期刊文献+

大型视觉多媒体网络的坏数据高效检测方法 被引量:4

Bad Data Detection Method for Large High Visual Multimedia Network
下载PDF
导出
摘要 在大型视觉多媒网络中,大量的干扰噪点坏数据对多媒体网络的稳定运行造成威胁,对此提出一种基于线性叠加细节捕捉的大型视觉多媒体网络的坏数据高效检测方法,采用Canny边缘检测函数,得到多媒体网络的换数据图像噪点边缘分割的不变矩阈值,采用经验模式设定进行坏数据检测,使用特征向量的最近邻匹配法可以找出音视频数据的潜在的匹配对,采用标准的基于数学形态学的分割方法得到最小割标准,实现检测算法改进,仿真结果表明,该算法能有效提高对坏数据检测的性能,具有较强的抗干扰性能和鲁棒性. In the large visual multimedia network threat interference noise,a lot of bad data and stable operation of the multimedia network,resulting in multimedia audio and video signal errors in visual and the sense of hearing,the performance is not good.A bad data of large visual multimedia network of linear superposition detail capture efficient detection method is proposed based on edge detection function,using Canny,get the multimedia network data exchange noise edge invariant moment threshold image segmentation,using empirical mode setting for bad data detection,feature vectors using nearest neighbor matching method can identify audio and video data on the potential of matching,using the standard segmentation method based on mathematical morphology to get the minimum cut criteria,realization of improved detection algorithm,the simulation results show that,the algorithm can effectively improve the bad data detection performance,strong anti interference performance and robustness.
作者 张杰
出处 《微电子学与计算机》 CSCD 北大核心 2015年第5期143-146,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(61302124) 江苏理工学院校青年科研基金项目(KYY13027) 江苏理工学院教学改革项目(11610311415)
关键词 多媒体 计算机视觉 检测算法 multimedia computer vision detection algorithm
  • 相关文献

参考文献3

二级参考文献18

  • 1秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 2Lin Y R, Huang H Y, Hsu W H. An embedded watermark tech- nique in video for copyright protection [ C ]//Proceedings of the 18th Int. Conf. on Pattern Recognition. Piscataway, NJ: Institu- te of Electrical and Electronics Engineers Inc. 2006: 795-798. [DOI: 10. 1109/ICPR. 2006. 244].
  • 3Ahun O, Sharma G, Celik M, et al. A set theoretic framework for watermarking and its application to semifragile tamper detec- tion [ J ]. IEEE Transactions on Information, Forensics and Secu- rity, 2006, 1 ( 4 ) : 479492. [DOI: 10. 1109/TIFS. 2006. 885018 ].
  • 4De Roover C, De Vleeschouwer C, Lefebvre F, et al. Robust video hashing based on radial projections of key frames [ J ]. IEEE Transactions on Signal Processing, 2005, 53 (10) : 4020- 4037. [ DOI: 10. ll09/TSP. 2005. 855414].
  • 5Wang W H, Farid H. Exposing digital forgeries in color filter ar- ray interpolated images [ C ]//Proc. of MM&Sec' 07. New York : Association for Computing Machinery, 2007:715-728.
  • 6Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double MPEG compression [ C ]//Proceedings of the Mul- timedia and Security Workshop Geneva. Switzerland: ACM, 2006 : 37-47.
  • 7Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double quantization [ C ]//Proceedings of the 11 th ACM Multimedia and Security Workshop. Princeton : ACM, 2009 : 39- 48.
  • 8Zhang J, Su Y T. Detecting logo-removal forgery by inconsisten- cies of blur [ C ]//Proceedings of 2009 International Conference on Industrial Mechatronics and Automation. Singapore: IEEE Industrial Electronics Society, 2009: 32-36. [ DOI: 10. 1109/ ICIMA. 2009.5156553 ].
  • 9Kobayashi M, Okabe T, Sato Y. Detecting forgery from static- scene video based on inconsistency in noise level functions [ J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4) :883-892. [ DOI: 10. 1109/TIFS. 2010. 2074194].
  • 10Lee J W, Lee M J, Oh T W, et al. Screenshot identification using combing artifact from interlaced video[ C ]//Proceedings of the 12th ACM Workshop on Multimedia and Security. Princeton: ACM Multimedia and Security Workshop, 2010:653-660.

共引文献24

同被引文献40

引证文献4

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部