期刊文献+

一种基于数字水印的可信视频

A Reliable Video Based on Digital Watermarking
下载PDF
导出
摘要 数字视频信号的非连续性和可编辑性很容易实现人为的对其的修改、剪接、合成、删除、覆盖等操作,不能成为真正的证据。文章论述了在拍摄时加入数字水印来保证数字视频信号的“证据连续性”。当可信性受到质疑,根据提取出来的水印信息来判断视频是否被篡改,和确定被篡改的位置。 Digital video signals is easy to be modified,cut ,synthesized,deleted,covered by artificial operation because of its non-continuity and its editing,which can't be regarded as the real evidence.This paper describes a method to put digital watermarks into evidence to guarantee the″evidence continuity″of digital video signals,when its credibility is queried,we can judge both whether video signals are distorted and the distorted position according to the watermark information.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第21期40-43,共4页 Computer Engineering and Applications
基金 国家信息化工作领导小组项目(编号:2001-研-041) 湖南省自然科学基金项目(项目号:03JJY3103)资助
关键词 数字化证据 数字水印 可信视频 digital evidence,digital watermarking,reliable video
  • 相关文献

参考文献12

  • 1王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:198
  • 2Tae-Yun Chung,Kang-Seo Park,Young-Nam Oh et al. Digital watermarking for copyright protection of MPEG2 compressed video[J].IEEE Transactions on Consumer Electronics, 1998;44(3) :895~901
  • 3Su K,Kundur D,Hatzinakos D.A content-dependent spatially localized video watermark for resistance to collusion and interpolation attacks[C].In:Proceedings of 2001 International Conference on Image Processing,Volume: 1,2001: 818~821
  • 4Arena S,Caramma M,Lancini R.Digital watermarking applied to MPEG-2 coded video sequences exploiting space and frequency masking[C].In:Proceedings of 2000 International Conference on Image Processing,Volume: 1,2000:438~441
  • 5Frank Hartung,Bernd Girod.Watermarking of uncompressed and compressed video[J].Signal Processing, 1998; 66 (3): 283~301
  • 6Ton Kalker,Geert Depovere,Jaap Haitsma et al.A video watermarking system for broadcast monitoring[J].Proceedings of the SPIE,1999;3657:103~112
  • 7Gerrit C Langelaar,Reginald L Lagendijk,Jan Biemond. Real-time labeling of MPEG-2 compressed video[J].J of Visual Comm and Image Representation, 1998; 9 (4): 256~270
  • 8I Cox,J Kilian,F Leighton et al.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997;6(12):1673~1687
  • 9V Darmstaedter,J F Delaigle,D Nicholson et al.A block based watermarking technique for MPEG2 signals:Optimization and validation on real digital TV distribution links[C]. In:Proc Euro Conf on Multimedia Application ,Services and Techniques, 1998:190~206
  • 10易开祥.[D].浙江大学,2002-06.

二级参考文献7

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.

共引文献197

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部