡尚恩 Tsai, Shang-En |
|---|---|
| 論文名稱: |
數位多媒體浮水印平台之建立 Development of a Digital Multimedia Watermarking Platform |
| 指導教授: |
楊世銘
Yang, Shih-Ming |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
工學院 - 航空太空工程學系 Department of Aeronautics & Astronautics |
| 論文出版年: | 2011 |
| 畢業學年度: | 99 |
| 語文別: | 英文 |
| 論文頁數: | 145 |
| 中文關鍵詞: | 浮水印 、離散餘弦轉換最佳化 、影像 、音訊 、視訊 |
| 外文關鍵詞: | Watermark, Optimal DCT, Image, Audio, H.264/AVC |
| 相關次數: | 點閱:58 下載:6 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
數位浮水印乃是將不可視的標記,隱藏於一般性的數位多媒體中,如影像、音訊與視訊,需要有相當程度的強健性。本研究發展一個可應用於數位多媒體的浮水印平台,以離散餘弦轉換為基礎,包含影像、音訊與視訊的浮水印系統。本研究提出兩個影像浮水印系統,第一個浮水印的加入與取出,結合了快速離散餘弦轉換、中頻係數選取與量化表的設計,使該系統對資料遺失、影像壓縮與雜訊處理都有很好的強健性。第二個影像浮水印相對於前者,將浮水印直接嵌入所選取的中頻係數位置,可達到即時處理的效果,且影像仍可維持一定的品質,將來更可以應用到即時通訊系統上。音訊浮水印系統以一維離散餘弦轉換為基礎,加上能量平均的觀點,使得系統能得到很高的效能。此外該架構亦整合了錯誤更正碼之Cyclic編碼以提高系統的容錯性。在視訊浮水印系統的建立上,浮水印的加入與解碼結合最新的視訊壓縮標準H.264/MPEG-4 AVC,使用類似離散餘弦轉換特性的整數轉換來提供一個完整的視訊處理系統,並利用展頻與強制性多數決以增加浮水印的強健性。這個包含了影像、音訊與視訊的多媒體浮水印平台,不論在智慧財產權的保護、多媒體廣播的監控,甚至在國防或民間數位資料的驗證、流程的控制上都有很好的應用。
A watermarking platform based on discrete cosine transform for digital multimedia in image, audio and video is presented in this dissertation. Discrete cosine transform concentrates the important information of digital content in the low frequency ranges, and the optimization of discrete cosine transform can reduce the algorithm computation efficiently.
This dissertation provides two image watermarking systems, the first one is developed by integrating the fast discrete cosine transform, the selection of middle-frequency ranges, and the adjustment of quantization table. Experimental results demonstrate that the watermark is efficient and robust to several signal processing techniques, including data cropping, data transmission loss, and JPEG compression. The second one is developed by the fast discrete cosine transform, the direct extraction of low-frequency ranges and the replacement of middle-frequency ranges. Verifications show that the watermarking system is more efficient and still can keep the acceptable quality of the watermarked image.
The audio watermarking system develops energy averaging with three keys to embed the watermark bit-stream, and it is also presented to resist MPEG compression and other manipulations. By utilizing the energy averaging concept of the frequency coefficients, the watermark can be embedded and decoded more effectively and efficiently. This system also integrates the error correcting codes to increase the recovery capability. Implementations show that the watermarked signal retains its high quality and there is no error with the decoded watermark. Verifications also illustrate that the system is robust against common audio manipulation.
The video watermarking system based on the latest video standard, H.264/MPEG-4 AVC standard, to compress a video sequence. Also, this system integrates direct-sequence spread, majority rule and compulsive definition to improve the robustness. In addition, the experiment demonstrates that the watermark can survive well under different processes such as the quantization, transmission data loss and resample. The multimedia watermarking system can be applied effectively and efficiently in different fields such as intellectual property rights protection, digital content authentication, tamper detection, and communication copy-control.
[1] I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Signal Processing, Vol. 6, No. 12, pp. 1673-1687, 1997.
[2] A. Piva, M. Barni, F. Bartolim and V. Cappellini, “DCT-based Watermark Recovering Without Resorting to the Uncorrupted Original Image,” International Conference Image Processing, Vol. 1, pp. 520-523, 1997.
[3] A. Koz and A. A. Alatan, "Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System" IEEE Transactions on Circuits and Systems for Video Technology Communications, Vol. 18, No. 3, pp. 326-337, 2008.
[4] F. Wu and W. S. Hsieh, “Digital Watermarking Using Zerotree of DCT”, 4th International Conference on Electronic Measurement & Instruments, Vol. 2, pp. 820-824, 1999.
[5] C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, Vol. 8, No. 1, pp. 58-68, 1999.
[6] X. M. Niu, Z. M. Lu and S. H. Sun, “Digital Watermarking of Still Images with Gray-Level Digital Watermarks,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 137-145, 2000.
[7] W. Luo, G. L. Heileman and C. E. Pizano, “Fast and Robust Watermarking of JPEG Files,” 5th IEEE Southwest Symposium on Image Analysis and Interpretation, pp. 158-162, 2002.
[8] Y. Lin and S. F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, No. 2, pp. 153-168, 2001.
[9] H. Y. Liao, C. S. Lu, S. K. Huang and C. J. Sze, “Cocktail Watermarking for Digital Image Protection,” IEEE Transactions on Multimedia, Vol. 2, No. 4, pp. 209-224, 2005.
[10] L. Tan and Z. J. Fang, “An Adaptive Middle Frequency Embedded Digital Watermark Algorithm Based on the DCT domain,” International Conference on Management of e-Commerce and e-Governmen, pp. 382-385, 2008.
[11] P. Bao and X. Ma, “Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition,” IEEE Transactions on Circuits and Systems, Vol.15, No.1, pp. 96-102, 2005.
[12] C. H. Chang, Z. Ye and M. Zhang, “Fuzzy-ART Based Adaptive Digital Watermarking System,” IEEE Transactions on Circuits and Systems, Vol.15, No.1, pp. 65-81, 2005.
[13] H. C. Wu, C. C. Lee, C. S. Tsai, Y. P. Chu and H. R. Chen, “A High Capacity Reversible Data Hiding Scheme with Edge Prediction and Difference Expansion,” Journal of Systems and Software, Vol. 82, No.12, pp. 1966-1973, 2009.
[14] K. C. Liu and S. M. Yang, “Development of a Watermarking Platform Based on Discrete Cosine Transform for Digital Content Applications,” PHD dissertation, National Cheng Kung University, Taiwan, 2005.
[15] I. J. Cox, M. L. Miller, J. A. Bloom, J. Rrindich, and T. Kaller, “Digital Watermarking and Steganography,” Second Edition, Morgan Kaufmann Publisher, New York, 2007.
[16] L. Boney, A. H. Tewfik and K. N. Hamdy, “Digital Watermarks for Audio Signals,” IEEE International Conference on Multimedia Computing and Systems, pp. 473-480, 1996.
[17] D. Gruhl, W. Bender and A. Lu, “Echo Hiding,” 1st International Workshop on Information Hiding, Lecture Notes in Computer Science, Cambridge, United Kingdom, Vol. 1174, pp. 295-315, 1996.
[18] S. W. Foo, T. H. Yeo and D. Y. Huang, “An Adaptive Audio Watermarking System,” IEEE Region 10 International Conference on Electrical and Electronic Technology, Vol. 2, pp. 509-513, 2001.
[19] B. S. Ko, R. Nishimura and Y. Suzuki, “Time-Spread Echo Method for Digital Audio Watermarking,” IEEE Transactions on Multimedia, Vol. 7, No. 2, pp. 212-221, 2005.
[20] W. S. Jong and W. H. Jin, “Audio Watermarking for Copyright Protection of Digital Audio Data,” Electronics Letters, Vol. 37, No. 1, pp. 60-61, 2001.
[21] A. N. Lemma, J. Aprea, W. Oomen, and L. van de Kerkhof, “A Temporal Domain Audio Watermarking Technique,” IEEE Transactions on Signal Processing, Vol. 51, No. 4, pp. 1088-1097, 2003.
[22] A. N. Lemma, S. Kirbiz, M. U. Celik and S. Katzenbeisser, “Forensic Watermarking and Bit-Rate Conversion of Partially Encrypted AAC Bitstreams”, Security, Forensics, Steganography and Watermarking of Multimedia Contents X, Vol. 6819, pp. 6819-6829, 2008.
[23] O. T. -C. Chen and W. C. Wu, “Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme,” IEEE Transactions on Audio, Speech, and Language Processing, Vol. 16, No. 3, pp. 629-638, 2008.
[24] B. K. Vivekananda, I. Sengupta, and A. Das, “Audio Watermarking Based on Quantization in Wavelet Domain,” 4th IEEE International Conference on Information Systems Security, Vol. 5352, pp. 235-242, 2008.
[25] S. K. Lee and Y. S. Ho, “Digital Audio Watermarking in the Cepstrum Domain,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 744-750, 2000.
[26] C. T. Hsieh and P. Y. Sou, “Blind Cepstrum Domain Audio Watermarking Based on Time Energy Features,” 14th IEEE International Conference on Digital Signal Processing, Vol. 2, pp. 705-708, 2002.
[27] A. Takahashi, R. Nishimura and Y. Suzuki, “Multiple Watermarks for Stereo Audio Signals Using Phase-Modulation Techniques,” IEEE Transactions on Signal Processing, Vol. 53, No. 2, pp. 806-815, 2005.
[28] A. Robert and J. Picard, “On the Use of Masking Models for Image and Audio Watermarking,” IEEE Transactions on Multimedia, Vol. 7, No. 4, pp. 727-739, 2005.
[29] Y. Lin and W. H. Abdulla, “A Secure and Robust Audio Watermarking Scheme Using Multiple Scrambling and Adaptive Synchronization,” 6th International Conference on Information, Communications & Signal Processing, pp. 1-5, 2007.
[30] K. Yeo and H. J. Kim, “Modified Patchwork Algorithm: A Novel Audio Watermarking Scheme,” IEEE Transactions on Speech and Audio Processing, Vol. 11, No. 4, pp. 381-386, 2003.
[31] S. T. Chen, G. D. Wu and H. N. Huang, “Wavelet-domain audio watermarking scheme using optimisation-based quantisation,” IET Signal Processing, Vol. 4, No. 6, pp. 720-727, 2010.
[32] S. T. Chen, H. N. Huang, C. J. Chen and G. D. Wu, “Energy-proportion based scheme for audio watermarking,” IET Signal Processing, Vol. 4, No. 5, pp. 576-587, 2010.
[33] M. Ikeda, K. Takeda and F. Itakura, “Audio Data Hiding by Use of Band-limited Random Sequences,” IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 4, pp. 2315-2318, 1999.
[34] H. Malik, R. Ansari and A. Khokhar, “Robust Audio Watermarking Using Requency-Selective Spread Spectrum,” IET Information Security, Vol. 2, No.4, pp. 129-150, 2008.
[35] S. Wu, J. Huang, D. Huang, and Y. Q. Shi, “Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission,” IEEE Transactions on Broadcasting, Vol. 51, No. 1, pp.69-76, 2005.
[36] M. Barni, F. Bartolini, A. De Rosa, and A. Piva, “Capacity of Full Frame DCT Image Watermarks,” IEEE Transactions on Image Processing, Vol. 9, No. 8, pp. 1450 -1455, 2000.
[37] M. Barni, F. Bartolini, R. Caldelli, A. De Rosa, and A. Piva, “A Robust Watermarking Approach for Raw Video,” 10th International Packet Video Workshop, 2000.
[38] M. Barni, F. Bartolini and N. Checcacci, “Watermarking of MPEG-4 Video Objects,” IEEE Transactions on Multimedia, Vol. 7, No. 1, pp. 23-32, 2005.
[39] J. Dittmann, M. Stabenau, and R. Steinmetz, “Robust MPEG Video Watermarking Technologies,” 6th ACM Multimedia, pp. 71-80, 1998.
[40] Y. Y. Lee ,S. U. Park, C. S. Kim and S. U. Lee, “Temporal Feature Modulation for Video Watermarking,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 4, pp. 603-608, 2009.
[41] S. W. Kim, S. Suthaharan, H. K. Lee, and K. Rao, “Perceptually Turned Robust Watermarking Scheme for Digital Video Using Motion Entropy Masking,” International Conference on Consumer Electronics, pp. 104-105, 1999.
[42] C. V. Serdean, M. A. Ambroze, M. Tomlinson, and J. G. Wade, “DWT-based High-Capacity Blind Video watermarking, Invariant to Geometrical Attacks,” IEE Proceedings - Vision, Image and Signal Processin, Vol. 150, No. 1, pp. 51-58, 2003.
[43] M. George, J. V. Chouinard, and N. Georganas, “Digital Watermarking of Images and Video Using Direct Sequence Spread Spectrum Techniques,” IEEE Canadia Conference on Electrical and Computer Engineering, Vol. 1, pp. 116-121, 1999.
[44] S. J. Weng, T. T. Lu, and P. C. Chang, "Key-based video watermarking system on MPEG-2," SPIE Conference Electronic Imaging, Vol. 5020, pp. 516-525, 2003.
[45] G. C. Langelaar and R. L. Lagendijk, “Optimal Differential Energy Watermarking of DCT Encoded Images and Video,” IEEE Transactions on Image Processing, Vol. 10, No. 1, pp. 148-158, 2001.
[46] S. Lian, Z. Liu, Z. Ren and H. Wang, “Commutative Encryption and Watermarking in Video Compression,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, No. 6, pp. 774-778, 2007.
[47] Y. Dai, L. Zhang and Y. Yang, “A New Method of MPEG Video Watermarking Technology,” International Conference on Communication Technology Proceedings, Vol. 2, pp.1845-1847, 2003.
[48] H. Y. Huang, C. H. Yang and W. H. Hsu, “A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation,” IEEE Transactions on Information Forensics and Security, Vol. 5, N. 4, pp. 625-637, 2010.
[49] A. Mansouri, A. M. Aznaveh, F. Torkamani-Azar and F. Kurugollu, “A Low Complexity Video Watermarking in H.264 Compressed Domain”, IEEE Transactions on Information Forensics and Security, Vol. 5, No. 4, pp. 649-657, 2010.
[50] C. -G. Apostol and C. -I. Rincu, “Digital Watermarking Secured with PWLCM, Chaotic-feedback and LSB Data Hiding,” 8th International Conference on Communications, pp. 439-442, 2010.
[51] A. Koz and A. A. Alatan , “Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, No. 3, pp. 326-337, 2008.
[52] W. M. Chen, C. J. Lai, H. C. Wang, H. C. Chao and C. H. Lo , “H.264 Video Watermarking with Secret Image Sharing,” IET Image Processing, pp. 349-354, 2011.
[53] O. Urhan and S. Ertürk, “Parameter Embedding Mode and Optimal Post-Process Filtering for Improved WDCT Image Compression,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, No. 4, pp. 528-532, 2008.
[54] L. E. Coria, M.R. Pickering, P. Nasiopoulos and R. K. Ward, “A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp.466-474, 2008.
[55] S. Chen and H. Leung, “Chaotic Watermarking for Video Authentication in Surveillance Applications”, IEEE Transactions on Circuits and Systems for Video Technology in Circuits and Systems for Video Technology, Vol. 18, No. 5, pp. 704-709, 2008.
[56] A. Mansouri, A. M. Aznaveh, F. Torkamani-Azar and F. Kurugollu, “A Low Complexity Video Watermarking in H.264 Compressed Domain,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 5, pp.649 - 657, 2010.
[57] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers and J.K. Su, “Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks,” IEEE Communications Magazine, Vol. 39, No. 8, pp. 118-126, 2001.
[58] C. H. Huang and J. L. Wu, “Attacking Visible Watermarking Schemes,” IEEE Transactions on Multimedia, Vol. 6, No.1, pp. 16-30, 2004.
[59] F. A. McGovern, R. F. Woods and M. Yan, “Novel VLSI Implementation of ( 8 × 8) Point 2-D DCT,” 14th Electronics Letters, Vol. 30, No. 8, pp. 624-626, 1994.
[60] A. Vetro, T. Wiegand and G. J. Sullivan, “Overview of the Stereo and Multiview Video Coding Extensions of the H.264/MPEG-4 AVC Standard,” IEEE Proceedings, Vol. 99, No. 4, pp. 626-642, 2011.
[61] MPEG home page: http://mpeg.telecomitalialab.com/
[62] ITU-T and ISO/IEC JTC 1, “Advanced Video Coding for Generic Audiovisual Services”, ITU-T Recommendation H.264 and ISO/IEC 14496-10 (MPEG-4 AVC), 2010.
[63] H. Schwarz, D. Marpe and T. Wiegand, “Overview of the Scalable Video Coding Extension of the H.264/AVC Standard,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, No. 9, pp. 1103-1120, 2007.
[64] I. E. G. Richardson, “H.264 and MPEG-4 Video Compression: Video Coding for Next-generation Multimedia,” John Wiley & Sons, 2003.
[65] D. Marpe, T. Wiegand and G. J. Sullivan, “The H.264 / MPEG4 Advanced Video Coding Standard and its Applications,” IEEE Communications Magazine, Vol. 44, No. 8, pp. 134-144, 2006.
[66] S. W. Golomb, “Run-Length Encoding,” IEEE Transactions on Information Theory, Vol. 12, No. 3, pp. 399-401, 1966.
[67] T. Chen, Y. Kashiwagi, C.S. Lim and T. Nishi, “Coding Performance of Stereo High Profile for Movie Sequences,” Joint Video Team (JVT) Doc. JVT-AE022, 2009.
[68] D. Marpe, H. Schwarz and T. Wiegand, “Context-Based Adaptive Binary Arithmetic Coding in the H.264/AVC Video Compression Standard,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No.7, pp. 620-636, 2003.
[69] S. Ralf, W. Thmoas and S. Heiko, “The Emerging H.264/AVC Standard,” EBU Technical Review, 2003.
[70] R. L. Pickholtz, D.L. Schilling and L.B. Milstein, “Theory of Spread Spectrum Communications – a Tutorial,” IEEE Transactions on Communications, Vol. 30, No. 5, pp. 855-884, 1982.
[71] Y. Y .Chung and F. F. Xu, “A Secure Digital Watermarking Scheme for MPEG-2 video Copyright Protection,” 6th IEEE International Conference on Multimedia Systems & Signal Processing, pp. 84-84, 2006.