透過您的圖書館登入
IP:3.21.34.0
  • 學位論文

基於離散餘弦轉換應用之高適應性視訊浮水印技術

Video Adaptive Watermarking Technique Based on DCT Domain Approach

指導教授 : 許文星
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著數位科技的發展與網際網路的日漸普及,數位化資料能夠很輕易的被複製、傳播,使得資料的取得更加容易;但在另一方面,因為任何人都能夠拷貝、竄改甚至偽造他們所取得的任何資料,數位內容的合法擁有者及創造者因此遭受到很嚴重的盜版損失。數位內容的版權保護已明顯成為現今數位化時代最重要的課題之ㄧ。為了解決這個問題,有兩種重要的技術被發展出來。一是數位浮水印技術,另一個則是密碼學。數位浮水印技術允許任何人都能夠存取受保護的資料,但是唯有合法的擁有者才能在版權發生爭議時藉由此一技術將隱藏在檔案中的資訊萃取出來以證明自己的合法所有權。另一方面,密碼學系統則只允許擁有合法金鑰的使用者存取加密的檔案;然而一旦檔案被解密,該內容便失去了保護。由此可知,數位內容可在加入浮水印之後,再利用密碼學進一步加密以改善資訊安全。 鑒於資訊化時代對於智慧財產權的重視,如何保護私人所有權成為越來越重要且刻不容緩的議題。因此我們在本篇論文中提出了一項植基於離散餘弦轉換應用並具有高通透性及僅引起輕微失真的數位視訊浮水印技術。本方法主要是透過改變離散餘弦轉換係數之間的相關特性將浮水印嵌入至未壓縮域中,且浮水印的萃取不需要利用原始視訊資料即可完成。我們所提出的技術包含了兩項程序:嵌入處理以及萃取處理程序。這兩項程序皆是利用類三維離散餘弦轉換來實現。藉此,我們的系統將能夠有效降低計算的複雜度以及處理時間。為了加強系統的安全性,我們將利用私密嵌入金鑰來輔助浮水印的萃取。如此一來,即使系統的演算法遭到破解,嵌入於檔案中的浮水印仍然無法被萃取出來。此外,藉著利用可由設計者或使用者自行調整的參數,我們所提出的技術也在系統設計方面提供了更高的彈性。最後,我們會將本論文所提出的技術與早先學者所提出的系統做比較。而實驗結果將會證明我們所提出的技術較其他系統具有更高的通透性以及對抗各種像是濾波、雜訊、亮度改變以及各種壓縮等攻擊的強韌性。

並列摘要


With the development of digital technology and popularization of internet, digital information could be duplicated and spread easily. On the other hand, because anyone can copy, falsify and even forge any data they obtained, the digital content owners and creators suffer serious piracy. It is evident that copyright protection of digital content has become one of the most important subjects in current. To solve this problem, two principal technologies are developed. One is digital watermarking and the other is cryptography. Digital watermarking technique allows anyone to access the protected data, but only the valid owner can extract the information from the host data to authenticate the ownership by watermarking technique when the dispute about the copyright of data happened. On the other hand, cryptography systems permit only valid key holders to access encrypted data. However, data is no longer protected once it is decrypted. Therefore, the digital content could be watermarked and then encrypted by means of cryptography to improve the information security. Based on intellectual property attention in information era, how to protect the personal ownership is more and more important and necessary. Hence, in this thesis we address a digital video watermarking technique based on DCT approach to insert the message which possesses high transparency and slight distortion. The watermark is mainly embedded into the uncompressed domain by adjusting the correlation between DCT coefficients, and the watermark can be extracted without using the original video information. The proposed system consists of embedding process and extracting process. Both of them are adopted a pseudo 3D DCT to achieve this scheme. In this way, our approach can reduce the computational complexity and computational time efficiently. The secret embedding key is employed to assist in extracting watermark to enhance the system security. In this way, the embedded watermark can not be extracted even though the algorithm is broken. Furthermore, the proposed system provides a good elasticity of design by using the adjustable parameters. Finally, we compare our proposed system with anterior methods. The experimental results illustrate that the proposed scheme possessed higher transparency and robustness to against various, e.g. filtering, noise, luminance modifications, especially compression, than other methods.

並列關鍵字

watermark DCT

參考文獻


[1] C. C. Chang, T. S. Chen, and H. C. Hsia, "An image watermarking scheme using pattern coding technique," in Proc. of the First Int. Conf. on Innovative Computing, Information and Control, vol. 3, pp. 467-470, 2006.
[3] Y. Y. Chung and F. F. Xu, "A secure digital watermarking scheme for MPEG-2 video copyright protection," in Proc. of IEEE Int. Conf. on Video and Signal Based Surveillance, 2006.
[4] Y. R. Lin, H. Y. Huang, and W. H. Hsu, "An embedded watermark technique in video for copyright protection," in Proc. of Int. Conf. on Pattern Recognition, vol. 4, pp. 795-798, 2006.
[6] A. Bovik, Handbook of Image and Video Processing, Academic Press, San Diego, 2000.
[8] G. J. Simmons, "The prisoners' problem and the subliminal channel," in Proc. of Int. Cryptology Conference, pp. 51-67, 1984.

延伸閱讀