上海交通大学硕士学位论文基于量化调制的视频信息隐藏技术的研究姓名:叶筠申请学位级别:硕士专业:通信与信息系统指导教师:蒋兴浩;孙锬锋20080101IV(InformationHiding)DataHiding,1MPEG-2MPEG-2DCDC2ICAVMPEG-2ICAVIRESEARCHONVIDEOINFORMATIONHIDINGBASEDONQUANTIZATIONMODULATIONABSTRACTInformationhiding,alsoknownasdatahiding,isanimportantsubdisciplineinthefieldofInformationSecurity.Withthedevelopmentofnetworktechnology,multimediaindustryandelectroniccommerce,informationhidingtechnologyfindsitshotbedinmoderndigitalworld.Featuredbyhidinginformationwithoutaffectingitscarrier,informationhidingtechnologyiswarmlyembracedbyinformationsecurityapplicationssuchasdigitalrightmanagement.Deemedasaparadigmofthistechnology,digitalwatermarkingisdrawingincreasinglyintenseattentionduetoitscontributiontothedigitalmultimediaindustry.Amongdiverseblindwatermarkingtechnologies,quantizationmodulationdistinguishesitselfbyitsdesirableperformanceinwatermarkcapacity,noiseendurance,andfidelitymaintenance.Accompanyingtheseadvantagesisitsapparentvulnerabilitytogainattack,withatraditionalfixedquantizationstep.Tosolvethisproblem,somescholarsstudytherelationbetweenquantizationstepandsignalgain,andbreakanewpathforthistechnology’sdevelopment.Outofthecurrentrequestofnetworkvideocopyrightprotectionandcontentmanagement,thisthesisinvestigatesbasicpropertiesandextensiveapplicationsofinformationhidingtechnology,andpresentstwovideowatermarkingschemeswithquantizationmodulation,basedonexistingresearchresults.Utilizingmultiplesignalprocessingtechnologies,thesetwoschemesaretypicallyaimedattwokindsofapplications.Oneisthecompressiondomainwatermarkingschemeforreal-timevideostreamlabelingsuchasuserlabeling,andtheotherdealswithoriginaldataforVIIrobustapplicationslikevideoclassification.Bothofthemadoptadaptivequantizationsteptogetridofgainattack,improvethevideo’svisualquality,andhencebettermeettheperformancerequirementsbydifferentvideoserviceapplications.Keywords:informationhiding,videowatermarking,quantizationmodulation,gainattack,adaptivequantizationstep,MPEG-2compression,independentcomponentanalysis,ICAII2008117III20081172008117111.1(Cover)(StegoCover),[1][2-10][11-19]Chen20[21-23][24-25]Fernando[25]VCD,DVDVODVideoOnDemand2RIAA50MPAA25[2]Internet911MarcEnger[7](DRMDigitalRightManagement)[7-10][11-18][19]1.23DCTDiscreteCosineTransformDWTDiscreteWaveletTransformICAIndependentComponentAnanlysisMPEG-21MPEG-2MPEG-2DCDC2ICADWT1.3DCMPEG-2DCICA4ICA522.1(Cover)(StegoCover),()()[1](Cryptography)“”“”“”216ComputerForensicsteganography&steganalysis[3](Steganography)(DigitalWatermarking)[7,26-29]SecurityRobustness(Imperceptibility)(Capacity)(1)(2)(3)(4)[3,4,30,31]2.1.1(SecretMessage);(CoverMessage)(Key)(EmbeddingAlgorithm)()(CommunicationChannel)(Detector)[6]7(1)(2)()/Kerckhoffs()2-11K2K2-1Fig.2-1Commonmodelofinformationhiding2.1.28HVSHASShannon[7,8,32](1)(2);(3)(4)92.1.3[4,7,8,33]2-2Fig.2-2Categoryofinformationhidingtechnology1((Steganography)CoveredWriting(LinguisticSteganography)(TechnologicSteganography)“”10SemagramOpenCodeNullCipher[9]2(CovertChannel)Lampson(SubliminalChannel)Simmons4TESECB23(Anonymity)ChaumanonymousremailersGoldschlag,ReedSyversononionrouting:remailers11routersWebWeb41954MuzacEmilHembrookeIdentificationofsoundandlikesignals1KHzHembrooke[5]A.Z.TirkeltElectronicWatermarkDigitalWatermark/1/12JPEG2000MPEG-4H.2645(Fingerprinting)(Traitortracing)6Internet13911MarcEnger[31,34]2.22.2.1CoxCommunicationwithSideInformation[5][8]1Legendre[35]DCT14(Matlab)DSP()VoyatzisPitastoralautomorphisms[36]ArnoldFibonacciFibonacci-Q[37-39]Arnold[40]Arnold2()mMGoldLCCReed-SolomonBent15[32]ChebyshevLogisticTentBernoulliChebyshev[41]InfiniteCollapsesJPEGChebyshev[42]DCTlogistic,DCT,[43][44]2.2.22.2.2.11Tirkel(LSBLeastSignificantBit)[45]BenderPatchwork16LSBTextureBlockCoding[46]Fridrich(OPAOptimalParityAssignment)[47]25685[48]22-3Fig.2-3MultilayerinformationhidingmodelDCTDWTDFTRadonfractal[6]1DCTDCTK-LJPEG,MPEGDCTDCT17DCTDCTCoxDCT1000DCT[49]DCTMatthewHollimanDCT[50]Chiou-TingHsuJa-LingWu[51]DCTDC()AC()[52]DCT2DFTDCTDFTDFTDFTRuanaidhDFTHayesDFTRSTRotationScalingTranslationRTSJPEG[53]SolachidisPitasDFTJPEG[54]RuanaidhPunFourier-MillinRST[55]3DWTDCTDFT18JPEG2000MPEG-4DWTDWT[56]TaoEskiciogluDWTLLLHHLHH[57]ROIRegionofInterestROIDWT[58]DWT[59]DWT[60]VidyasagarM.PotdarJPEGMPEGDCTJPEG2000DWT2.2.2.219][][][]['iWiiCiC∗+=α(2.1)|][|]*[*][][]['iCiWiiCiCα+=(2.2)C’[i]iC[i]α[i]W[i]iMoriya[61]ChenWornellDitheredModulation[62]q[i]==−+∗==∗=)1][(,2][][2/][][][)0][(,][][][]['iWifiqiqiqiCiqiWifiqiCiqiC(2.3)Chen[20][21-23][24,25]LSBFaisalAlturkiRussellMersereauDCT[63]HVSHumanVisualSystemHVS[6]1(CSFContrastSensitivityFunction)JNDJustNoticeableDifference2023[52]JND2.2.3BER:biterrorrateNC:normalizedcorrelationcoefficient≡≠==∑)'(,0)'(,1,)',(iiiiWWifWWifDNDWWBER(2.4)∑∑∑=22'')',(iiiiWWWWWWNC(2.5)WW’21AvcibasHarmsenFaridnLSBRQPRawQuickPairsDCT(BPCSBitPlaneComplexitySegmentation)[6,31]JosepVidalElisaSayrolCauchy[64]1983RandallC.ReiningerJerryD.GibsonDCTDC[65]JuanR.Hernndez[66]MauroBarniDFTWeibullNeyman-Pearson[67]AthanasiosNikolaidisIoannisPitasDCTDWT[68]ShelbyP