A Secure Watermarking Technique for the Object-Oriented Video Coding System

碩士 === 中華大學 === 資訊工程學系碩士班 === 91 === The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emergi...

Full description

Bibliographic Details
Main Authors: Tsai-Hsing Chen, 陳再興
Other Authors: Cheng-Chang Lien
Format: Others
Language:en_US
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/69338590472098370286
id ndltd-TW-091CHPI0392025
record_format oai_dc
spelling ndltd-TW-091CHPI03920252016-06-24T04:16:12Z http://ndltd.ncl.edu.tw/handle/69338590472098370286 A Secure Watermarking Technique for the Object-Oriented Video Coding System 具安全性浮水印技術應用於物件導向視訊編碼系統 Tsai-Hsing Chen 陳再興 碩士 中華大學 資訊工程學系碩士班 91 The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emerging counterfeit attacks make the authentication process difficult and then the rightful ownership is hard to be claimed. Therefore, the watermark encryption problem should be considered in developing the public watermarking system to resist the counterfeit attacks. In this thesis, a two-stage watermark embedding technology is developed to construct a secure watermarking technique for the object-oriented video coding system. In the first stage, the MD5 secure hash algorithm and the RSA cryptographic technique are applied to hide the watermarks into the image feature coefficients such that the watermarks may be encrypted securely. In the second stage, another watermark is embedded during the SPIHT encoding process for the partitioned video objects. By specifying the encoding priorities of the partitioned objects and the bitplane-by-bitplane shifting of these objects according to their encoding priorities, the watermark may be inserted into the empty bitplanes. Through the two-stage watermark extraction and similarity measure processes, the rightful ownership can be authenticated. Furthermore, by comparing the extracted watermarks among the wavelet subbands, the image regions that are modified by the counterfeiter may be identified. In addition, the JND functions generated by the Human Visual System (HVS) are utilized to embed the watermarks with the largest strength under the visual invisible requirement. Cheng-Chang Lien Chang-Hsing Lee 連振昌 李建興 2003 學位論文 ; thesis 0 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 中華大學 === 資訊工程學系碩士班 === 91 === The conventional public watermarking systems address the problems of invisible watermark embedding technique and robust resistance for various kinds of attacks including the compression, filtering, and geometric transformation etc. However, some emerging counterfeit attacks make the authentication process difficult and then the rightful ownership is hard to be claimed. Therefore, the watermark encryption problem should be considered in developing the public watermarking system to resist the counterfeit attacks. In this thesis, a two-stage watermark embedding technology is developed to construct a secure watermarking technique for the object-oriented video coding system. In the first stage, the MD5 secure hash algorithm and the RSA cryptographic technique are applied to hide the watermarks into the image feature coefficients such that the watermarks may be encrypted securely. In the second stage, another watermark is embedded during the SPIHT encoding process for the partitioned video objects. By specifying the encoding priorities of the partitioned objects and the bitplane-by-bitplane shifting of these objects according to their encoding priorities, the watermark may be inserted into the empty bitplanes. Through the two-stage watermark extraction and similarity measure processes, the rightful ownership can be authenticated. Furthermore, by comparing the extracted watermarks among the wavelet subbands, the image regions that are modified by the counterfeiter may be identified. In addition, the JND functions generated by the Human Visual System (HVS) are utilized to embed the watermarks with the largest strength under the visual invisible requirement.
author2 Cheng-Chang Lien
author_facet Cheng-Chang Lien
Tsai-Hsing Chen
陳再興
author Tsai-Hsing Chen
陳再興
spellingShingle Tsai-Hsing Chen
陳再興
A Secure Watermarking Technique for the Object-Oriented Video Coding System
author_sort Tsai-Hsing Chen
title A Secure Watermarking Technique for the Object-Oriented Video Coding System
title_short A Secure Watermarking Technique for the Object-Oriented Video Coding System
title_full A Secure Watermarking Technique for the Object-Oriented Video Coding System
title_fullStr A Secure Watermarking Technique for the Object-Oriented Video Coding System
title_full_unstemmed A Secure Watermarking Technique for the Object-Oriented Video Coding System
title_sort secure watermarking technique for the object-oriented video coding system
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/69338590472098370286
work_keys_str_mv AT tsaihsingchen asecurewatermarkingtechniquefortheobjectorientedvideocodingsystem
AT chénzàixìng asecurewatermarkingtechniquefortheobjectorientedvideocodingsystem
AT tsaihsingchen jùānquánxìngfúshuǐyìnjìshùyīngyòngyúwùjiàndǎoxiàngshìxùnbiānmǎxìtǒng
AT chénzàixìng jùānquánxìngfúshuǐyìnjìshùyīngyòngyúwùjiàndǎoxiàngshìxùnbiānmǎxìtǒng
AT tsaihsingchen securewatermarkingtechniquefortheobjectorientedvideocodingsystem
AT chénzàixìng securewatermarkingtechniquefortheobjectorientedvideocodingsystem
_version_ 1718323445903654912