A Secure Watermarking Technique for the Object-Oriented Video Coding System
碩士 === 中華大學 === 資訊工程學系碩士班 === 91 === The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emergi...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/69338590472098370286 |
id |
ndltd-TW-091CHPI0392025 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091CHPI03920252016-06-24T04:16:12Z http://ndltd.ncl.edu.tw/handle/69338590472098370286 A Secure Watermarking Technique for the Object-Oriented Video Coding System 具安全性浮水印技術應用於物件導向視訊編碼系統 Tsai-Hsing Chen 陳再興 碩士 中華大學 資訊工程學系碩士班 91 The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emerging counterfeit attacks make the authentication process difficult and then the rightful ownership is hard to be claimed. Therefore, the watermark encryption problem should be considered in developing the public watermarking system to resist the counterfeit attacks. In this thesis, a two-stage watermark embedding technology is developed to construct a secure watermarking technique for the object-oriented video coding system. In the first stage, the MD5 secure hash algorithm and the RSA cryptographic technique are applied to hide the watermarks into the image feature coefficients such that the watermarks may be encrypted securely. In the second stage, another watermark is embedded during the SPIHT encoding process for the partitioned video objects. By specifying the encoding priorities of the partitioned objects and the bitplane-by-bitplane shifting of these objects according to their encoding priorities, the watermark may be inserted into the empty bitplanes. Through the two-stage watermark extraction and similarity measure processes, the rightful ownership can be authenticated. Furthermore, by comparing the extracted watermarks among the wavelet subbands, the image regions that are modified by the counterfeiter may be identified. In addition, the JND functions generated by the Human Visual System (HVS) are utilized to embed the watermarks with the largest strength under the visual invisible requirement. Cheng-Chang Lien Chang-Hsing Lee 連振昌 李建興 2003 學位論文 ; thesis 0 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中華大學 === 資訊工程學系碩士班 === 91 === The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emerging counterfeit attacks make the authentication process difficult and then the rightful ownership is hard to be claimed. Therefore, the watermark encryption problem should be considered in developing the public watermarking system to resist the counterfeit attacks. In this thesis, a two-stage watermark embedding technology is developed to construct a secure watermarking technique for the object-oriented video coding system. In the first stage, the MD5 secure hash algorithm and the RSA cryptographic technique are applied to hide the watermarks into the image feature coefficients such that the watermarks may be encrypted securely. In the second stage, another watermark is embedded during the SPIHT encoding process for the partitioned video objects. By specifying the encoding priorities of the partitioned objects and the bitplane-by-bitplane shifting of these objects according to their encoding priorities, the watermark may be inserted into the empty bitplanes. Through the two-stage watermark extraction and similarity measure processes, the rightful ownership can be authenticated. Furthermore, by comparing the extracted watermarks among the wavelet subbands, the image regions that are modified by the counterfeiter may be identified. In addition, the JND functions generated by the Human Visual System (HVS) are utilized to embed the watermarks with the largest strength under the visual invisible requirement.
|
author2 |
Cheng-Chang Lien |
author_facet |
Cheng-Chang Lien Tsai-Hsing Chen 陳再興 |
author |
Tsai-Hsing Chen 陳再興 |
spellingShingle |
Tsai-Hsing Chen 陳再興 A Secure Watermarking Technique for the Object-Oriented Video Coding System |
author_sort |
Tsai-Hsing Chen |
title |
A Secure Watermarking Technique for the Object-Oriented Video Coding System |
title_short |
A Secure Watermarking Technique for the Object-Oriented Video Coding System |
title_full |
A Secure Watermarking Technique for the Object-Oriented Video Coding System |
title_fullStr |
A Secure Watermarking Technique for the Object-Oriented Video Coding System |
title_full_unstemmed |
A Secure Watermarking Technique for the Object-Oriented Video Coding System |
title_sort |
secure watermarking technique for the object-oriented video coding system |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/69338590472098370286 |
work_keys_str_mv |
AT tsaihsingchen asecurewatermarkingtechniquefortheobjectorientedvideocodingsystem AT chénzàixìng asecurewatermarkingtechniquefortheobjectorientedvideocodingsystem AT tsaihsingchen jùānquánxìngfúshuǐyìnjìshùyīngyòngyúwùjiàndǎoxiàngshìxùnbiānmǎxìtǒng AT chénzàixìng jùānquánxìngfúshuǐyìnjìshùyīngyòngyúwùjiàndǎoxiàngshìxùnbiānmǎxìtǒng AT tsaihsingchen securewatermarkingtechniquefortheobjectorientedvideocodingsystem AT chénzàixìng securewatermarkingtechniquefortheobjectorientedvideocodingsystem |
_version_ |
1718323445903654912 |