簡易檢索 / 詳目顯示

研究生: 白御廷
Yu-Ting Pai
論文名稱: 具能源效率之浮水印演算法研究
The Research of Energy-Efficient Watermarking Algorithms
指導教授: 阮聖彰
Shanq-Jang Ruan
口試委員: 賴飛羆
Feipei Lai
楊佳玲
Chia-Lin Yang
鐘國亮
K. L. Chung
張延任
Yen-Jen Chang
郭景明
Jing-Ming Guo
林昌鴻
C. H. Lin
許孟超
Mon-Chau Shie
學位類別: 博士
Doctor
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 128
中文關鍵詞: 低功率能源效率數位浮水印強健性幾何攻擊盲解法
外文關鍵詞: Low power, energy-efficient, digital watermarking, robustness, geometric attacks, blind extraction
相關次數: 點閱:412下載:5
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於多媒體資訊與網路的快速發展,使得資料的傳佈變得非常的快速與便捷,因此利用數位浮水印技術來宣告所有權在近年來是個相當熱門的探討議題。為了達成各種不同的需求,如強健性、透明度、盲解法(blindness)等等,有許多研究發展出高品質與多功能的數位浮水印技術。雖然這些研究提出了令人滿意地結果,但這些方法在硬體實做方面必需耗費大量的電路面積與能量消耗。對一般的嵌入式系統而言,電路面積與電池續電量是受限制地,所以導致這些文獻上所提出的高運算量演算法難以被運用在實際的嵌入式產品上。
    在本論文中,我們致力於發展具能源效率之浮水印演算法研究。我們針對三種不同形態的浮水印演算法進行分析,並在不影響浮水印與影像品質之下提出低能源消耗的演算法。首先我們對於最基本形態的浮水印演算法進行改良,我們利用頻域係數來直接運算排序配對機制,因此得以簡化複雜的變異數運算。為了更進一步的節省能量消耗與達到盲解法的需求,我們對於基於展頻原理的浮水印演算法進行改良,在第二部分我們利提出的特殊逆向餘弦轉換法來取代原有的正逆餘弦轉換。由於在浮水印演算法中,頻域轉換通常佔有絕大部分的能量消耗,對於節省整體的能量消耗而言,能夠降低頻域轉換上的耗電量是個非常有效的方法。第三部分我們考慮到解決幾何轉換攻擊的動態影像浮水印演算法,我們利用一個混合式的架構來分別抵抗壓縮與幾何轉換的攻擊。對於一個壓縮過的動態影像而言,我們利用其頻域係數來直接嵌入浮水印資料,以達到抵抗壓縮及濾波器的攻擊及節省運算量的目的,接著我們在傅利葉頻域係數中嵌入樣本標記,來恢復受到仿射轉換攻擊的影像,利用所提出的偏傅利葉轉換及取樣式的逆向傅利葉轉,我們可以減少大量的能源消耗。為了量測與評估所提出的方法,我們利用Wattch量測工具集來進行模擬能量消耗與執行時間。另外在品質測量的實驗方面也顯示了所提出的方法能夠勝任各種不能的攻擊與破壞。


    Digital watermarking is a potential method for copyright protection. In order to achieve robustness, transparency, blindness, and etc., much literature has discussed how to develop a high quality watermarking. Although these previous methods offer the satisfactory results for resisting many attacks, the complicated frameworks cost a lot of area and energy consumption for hardware implementation. Since the chip area and battery life of embedded systems are always restricted, these high complexity watermarking methods are not popular used nowadays.
    In this dissertation, we are concerned with energy-efficient and robust watermarking technologies. We analyze the computational complexity for three type watermarking algorithms. First, we propose an improvement of basic watermarking algorithm. The frequency coefficients are exploited directly as the criterion for the permutation mapping. The energy and time consumption can be reduced without calculating variance parameter in spatial domain. Second, in order to further reduce power and achieve the requirement of blind extraction, we continue our study based on DS-CDMA based wateramrking algorithm. According to the properties of DCT and DS-CDMA, the inverse discrete cosine transform is qualified to substitute for both forward and inverse transform in proposed method. Thus, we can save quantities of energy and time consumption. Third, the study is focus on overcoming geometric attacks for video. The proposed algorithm provide the robustness via hide watermark in DCT domain, and supply the capability of resisting geometric attacks by embedded a group of template to DFT domain. For power saving, the watermark massage is embedded in DCT domain which is decoded from video directly. In additional, we propose partial DFT and downsampling methods to reduce the huge computational complexity. To validate the results, we employ Wattch toolset developed at Princeton University to evaluate power dissipation and execution time. Moreover, the quality measuring results show that the proposed watermarking algorithms is robust enough against several signal distortions.

    Acknowledgments i Abstract iii Contents v List of Tables viii List of Figures xiv 1 Introduction 1 1.1 Motivation and Recent Related Research 1 1.1.1 Issues to be Investigated 1 1.1.2 The Requirements of Watermarking 3 1.1.3 Low Power Technique for Multimedia Systems 4 1.2 Main Contributions of the dissertation 5 1.3 Organization of the Dissertation 7 2 Background and RelatedWorks 9 2.1 Fundamentals of Watermarking Algorithms 9 2.1.1 Secure Spread Spectrum Watermarking for Multimedia 9 2.1.2 Hidden Digital Watermarks in Images 11 2.1.3 Cocktail Watermarking for Digital Image Protection 12 2.2 Blind Watermarking Algorithms 13 2.2.1 VQ-Based Watermarking 13 2.2.2 Digital Watermarking of Images Using Neural Networks 14 2.2.3 DS-CDMA 16 2.3 Affine Resistant Watermarking Algorithms 19 2.3.1 Invariant Domain Watermarking 19 2.3.2 Template Based Watermarking 20 2.3.3 Self-Synchronizing Based Watermarking 23 3 Energy-EfficientWatermarking Algorithm for Permutation Mapping 25 3.1 The Methodology of Proposed Permutation Mapping Mechanism 26 3.1.1 The Proposed Pairing Mechanism 26 3.1.2 Analysis and Statistics 30 3.2 The Methodology of High Quality Embedding Approach 34 3.2.1 The Problem between Block-based Permutation Mapping and Neighboring Block 34 3.2.2 Embedding Process 35 3.2.3 Extracting Process 39 3.3 Experimental Results 40 3.3.1 Power Simulation 40 3.3.2 Quality Measuring 43 3.4 Summary 50 4 DS-CDMA Based Energy-EfficientWatermarking Algorithm 57 4.1 Computation Analysis of Typical DS-CDMA Based Watermarking 57 4.2 Low Computational Watermarking Algorithm 60 4.2.1 Embedding Algorithm 60 4.2.2 Extraction Algorithm 64 4.3 Computation Analysis of the Proposed Algorithm 65 4.4 Experimental Results 67 4.4.1 Execution Time and Power Simulation 67 4.4.2 Quality Measurement 71 4.4.3 Spatial-Domain Attacks 80 4.5 Summary 81 5 Energy-Efficient Video Watermarking Algorithm Based on DCT-DFT Composite Approach 93 5.1 The Methodology of Low Power Watermark Embedding 93 5.1.1 Watermark Message Embedding 94 5.1.2 Template Embedding 96 5.2 Watermark Extraction 102 5.2.1 Template Detection 102 5.2.2 Watermark Decoding 104 5.3 Experimental Results 106 5.3.1 Power Simulation 106 5.3.2 Quality Measurement 111 5.4 Summary 118 6 Conclusions and Discussion 119 Bibliography 121

    [Bao 2005] P. Bao and M. Xiaohu. Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans. on Circuits and Systems for Video Technology, vol. 15, no. 1, pages 96–102, Jan. 2005. 1
    [Barni 2002] M. Barni, F. Bartolini and A. Piva. Multichannel watermarking of color images. IEEE Trans. on Circuits and Systems for Video Technology, vol. 12, no. 3, pages 142–156, March 2002. 1
    [BenAyed 1998] M. A. BenAyed, L. Dulau, P. Nouel, Y. Berthournieu, N. Masmoudi, P. Kadionik and L. Kamoun. New design using a VHDL description for DCT based circuits. In Proceedings of the Tenth International Conference on Microelectronics, pages 87–90, Dec 1998. 58
    [Brandt 1996] Robert D. Brandt and Feng Lin. Representations that uniquely characterize images modulo translation, rotation, and scaling. Pattern Recognition Letters, vol. 17, no. 9, pages 1001–1015, Aug. 1996. 19
    [Brooks 2000] D. Brooks, V. Tiwari and M. Martonosi. Wattch: a framework for architectural-level power analysis and optimizations. Proceedings of the 27th International Symposium on Computer Architecture, pages 83–94, 2000. 40, 68, 106
    [Chang 2000] C. Chang and C. Tsai. A Technique for Computing Watermarks from Digital Images. Journal of Computing and Informatica, vol. 24, no. 3, pages 391–396, 2000. 13
    [Cho 1991] N. I. Cho and S. U. Lee;. Fast algorithm and implementation of 2-D discrete cosine transform. IEEE Trans. on Circuits and Systems, vol. 38, pages 297–305, 1991. 26, 57
    [Bao 2005] P. Bao and M. Xiaohu. Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans. on Circuits and Systems for Video Technology, vol. 15, no. 1, pages 96–102, Jan. 2005. 1
    [Barni 2002] M. Barni, F. Bartolini and A. Piva. Multichannel watermarking of color images. IEEE Trans. on Circuits and Systems for Video Technology, vol. 12, no. 3, pages 142–156, March 2002. 1
    [BenAyed 1998] M. A. BenAyed, L. Dulau, P. Nouel, Y. Berthournieu, N. Masmoudi, P. Kadionik and L. Kamoun. New design using a VHDL description for DCT based circuits. In Proceedings of the Tenth International Conference on Microelectronics, pages 87–90, Dec 1998. 58
    [Brandt 1996] Robert D. Brandt and Feng Lin. Representations that uniquely characterize images modulo translation, rotation, and scaling. Pattern Recognition Letters, vol. 17, no. 9, pages 1001–1015, Aug. 1996. 19
    [Brooks 2000] D. Brooks, V. Tiwari and M. Martonosi. Wattch: a framework for architectural-level power analysis and optimizations. Proceedings of the 27th International Symposium on Computer Architecture, pages 83–94, 2000. 40, 68, 106
    [Chang 2000] C. Chang and C. Tsai. A Technique for Computing Watermarks from Digital Images. Journal of Computing and Informatica, vol. 24, no. 3, pages 391–396, 2000. 13
    [Cho 1991] N. I. Cho and S. U. Lee;. Fast algorithm and implementation of 2-D discrete cosine transform. IEEE Trans. on Circuits and Systems, vol. 38, pages 297–305, 1991. 26, 57
    [Hsu 1999] C.-T. Hsu and J.-L. Wu. Hidden digital watermarks in image. IEEE Trans. on Image Processing, vol. 8, pages 58–68, January 1999. ix, x, xv, 5, 7, 10, 11, 26, 33, 35, 36, 41, 44, 47, 69, 70, 109, 110
    [Huhring ] K. Huhring. H.264/AVC Joint Model 15.1 (JM-15.1) Reference Software. http://iphome.hhi.de/suehring/tml/. 106
    [Hwang 2000] Min-Shiang Hwang, Chin-Chen Chang and Kuo-Feng Hwang. Digital watermarking of images using neural networks. Journal of Electronic Imaging, vol. 9, no. 4, pages 548–555, Oct. 2000. ix, 14, 15, 16, 17
    [Jeong 1998] Y. Jeong, I. Lee, H.-S. Kim and K.-T. Park. Fast DCT algorithm with fewer multiplication stages. Electron. Lett., vol. 34, no. 8, pages 723–724, 1998. 58
    [Jeong 2004] H. Jeong, J. Kim and W.-K. Cho. Low-power multiplierless DCT architecture using image correlation. IEEE Trans. on Consumer Electronics, vol. 50, pages 262–267, February 2004. 4
    [Kang 2003] Xiangui Kang, Jiwu Huang, Yun Q. Shi and Yan Lin. A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression. IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 8, pages 776–786, Aug. 2003. ix, 2, 21, 22, 96, 108, 109, 110
    [Kejariwal 2004] Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Nikil Dutt and Rajesh Gupta. Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices. Proceedings of the 41st annual conference on Design automation, vol. 00, pages 556–561, 2004. 4
    [Kii 1999] H. Kii, J. Onishi and S. Ozawa. The digital watermarking method by using both patchwork and DCT. IEEE International Conference on Multimedia Computing and Systems, vol. 1, pages 7–11, 1999. 1
    [Kutter 1999] M. Kutter. Watermarking Resisting to Translation, Rotation, and Scaling. In SPIE: Multimedia systems and applications, volume 3528, pages 423–431, 1999. 23
    [Lee 2009] Li-Te Lee, Yu-Ting Pai, Shanq-Jang Ruan and Jurgen Goetze. An Energy Efficient And High Security Watermarking Mechanism Based on DS-CDMA. In 2009 IEEE International Conference on Multimedia and Expo, pages 1190–1193, June 2009. 109, 110
    [Licks 2005] V. Licks and R. Jordan. Geometric attacks on image watermarking systems. IEEE Multimedia, vol. 12, no. 3, pages 68–78, July-Sept. 2005. 19
    [Lin 2000] S. D. Lin and Chin-Feng Chen. A robust DCT-based watermarking for copyright protection. IEEE Trans. on Consumer Electronics, vol. 46, no. 3, pages 415–421, Aug. 2000. 44, 47
    [Lin 2001] C. Y. Lin, M. Wu and J. A. Bloom. Rotation, scale, and translation resilient public watermarking for images. IEEE Trans. on Image Processing„ vol. 10, pages 755–766, May 2001. 2
    [Linde 1980] Y. Linde, A. Buzo and R. Gray. An Algorithm for Vector Quantizer Design. IEEE Trans. on Communications, vol. 28, no. 1, pages 84–95, Jan 1980. 13
    [Loeffler 1989] C. Loeffler, A. Lightenberg and G. S. Moschytz. Practical fast 1-D DCT algorithms with 11-multiplications. In Proc. ICASSP, volume 2, pages 988–991, 1989. 58, 107
    [Lu 2000] Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze and Hong-Yuan Mark Liao. Cocktail watermarking for digital image protection. IEEE Trans. on Multimedia, vol. 2, pages 209–224, Dec. 2000. ix, 12, 13
    [Masselos 1999] K. Masselos, P. Merakos, T. Stouraitis and C. E. Goutis. Novel vector quantization based algorithms for low-power image coding and decoding. IEEE Trans. on Circuits and Systems II: Analog and Digital Signal Processing, vol. 46, pages 193–198, February 1999. 4
    [Mohanty 2003] S. P. Mohanty, N. Ranganathan and R. K. Namballa. VLSI implementation of invisible digital watermarking algorithms towards the development of a secure JPEG encoder. IEEE Workshop on Signal Processing Systems, pages 183–188, August 2003. 4
    [Nebel 2004] W. Nebel. System-level power optimization. Euromicro Symposium on Digital System Design, pages 24–34, August 2004. 4
    [Niu 2000] X.-M. Niu, Z.-M. Lu and S.-H. Sun. Digital watermarking of still images with gray-level digital watermarks. IEEE Trans. on Consumer Electronics, vol. 46, no. 1, pages 137–145, Feb 2000. 44, 47
    [Pai 2006] Yu-Ting Pai and Shanq Jang Ruan. Low Power Block-based Watermarking Algorithm. IEICE Trans. on Information and Systems, vol. E89-D, pages 1507–1514, Apr. 2006. 25, 69, 70, 109, 110
    [Pai 2007] Yu-Ting Pai and Shanq-Jang Ruan. A High Quality Robust Digital Watermarking by Smart Distribution Technique and effective embedded scheme. IEICE Trans.on Fundamentals, vol. E90-A, no. 3, pages 597–605, March 2007. 25
    [Pereira 1999] S. Pereira, J. J. K. O. Ruanaidh and F. Deguillaume. Template based recovery of fourier-based watermarks using log-polar and log-log maps. IEEE International Conference on Multimedia Computing and Systems, Florence, Italy„ vol. 1, pages 870–874, June 1999. 2
    [Pereira 2000] Shelby Pereira and Thierry Pun. Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans. on image processing, vol. 9, no. 6, pages 1123–1129, Jun. 2000. 2, 96, 104
    [Petitcolas 1998] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn. Attacks on copyright marking systems. In Workshop on Information Hiding Portland, OR, pages 15–17, Apirl 1998. 2
    [Ruanaidh 1998] J. J. K. Ó. Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Elsevier Signal Processing, vol. 66, no. 3, pages 303–317, Nov. 1998. ix, 2, 19, 20
    [Samee 2007] M. K. Samee and J. Gotze. Increased Robustness and Security of Digital Watermarking Using DS-CDMA. In IEEE International Symposium on Signal Processing and Information Technology, pages 185–189, Dec. 2007. 16, 67, 68, 109, 110
    [Seo 2004] Y.-H. Seo and D.-W. Kim. FPGA design of real-time watermarking processor for 2DDWT-based video compression. IEICE Trans. Fundamentals, vol. E87-A, no. 9, pages 1297–1304, 2004. 4
    [Skodras 2001] A. Skodras, C. Christopoulos and T. Ebrahimi. The JPEG 2000 still image compression standard. IEEE Signal Processing Magazine, vol. 18, no. 5, pages 36–58, Sept. 2001. 100
    [Sohn 2003] S.-M. Sohn, S.-H. Kim, S.-H. Lee, K.-J. Lee and S. Kim. A CMOS image sensor (CIS) architecture with low power motion detection for portable security camera applications. IEEE Trans. on Consumer Electronics, vol. 49, pages 1227–1233, November 2003. 4
    [Solachidis 2001] V. Solachidis and L. Pitas. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. on Image Processing, vol. 10, pages 1741–1753, Nov 2001. 1
    [Suehiro 1986] N. Suehiro and M. Hatori. Fast algorithms for the DFT and other sinusoidal transforms. IEEE Trans. Acoust. Speech Signal Process., vol. 34, no. 3, pages 642–664, 1986. 58
    [Suhail 2003] M. A. Suhail and M. S.Obaidat. Digital watermarking-based DCT and JPEG model. IEEE Trans. on Instrumentation and Measurement, vol. 52, no. 5, pages 1640–1647, Oct. 2003. 1
    [Sun 2004] Shuifa Sun, Peiliang Qiu, Yanlong Wang and LuFeng Yao. Blind watermarking algorithm based on general Gaussian model. In 7th International Conference on Signal Processing, volume 3, pages 2302–2305, 2004. 2
    [Sun 2007] C.-C Sun, S.-J. Ruan, B. Heyne and J. Goetze. Low-power and high-quality Cordic-based Loeffler DCT for signal processing. IET Circuits, Devices and Systems, vol. 1, no. 6, pages 453–461, Dec 2007. 58
    [Tang 2003] C.-W. Tang and H.-M. Hang. A feature-based robust digital image watermarking scheme. IEEE Trans. on Signal Processing, vol. 51, pages 950–959, 2003. 2
    [Wallace 1992] G. K.Wallace. The JPEG still picture compression standard. IEEE Trans. on Consumer Electronics, vol. 38, pages xviii–xxxiv, Feb. 1992. 75
    [Wang 2006] Yulin Wang and A. Pearmain. Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans. on Image Processing, vol. 15, no. 6, pages 1536–1543, June 2006. 2
    [Wong 2001] P. W. Wong and N. Memon. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. on Image Processing, vol. 10, no. 10, pages 1593–1601, Oct. 2001. 2
    [Wu 2000] C.-F.Wu andW.-S. Hsieh. Digital watermarking using zerotree of DCT. IEEE International Conference on Consumer Electronics, vol. 46, pages 87–94, February
    [Yu 2007] Li Yu and Fen Chen. A Novel Watermark Algorithm for Blind Extraction. In International Conference on Computational Intelligence and Security Workshops, pages 664–667, Dec. 2007. 2
    [Zixiang Xiong 1999] adn K. Ramchandran Zixiang Xiong, M. T. Orchard and Ya-Qin Zhang. A comparative study of DCT- and wavelet-based image coding. IEEE Trans. on Circuits and Systems for Video Technology, vol. 9, no. 5, pages 692–695, Aug. 1999. 94

    QR CODE