簡易檢索 / 詳目顯示

研究生: 張博鈞
Po-Chun Chang
論文名稱: 在HEVC及H.264/AVC幅內編碼中之無錯誤傳遞的資料隱藏方法
Error propagation-free data hiding algorithm for HEVC and H.264/AVC intra-coded frames
指導教授: 鍾國亮
Kuo-Liang Chung
口試委員: 洪西進
Shi-Jinn Horng
古鴻炎
Hung-Yan Gu
貝蘇章
Soo-Chang Pei
陳建中
Jiann-Jone Chen
范國清
Kuo-Chin Fan
廖弘源
Liao, Mark
黃詠淮
Yong-Huai Huang
林建雄
Chien-Hsiung Lin
學位類別: 博士
Doctor
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 66
中文關鍵詞: 影像品質改善資料隱藏H.264/AVCHEVC
外文關鍵詞: quality improvement scheme, data hiding, H.264/AVC, HEVC
相關次數: 點閱:365下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在之前有幾個針對H.264/AVC的資料隱藏方法被提出,但是這些方法遭遇到幅內編碼中的錯誤傳遞問題。在本論文中,我們第一個提出植基於DCT/DST的HEVC幅內編碼之資料隱藏方法。本論文分析DCT和DST的係數特性去找出不會造成錯誤傳遞的轉換係數位置。所提出的植基於DCT/DST的HEVC資料隱藏演算法是對我們另一個植基於DCT的H.264/AVC資料隱藏法的擴充。實驗結果顯示我們提出的HEVC資料隱藏方法的優勢包含1.無錯誤傳遞的幅內編碼2.嵌入資訊後的畫面品質3.繼承自HEVC的壓縮效能4.在低碼率時,相較於我們和Ma等人在H.264/AVC所提出的資料隱藏方法,有較好的嵌入容量。


    Previously several data hiding methods were presented for H.264/AVC, but they suffer from the error propagation problem in intra-coded frames. In this thesis, we present the first DCT/DST-based data hiding algorithm for HEVC intra-coded frames where the block DCT and DST coefficient characteristics are investigated to locate the transformed coefficients that can be perturbed without propagating errors to neighboring blocks.The proposed DCT/DST-based data hiding algorithm for HEVC is the extension of our another DCT-based data hiding algorithm for H.264/AVC. Experimental results confirm the merits of the proposed data hiding algorithm for HEVC in providing the intra-frame error propagation-free advantage, the quality improvement for marked images, the compression power inherited from HEVC, and the superiority of embedding capacity for low bitrate coding when compared with the previous two algorithms for H.264/AVC, one by us and the other by Ma et al.

    論文口試委員審定書. . . . . . . . . . . . . . . . . . . . . . . . . . . i 中文摘要. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . iv Table of contents . . . . . . . . . . . . . . . . . . . . . . . . . .v List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . .vii 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 Preliminaries of HEVC and H.264/AVC . . . . . . . . . . . . . . . .5 2.1 Intra coding scheme . . . . . . . . . . . . . . . . . . . . . . .5 2.2 Transform coding related to the luma intra prediction . . . . . .8 3 The proposed data hiding algorithm for intra frame . . . . . . . . 13 3.1 Intra-frame error propagation patterns . . . . . . . . . . . . . 13 3.2 The DCT/DST perturbation pattern analysis . . . . . . . . . . . .15 3.3 The proposed DCT/DST based data hiding algorithm . . . . . . . . 25 3.4 Quality improvement scheme for reconstructed intra frames . . . .28 4 Experimental results . . . . . . . . . . . . . . . . . . . . . . . 32 4.1 Quality improvement analysis . . . . . . . . . . . . . . . . . . 32 4.2 Performance comparision . . . . . . . . . . . . . . . . . . . . .34 5 Conclusion and Future Work . . . . . . . . . . . . . . . . . . . . 49

    [1] F. Bossen, “Common test conditions and software reference configurations,” JCTVC-L1100, (2013).
    [2] B. Bross, W. J. Han, J. R. Ohm, G. J. Sullivan, and T. Wiegand, “JCTVCF803: WD4: Working draft 4 of high-efficiency video coding,” JCTVC of ITU-T SG16 WP3 and ISO/IEC JTC1/SC29/WG11, (2011).
    [3] H. T. Chang, C. C. Hsu, C. H. Yeh, and D. F. Shen, “Image authentication with tampering localization based on watermark embedding in Wavelet domain,” Optical Engineering, Vol. 48, No. 5, pp. 057002-1-057002-10, (2009)
    [4] Draft ITU-T recommendation and nal draft international standard of joint video speci cation, document ITU-T Rec. H.264/ISO/IEC 14496-10 AVC, JVT of ISO/IEC and ITU-T, (2003).
    [5] X. Gong and H. M. Lu, “Towards fast and robust watermarking scheme for H.264 video,” in Proc. IEEE Int. Symp. Multimedia, pp. 649-653, (2008)
    [6] W. Huo, Y. Zhu, and H. Chen, “A controllable error-drift elimination scheme for watermarking algorithm in H.264/AVC stream,” IEEE Signal Processing Letters, Vol. 18, No. 9, pp. 535-538, (2011)
    [7] I. Kim, J. Min, T. Lee, W. Han, and J. Park, “Block partitioning structure in the HEVC standard,” IEEE Trans. Circuits and Systems for Video Technology, Vol. 22, No. 12, pp. 1697-1706, (2012)
    [8] Y. Li, H. X. Chen, and Y. Zhao, “A new method of data hiding based on H.264 encoded video sequences,” in Proc. IEEE Int. Conf. Signal Processing, pp. 1833-1836, (2010)
    [9] T. J. Lin, K. L. Chung, P. C. Chang, Y. H. Huang, H. Y. Liao, and C. Y. Fang, “An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames,” Journal of Systems and Software, Vol. 86, No. 3, pp. 604-614, (2013)
    [10] P. C. Chang, K. L. Chung, J. J. Chen, C. H. Lin, and T. J. Lin, “A DCT/DST based error propagation-free data hiding algorithm for HEVC intra-coded frames,” Journal of Visual Communication and Image Representation, acceptance for publication, (2013).
    [11] T. Y. Liu and W. H. Tsai, “Quotation authentication: a new approach and efficient solutions by data hiding and cascaded hashing techniques,” IEEE Trans. Information Forensics and Security, Vol. 5, No. 4, pp. 945-954, (2010)
    [12] X. J. Ma, Z. T. Li, H. Tu, and B. Zhang, “A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift,” IEEE Trans. Circuits and Systems for Video Technology, Vol. 20, No. 10, pp. 1320-1330, (2010)
    [13] M. Noorkami and R. Mersereau, “Compressed-domain video watermarking for H.264,” in Proc. IEEE Int. Conf. Image Processing, Vol. 2, pp. 890-893, (2005)
    [14] M. Noorkami and R. M. Mersereau, “Towards robust compressed-domain video watermarking for H.264,” in Proc. SPIE|Security, Steganography, and Watermarking of Multimedia Contents VIII, Vol. 6072, pp. 489-497, (2006)
    [15] M. Noorkami and R. Mersereau, “A framework for robust watermarking of H.264-encoded video with controllable detection performance,” IEEE Trans. Information Forensics and Security, Vol. 2, No. 1, pp. 14-23, (2007)
    [16] X. Qi and X. Xin, “A quantization-based semi-fragile watermarking scheme for image content authentication,” J. Vis. Commun. Image Representat., Vol. 22, No. 2, pp. 187-200, (2011)
    [17] G. Qiu, P. Marziliano, A. T. Ho, D. He, and Q. Sun, “A Hybrid Watermarking Scheme for H.264/AVC Video,” in Proc. IEEE Int. Conf. Pattern Recognition, Vol. 4, pp. 865-868, (2004)
    [18] B. Samira, A. Hassina, and H. Latifa, “H.264/AVC data hiding algorithm with a limitation of the drift distortion,” in Proc. IEEE Int. Conf. Signal Processing, Vol. 3, pp. 1682-1687, (2012)
    [19] R. J. Chen, Y. C. Chen, J. L. Lai, and S. J. Horng, “Data Hiding Using Flexible Multi-bit MER,” International Symposium on Biometrics and Security Technologies, Sichuan, China, pp. 2-5 (2013).
    [20] H. T. Sencar, M. Ramkumar, and A. N. Akansu, “Data hiding fundamentals and applications,” Elsevier Academic Press, London, UK, (2004).
    [21] G. Tian and S. Goto, “An optimization scheme for quadtree-structured prediction and residual encoding in HEVC,” in Proc. IEEE Asia Paci c Conf. Circuits and Systems, pp. 547-550, (2012)
    [22] K. Wong, K. Tanaka, and X. Qi, “Multiple messages embedding using DCT based mod4 steganographic method,” in Proc. LNCS Int. Workshop Multimedia Content Representation, Classi cation, Security, pp. 57-65, (2006)
    [23] J. Zhang, A. T. S. Ho, and G. Qiu, “Robust video watermarking of H.264/AVC,” IEEE Trans. Circuits and Systems II: Express Briefs, Vol. 54, No. 2, pp. 205-209, (2007)
    [24] L. Zhang, Y. Zhu, and L. M. Po, “A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC,” in Proc. IEEE Int. Conf. Acoustics Speech and Signal Processing, pp. 1758-1761, (2010)
    [25] [Online]. http://140.118.175.164/PCChang/paper/HEVCDataHiding/.
    [26] K. L. Chung, Y. H. Huang, P. C. Chang, and H. Y. M. Liao, “Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,” IEEE Trans. Circuits and Systems for Video Technology, Vol. 20, No. 11, pp. 1643-1647, (2010)
    [27] P. C. Chang, K. L. Chung, W. N. Yang, W. J. Yang, C. H. Lin, and T. J. Lin, “Linear-time redundant prediction mode elimination method for intra coding in H.264/AVC,” Signal Image and Video Processing, acceptance for publication, (2013)
    [28] G. Laroche, J. Jung, and B. Pesquet-Popescu, “Intra coding with prediction mode information inference,” IEEE Trans. Circuits and Systems for Video Technology, Vol. 20, No. 12, pp. 1786-1796, (2010)
    [29] K. L. Chung, Y. H. Huang, P. C. Chang, and J. P. Fang, “Improved Fast and Bitrate-saving Method for Compressing Depth Videos in H.264/MVC”, to be submitted.

    QR CODE