视频水印抗拷贝攻击方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络普及与发展,数字产品的共享变得越来越容易和频繁,多媒体作品的版权保护问题已经迫在眉睫,数字水印技术作为数字产品版权保护的主要手段,对其进行研究的必要性也越来越明显。水印信息隐藏在数字作品中,并伴随着数字作品的传播而传播,因此水印技术很容易受到各种各样有意或无意的攻击。为了确保视频水印的鲁棒性,对视频水印常见攻击的防范方法的研究是一项至关重要的工作。
     本文的主要内容包括两部分:第一部分是在分析课题研究背景、研究现状、研究内容的基础上,描述了视频水印的基本原理、典型算法、常见攻击类型及研究难点,然后详细阐述了视频水印常见攻击中的一种——拷贝攻击的实施方法和影响后果,最终提出了一种全新的视频水印生成方法,使用该算法嵌入水印的视频水印系统能有效抵抗拷贝攻击。第二部分介绍了“基于随机理论的视频水印系统”中“水印提取部分”的开发过程,水印的提取方法依赖于水印的嵌入方法。该系统的功能特点是实现同一视频可同时选择多种不同的水印算法嵌入和提取水印,同时每种算法可以实现嵌入比例可调。“水印提取”时,不仅可以识别水印信息,而且可以识别所使用的水印嵌入算法。
     本篇论文的目标是提出一种全新的视频水印算法,这种算法可以有效抵抗拷贝攻击,这不仅增强了视频水印系统的鲁棒性,而且为水印的研究方法提供了一种新的思路。“基于随机理论的视频水印系统”为视频水印的随机理论研究提供了必要的工具,同时也丰富了实践项目经验。
With the popularization and development of the network, the sharing of digital products becomes more easily and frequently. The copyright protection of multimedia works is imminent. Digital watermarking technology is the primary means to protect digital copyright. So the necessary of study is evident. Digital watermark information hidden in the digital works, along with the spread of digital works, thus the watermark is vulnerable to a variety of intentional or unintentional attacks. To ensure the robustness of video watermarking, study on video watermarking against common method of attack is a critical task.
     The main content consists of two parts: the first is based on the analysis of the research background, current status, study content; describes the basic principles of video watermarking, the typical algorithm of common attack types and difficulty, and then elaborates on one of the watermarking against common attacks - copy attack and the impact of the implementation methods, ultimately proposes a new video watermarking generation method, using the algorithm embedded watermark video watermarking system can resist copy attack. The second part introduces the development process of "watermark extraction part" in the "random theory based video watermarking system ", features of the system is to achieve that the same video can choose different watermark embedding and extracting watermarking algorithm, and also each algorithm embedded proportion can be adjusted. While "Watermark extraction", the system can not only identify watermark information, but also identify the watermarking algorithm used.
     Goal of this thesis is to propose a new video watermarking algorithm, which can effectively resist copy attack, which not only enhances the robustness of video watermarking system, but also provides a new way of thinking for the watermark. "Random theory based video watermarking system" provides the necessary tool for the random theory research of video watermarking, and services as a wealth of practical project experience.
引文
[1] Martin Kutter and Sviatoslav Voloshynovskiy and Alexander Herrigel,“The Watermark Copy Attack”, Proc. SPIE, San. Jose. CA. USA, vol. 3971, pp. 371~379, January 2000.
    [2] Ju Liu, Huibo Hu, Jiande Sun and Yu Huang. A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components. ISNN 2005, LNCS 3497, pp. 777~782, 2005.
    [3] NIU Xiaoli,LIU Ju,SUN Jiande and YAN Hua. A novel Watermarking Method Resistant to Copy Attack. JOURNAL OF SHANDONG UNIVERSITY. China.vol.41,No.4,pp.121~128.Aug. 2006
    [4] HU Huibo,Liu Ju and Sun Jiande. An ICA-Based Watermarking Scheme Resistant to Copy Attack. Journal of Electronics & Information Technology. China. vol.27,No.7,pp.1035~1038.Jul. 2005
    [5]杨成,杨义先.信息安全与数字版权保护(上) [J].计算机安全,2004 (1):32~36.
    [6]周芸,邹振宁,杨志强.信息隐藏技术在计算机网络战中的应用研究[J].光电技术应用. 2003 (5).
    [7]梁长垠,李昂,牛夏牧.基于云水印的视频内容认证技术[J].中山大学学报(自然科学版). 2009 (1),第48卷第1期:26~30.
    [8] Zou Xiaoxiang , Peng Cong ,Li J intao , et al ,Video watermark technique [J] . Journal of Engneering Graphics. 2002 ,3 (3) :169~179
    [9] F A Petitcolas , R J Anderson , M G Kuhn. Information Hiding~A Survey[C].In: Proceeding of the IEEE: Special Issue on Protection of Multimedia Content , 1999~05 ; 87(7) ; 1062~1078 .
    [10] VOYATZIS G, P ITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999, 87 (7) : 1197~1207.
    [11] Hartung F and Kutter M .Multimedia Watermarking techniques .Proceeding of the IEEE ,1999 , 87(7) :1079~1107
    [12] Cox I J , Kilian J ,Leighton F T , et al . Secure spread apectrum watermarking for multimedia .IEEE Trans. on Image Processing ,1997,6(12):1674~1687
    [13]易开祥,石教英,孙鑫.数字水印技术研究进展[J].中国图象图形学报,2001,6(2):111~117.
    [14]梁华庆,王磊,双凯,杨义先.一种在原始视频帧中嵌入的鲁棒的数字水印[J] .电子与信息学报,2003 , (25) 9 :1281~1284
    [15]刘丽,彭代渊,李晓举.抵抗线性共谋攻击的空域自适应视频水印方案[J] .西安交通大学学报,2007(8),第42卷第4期:456~460
    [16] Mobasseri B. G. Direct sequence watermarking of digital Video using m~frames. Image Processing [C] . The proceedings of ICIP98. International Conference on ,1998 ,2 :399~403
    [17] F. Hartung and B. Girod. Digital watermarking of raw and compressed video [J] . Proc. SPIE :Digital compression Technologies and systems for Video Communication ,1996 , 2952 :205~213
    [18]李英,高新波,姬红兵.一种基于三维小波的视频水印空时算法[J] .系统工程与电子技术,2005 , (27) 1 :16~19
    [19]孙建德,刘琚.基于独立分量分析的盲视频水印方案[J ] .电子学报. 2004 , (32) 9 :1507~1510
    [20] Deguillaume F, Csurka G, and Ruanaidh J O, et al.. Robust 3D DFT video watermarking. Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose, USA, 1999, 3657: 113-124.
    [21] Swanson M D, Zhu B, and Tewfik A H. Multiresolution scene~based video watermarking using perceptual models. IEEE J. on Selected Areas in Communications, 1998, 16(4): 540-550.
    [22]龚明,周海涛,金海华.一种自适应DCT域数字视频水印方案[J].电讯技术.2006年第1期:152~156
    [23] KOCH E, ZHAO J. Towards robust and hidden image copyright labeling[C]//Proc. of 1995 IEEE workshop on nonlinear signal and Image Processing, Neos Marmaras, Greece, June 20~22, 1995.[S.l.]:IEEE Press, 1995:452~455.
    [24]周国志,徐岩,任连涛,李桂苓.基于DCT的数字视频水印算法研究[J].视频技术应用与工程.2006年第9期:81~83
    [25]郑振东,王沛,陈胜.基于运动矢量区域特征的视频水印方案[J].中国图象图形学报. 2008(10),第13卷第10期:1926~1929
    [26]朱仲杰,蒋刚毅,郁梅,等1基于运动矢量的视频图像数字水印算法[J ]1电路与系统学报, 2002 , 7 (3) : 58~61)
    [27] Hartung F , Eisert P , Girod B. Digital watermarking of MPEG~4 facial animation parameters [J ]. Computer & Graphics ,1998 , 22 (3) : 425~435
    [28]袁开国,张茹,许欣,钮心忻,杨义先,基于MPEG~4编码原理的信息隐藏算法设计.通信学报.2009(5).第30卷第5期.48~53
    [29]陈明奇,钮心忻,杨义先.数字水印的攻击方法[J].电子与信息学报2001,23(7):705~711
    [30]刘春庆,王执铨,戴跃伟.常用数字图像水印攻击方法及基本对策[J].控制与决策.2004(6)第19卷第6期: 601~606
    [31] Frank Hartung , Martin Kutter. Multimedia watermarking techniques [J] . Proceedings of the IEEE ,1999 , 87 (7) :1079~1107
    [32] G.Langelaar, R.Lagendijk, and J.Biemond. Removing spatial spread spectrum watermarks by non~linear filtering. In Proceedings EUSIPCO98, volume4, pages2281~2284,1998.
    [33] Sviatoslav Voloshynovskiy, Shelby Pereira, Alexander Herrigel, Nazani Baumgrtner, and Thierry Pun. Generalized watermarking attack based on watermark estimation and perceptual remodulation. In Proceeding sof SPIE: Securiy and Watermarking of Multimedia Content II, San Jose, CA,USA,January2000.SPIE.
    [34] Yanling Zhao, Xiaoshi Zheng, Na Li, Guangqi Liu,Qingxi Wang. A Digital Image Watermark Algorithm Based on DC Coefficients Quantization. WCICA 06.2006.06:9734~9738.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700