Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 利用資料隱藏技術的數位內容授權服務之研究
Digital Content Authorization with Invisible Watermarking
作者 林羽真
Lin, Yu Chen
貢獻者 郁方
Yu, Fang
林羽真
Lin, Yu Chen
關鍵詞 浮水印
watermarking
日期 2015
上傳時間 3-Aug-2015 13:20:39 (UTC+8)
摘要 隨著網際網路發展,眾多的數位內容在網際網路上散播。因此,數位內容以及影像的安全性逐漸變成一項重要的議題。由於數位內容的特性極容易經由網際網路傳播與複製,故數位內容所有權人的權力將受到極大的威脅。然而就算市場上有許多保護資料安全性的產品,對一般的使用者來說那些商品還是都過於昂貴。
本研究著重於隱形浮水印技術於影片的檔案格式之中,利用的線上免費公開的隱形浮水印技術工具實作一項服務,提供眾多的一般使用者能於網頁上進行資料的加解密步驟,保護其所需要加解密的檔案。此外本研究也提供了主動式的驗證機制於數位內容中,有別於以往的被動式驗證。
With the digitalization of media, the improvement of video compression technique and the adaptation of the Internet, videos have become one of the most prominent mediums in the network age. However, due to its nature to be easily copied and distributed, creative workers easily become victims to the piracy. While corporations use proprietary digital rights management (DRM) to guarantee fair use of intellectual properties, individuals are seldom able to afford huge royalty.
In this work, we investigate invisible watermarking techniques, discuss their properties, and apply cryptography and steganography techniques to data hiding in digital contents. Specifically, we develop a new public online service of data hiding in digital contents with the aim of proving content owners the ability to claim digital ownership. The current technique used to embed messages in video satisfies integrity but cannot resist attacks/modifications on the video. Also, we proposed a generic active authentication framework via hiding programs in digital contents, giving the developer the possibility to design their own variant from passive authentication to active code execution.
參考文獻 1. Abbass, A. S., Soleit, E. A., & Ghoniemy, S. A. (2007). Blind video data hiding using integer wavelet transforms. Ubiquit Comput Commun J, 2(1).
2. Bhaumik, A. K., Choi, M., Robles, R. J., & Balitanas, M. O. (2009). Data hiding in video. International Journal of Database Theory and Application, 2(2), 9-16.
3. Chae, J. J., & Manjunath, B. S. (1999). Data hiding in video. In Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on(Vol. 1, pp. 311-315). IEEE.
4. Hefeeda, M., & Mokhtarian, K. (2010). Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 6(1), 6.
5. Ko, L. T. (2013). Design and Optimization for Digital Watermarking Applications(Doctoral dissertation).
6. Lee, C. W., & Tsai, W. H. (2010). A lossless data hiding method by histogram shifting based on an adaptive block division scheme. Pattern Recognition and Machine Vision, River Publishers, Aalborg, Denmark, 1-14.
7. Lei, B. Y., Feng, J., & Lo, K. T. (2010). Digital Watermarking Techniques for AVS Audio. INTECH Open Access Publisher.
8. Lin, C. C., & Shiu, P. F. (2010). High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing,1(3), 220-240.
9. Lin, E. T., & Delp, E. J. (1999, April). A review of data hiding in digital images. InPICS (pp. 274-278).
10. Lin, E. T., Eskicioglu, A. M., Lagendijk, R. L., & Delp, E. J. (2005). Advances in digital video content protection. Proceedings of the IEEE, 93(1), 171-183.
11. Lu, C. S., & Liao, H. Y. (2001). Multipurpose watermarking for image authentication and protection. Image Processing, IEEE Transactions on, 10(10), 1579-1592.
12. Memon, N., & Wong, P. W. (1998). Protecting digital media content.Communications of the ACM, 41(7), 35-43.
13. Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2014). A Novel Image Steganographic Approach for Hiding Text in Color Images Using HSI Color Model. Middle-East Journal of Scientific Research, 22(5), 647-654.
14. Mukherjee, D., Chae, J. J., & Mitra, S. K. (2000). A source and channel-coding framework for vector-based data hiding in video. Circuits and Systems for Video Technology, IEEE Transactions on, 10(4), 630-645.
15. Paruchuri, J. K., & Cheung, S. (2008, May). Joint optimization of data hiding and video compression. In Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on (pp. 3021-3024). IEEE
16. Quan, X., & Zhang, H. (2006, August). Data hiding in MPEG compressed audio using wet paper codes. In Pattern Recognition, 2006. ICPR 2006. 18th International Conference on (Vol. 4, pp. 727-730). IEEE.
17. Reddy, R., Prasad, M. V., & Rao, D. S. (2009). Robust digital watermarking of color images under noise attacks. International Journal of Recent Trends in Engineering, 1(1), 334-338.
18. Sullivan, K., Bi, Z., Madhow, U., Chandrasekaran, S., & Manjunath, B. S. (2004, October). Steganalysis of quantization index modulation data hiding. In Image Processing, 2004. ICIP`04. 2004 International Conference on (Vol. 2, pp. 1165-1168). IEEE.
19. Swathi, A., & Jilani, D. S. Video Steganography by LSB Substitution Using Different Polynomial Equations. International Journal Of Computational Engineering Research (ijceronline. com) Vol, 2.
20. Wu, M., & Liu, B. (2003). Data hiding in image and video. I. Fundamental issues and solutions. Image Processing, IEEE Transactions on, 12(6), 685-695.
21. Wu, M., & Liu, B. (2003). Multimedia data hiding. Springer Science & Business Media.
22. Wu, M., Yu, H., & Liu, B. (2003). Data hiding in image and video. II. Designs and applications. Image Processing, IEEE Transactions on, 12(6), 696-705.
23. OpenPuff 4.00
Available at: http://embeddedsw.net/OpenPuff_Steganography_Home.html
24. OpenStego
Available at: http://www.openstego.info/
25. Steganography Studio
Available at: http://stegstudio.sourceforge.net/index.html
26. SilentEye
Available at: http://www.silenteye.org/writeplugins.html?i3s3
27. 按鍵精靈9
Available at: http://tw.vrbrothers.com/qmacro/
28. Digital rights management (DRM)
Available at: http://en.wikipedia.org/wiki/Digital_rights_management
29. Roust
Buchanan, J. M. (2004). Creating a robust form of Steganography (Doctoral dissertation, WAKE FOREST UNIVERSITY).
30. Integrity
de Carvalho, D. F., Chies, R., Freire, A. P., Martimiano, L. A., & Goularte, R. (2008, September). Video steganography for confidential documents: integrity, privacy and version control. In Proceedings of the 26th annual ACM international conference on Design of communication (pp. 199-206). ACM.
31. Transparency
Kraetzer, C., Dittmann, J., & Lang, A. (2006, February). Transparency benchmarking on audio watermarks and steganography. In Electronic Imaging 2006 (pp. 60721L-60721L). International Society for Optics and Photonics.
32. Model view controller (MVC)
http://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller
33. multimedia intelligent authentication (MIA)
http://140.119.19.91:9000/MIA/#/
34. Adobe Photoshop
http://www.photoshop.com/products/photoshop
35. Angularjs
https://angularjs.org/
描述 碩士
國立政治大學
資訊管理研究所
102356039
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0102356039
資料類型 thesis
dc.contributor.advisor 郁方zh_TW
dc.contributor.advisor Yu, Fangen_US
dc.contributor.author (Authors) 林羽真zh_TW
dc.contributor.author (Authors) Lin, Yu Chenen_US
dc.creator (作者) 林羽真zh_TW
dc.creator (作者) Lin, Yu Chenen_US
dc.date (日期) 2015en_US
dc.date.accessioned 3-Aug-2015 13:20:39 (UTC+8)-
dc.date.available 3-Aug-2015 13:20:39 (UTC+8)-
dc.date.issued (上傳時間) 3-Aug-2015 13:20:39 (UTC+8)-
dc.identifier (Other Identifiers) G0102356039en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/77176-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理研究所zh_TW
dc.description (描述) 102356039zh_TW
dc.description.abstract (摘要) 隨著網際網路發展,眾多的數位內容在網際網路上散播。因此,數位內容以及影像的安全性逐漸變成一項重要的議題。由於數位內容的特性極容易經由網際網路傳播與複製,故數位內容所有權人的權力將受到極大的威脅。然而就算市場上有許多保護資料安全性的產品,對一般的使用者來說那些商品還是都過於昂貴。
本研究著重於隱形浮水印技術於影片的檔案格式之中,利用的線上免費公開的隱形浮水印技術工具實作一項服務,提供眾多的一般使用者能於網頁上進行資料的加解密步驟,保護其所需要加解密的檔案。此外本研究也提供了主動式的驗證機制於數位內容中,有別於以往的被動式驗證。
zh_TW
dc.description.abstract (摘要) With the digitalization of media, the improvement of video compression technique and the adaptation of the Internet, videos have become one of the most prominent mediums in the network age. However, due to its nature to be easily copied and distributed, creative workers easily become victims to the piracy. While corporations use proprietary digital rights management (DRM) to guarantee fair use of intellectual properties, individuals are seldom able to afford huge royalty.
In this work, we investigate invisible watermarking techniques, discuss their properties, and apply cryptography and steganography techniques to data hiding in digital contents. Specifically, we develop a new public online service of data hiding in digital contents with the aim of proving content owners the ability to claim digital ownership. The current technique used to embed messages in video satisfies integrity but cannot resist attacks/modifications on the video. Also, we proposed a generic active authentication framework via hiding programs in digital contents, giving the developer the possibility to design their own variant from passive authentication to active code execution.
en_US
dc.description.tableofcontents ABSTRACT
1.INTRODUCTION 1
1.1Steganography 2
1.2The Property Of Steganography 3
1.2.1 Robustness 3
1.2.2 Transparency or Imperceptibility 3
1.2.3 Undetectability 3
1.2.4 Integrity 4
1.2.5 Capacity 4
1.2.6 Security 4
1.2.7 Data Payload 5
2.LITERATURE REVIEWS 6
2.1Image Steganography 7
2.2Streaming Steganography 8
2.3Steganography tools introduction 9
3.SYSTEM DESIGN 17
3.1System Structure 18
3.2System functionality 25
3.2.1 Html/Css 25
3.2.2 Javascript 26
4. SYSTEM IMPLEMENTATION AND RESULTS 27
4.1.Instruction of the website 29
4.2.Result 29
4.2.1.Robustness 33
4.2.2.Transparency and Undetectability 33
4.2.3.Integrity 34
4.2.4.Capacity 34
4.3. Future work 34
5.CONCLUSION 36
Reference 37
zh_TW
dc.format.extent 13993438 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0102356039en_US
dc.subject (關鍵詞) 浮水印zh_TW
dc.subject (關鍵詞) watermarkingen_US
dc.title (題名) 利用資料隱藏技術的數位內容授權服務之研究zh_TW
dc.title (題名) Digital Content Authorization with Invisible Watermarkingen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) 1. Abbass, A. S., Soleit, E. A., & Ghoniemy, S. A. (2007). Blind video data hiding using integer wavelet transforms. Ubiquit Comput Commun J, 2(1).
2. Bhaumik, A. K., Choi, M., Robles, R. J., & Balitanas, M. O. (2009). Data hiding in video. International Journal of Database Theory and Application, 2(2), 9-16.
3. Chae, J. J., & Manjunath, B. S. (1999). Data hiding in video. In Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on(Vol. 1, pp. 311-315). IEEE.
4. Hefeeda, M., & Mokhtarian, K. (2010). Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 6(1), 6.
5. Ko, L. T. (2013). Design and Optimization for Digital Watermarking Applications(Doctoral dissertation).
6. Lee, C. W., & Tsai, W. H. (2010). A lossless data hiding method by histogram shifting based on an adaptive block division scheme. Pattern Recognition and Machine Vision, River Publishers, Aalborg, Denmark, 1-14.
7. Lei, B. Y., Feng, J., & Lo, K. T. (2010). Digital Watermarking Techniques for AVS Audio. INTECH Open Access Publisher.
8. Lin, C. C., & Shiu, P. F. (2010). High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing,1(3), 220-240.
9. Lin, E. T., & Delp, E. J. (1999, April). A review of data hiding in digital images. InPICS (pp. 274-278).
10. Lin, E. T., Eskicioglu, A. M., Lagendijk, R. L., & Delp, E. J. (2005). Advances in digital video content protection. Proceedings of the IEEE, 93(1), 171-183.
11. Lu, C. S., & Liao, H. Y. (2001). Multipurpose watermarking for image authentication and protection. Image Processing, IEEE Transactions on, 10(10), 1579-1592.
12. Memon, N., & Wong, P. W. (1998). Protecting digital media content.Communications of the ACM, 41(7), 35-43.
13. Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2014). A Novel Image Steganographic Approach for Hiding Text in Color Images Using HSI Color Model. Middle-East Journal of Scientific Research, 22(5), 647-654.
14. Mukherjee, D., Chae, J. J., & Mitra, S. K. (2000). A source and channel-coding framework for vector-based data hiding in video. Circuits and Systems for Video Technology, IEEE Transactions on, 10(4), 630-645.
15. Paruchuri, J. K., & Cheung, S. (2008, May). Joint optimization of data hiding and video compression. In Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on (pp. 3021-3024). IEEE
16. Quan, X., & Zhang, H. (2006, August). Data hiding in MPEG compressed audio using wet paper codes. In Pattern Recognition, 2006. ICPR 2006. 18th International Conference on (Vol. 4, pp. 727-730). IEEE.
17. Reddy, R., Prasad, M. V., & Rao, D. S. (2009). Robust digital watermarking of color images under noise attacks. International Journal of Recent Trends in Engineering, 1(1), 334-338.
18. Sullivan, K., Bi, Z., Madhow, U., Chandrasekaran, S., & Manjunath, B. S. (2004, October). Steganalysis of quantization index modulation data hiding. In Image Processing, 2004. ICIP`04. 2004 International Conference on (Vol. 2, pp. 1165-1168). IEEE.
19. Swathi, A., & Jilani, D. S. Video Steganography by LSB Substitution Using Different Polynomial Equations. International Journal Of Computational Engineering Research (ijceronline. com) Vol, 2.
20. Wu, M., & Liu, B. (2003). Data hiding in image and video. I. Fundamental issues and solutions. Image Processing, IEEE Transactions on, 12(6), 685-695.
21. Wu, M., & Liu, B. (2003). Multimedia data hiding. Springer Science & Business Media.
22. Wu, M., Yu, H., & Liu, B. (2003). Data hiding in image and video. II. Designs and applications. Image Processing, IEEE Transactions on, 12(6), 696-705.
23. OpenPuff 4.00
Available at: http://embeddedsw.net/OpenPuff_Steganography_Home.html
24. OpenStego
Available at: http://www.openstego.info/
25. Steganography Studio
Available at: http://stegstudio.sourceforge.net/index.html
26. SilentEye
Available at: http://www.silenteye.org/writeplugins.html?i3s3
27. 按鍵精靈9
Available at: http://tw.vrbrothers.com/qmacro/
28. Digital rights management (DRM)
Available at: http://en.wikipedia.org/wiki/Digital_rights_management
29. Roust
Buchanan, J. M. (2004). Creating a robust form of Steganography (Doctoral dissertation, WAKE FOREST UNIVERSITY).
30. Integrity
de Carvalho, D. F., Chies, R., Freire, A. P., Martimiano, L. A., & Goularte, R. (2008, September). Video steganography for confidential documents: integrity, privacy and version control. In Proceedings of the 26th annual ACM international conference on Design of communication (pp. 199-206). ACM.
31. Transparency
Kraetzer, C., Dittmann, J., & Lang, A. (2006, February). Transparency benchmarking on audio watermarks and steganography. In Electronic Imaging 2006 (pp. 60721L-60721L). International Society for Optics and Photonics.
32. Model view controller (MVC)
http://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller
33. multimedia intelligent authentication (MIA)
http://140.119.19.91:9000/MIA/#/
34. Adobe Photoshop
http://www.photoshop.com/products/photoshop
35. Angularjs
https://angularjs.org/
zh_TW