透過您的圖書館登入
IP:3.144.36.141
  • 學位論文

H.264視訊串流之資訊隱藏技術

Real-time Steganography in Video Streaming over H.264

指導教授 : 吳坤熹

摘要


在即時通訊系統之中,即時視訊隱藏是將秘密視訊藏匿於掩護視訊之中的一項技術。藉由隱藏秘密視訊到掩護視訊之中,我們可以獲得一個隱密視訊;此視訊為一段有意義的畫面,並且和掩護視訊畫面看起來非常相似。藉由這種保護方式,當我們在進行視訊通話時,就算不幸遭受到有心人士竊取封包,竊取者也只會看到掩護視訊的畫面,而不會注意到隱匿在裡面的秘密視訊。 在本篇論文中,我們提出一種在網路電話(Voice over Internet Protocol,簡稱VoIP)上隱藏視訊的方法,其方法我們稱之為即時視訊隱藏(Real-time Video Hiding,簡稱RVH)技術,並進一步藉由H.264/AVC編碼技術來驗證我們的方法。H.264/AVC編碼技術為目前最新的數位視訊編解碼器標準,同時已普遍的運用在網路電話上。經由我們的實驗證明,RVH將能有效增加網路電話的安全性。

並列摘要


In communication systems, sometimes it is necessary to apply video hiding to hide a secret video into a cover video. By hiding one secret video into a cover video, we obtain a stego video, which looks like a meaningful video that is indistinguishable from the original cover video. In this way, even if the attackers intercept the video on Internet, they would not notice that there is another video hidden inside it. In this thesis, we propose a method for video hiding in a real-time communication system such as Video over Internet Protocol (VoIP). The proposed method is called Real-time Video Hiding (RVH), and it is further implemented with the H.264/AVC codec. H.264/AVC is a new digital video codec, which is supported by many video over IP devices. The experimental results show that RVH is suitable to be applied in VoIP to increase its security.

並列關鍵字

HVS H.264/AVC LSB Steganography

參考文獻


[1] Christian Grotho, Krista Grotho, Ludmila Alkhutova, Ryan Stutsman, and Mikhail Atallah, “Translation-Based Steganography”, Proceedings of Information Hiding Workshop (IH 2005), pp.213-233. Springer-Verlag, 2005.
[2] P. Bao and Xiaohu Ma, “MP3-resistant music steganography based on dynamic range transform”, IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2004), pp.266-271, 18-19 Nov. 2004.
[3] Chungyi Wang and Quincy Wu, “Information Hiding in Real-time VoIP Streams” Multimedia. IEEE International Symposium on Ninth (ISM 2007), pp.255-262, 10-12 Dec.2007.
[4] EasyBMP, [http://easybmp.sourceforge.net/steganogeaphy.html].
[5] Dorian A. Flowers, “Investigating Steganography”, Proceedings of the 42nd annual ACM Southeast regional conference (ACM-SE42),2-3 April 2004.

延伸閱讀