期刊文献+

基于语义内容的双重认证视频水印方案 被引量:2

A Semantic-content-based Twofold Authentication Watermarking Scheme for MPEG Video
下载PDF
导出
摘要 首先阐述了视频认证水印方案设计需要考虑的基本问题 .随后 ,在基于图像内容的边缘认证水印技术的基础上 ,进一步根据MPEG视频压缩原理 ,提出了对运动对象的局部认证概念 ;阐述了一种基于图像组语义内容 (边缘和运动对象 )的监视视频录像的双重认证方案 .实验结果表明 ,该方案对于噪声干扰、滤波以及MPEG压缩具有良好的鲁棒性 ,但同时对于视频内容的恶意篡改不失敏感性 ,完全符合语义认证的要求 .另外 ,除能检测出改动的图像组的位置 ,该方案还能够在一定程度上恢复改动前的基本视频内容 . Basic issues on the design of watermarking for authentication are discussed, and a “local authentication” concept based on MPEG motion estimation is proposed. Then, a new twofold authentication scheme based on semantic content is illustrated. Experimental results show that the method is robust to small noise and MPEG recompression, and can detect malicious video semantic content tamper such as face replacing that may be accepted by a common global authentication way. In addition, it can approximately recover the original visual information in the corrupted area to some extent.
出处 《信息与控制》 CSCD 北大核心 2004年第5期590-596,共7页 Information and Control
基金 国家自然科学基金资助项目 ( 60 3 740 66) 江苏省自然科学基金资助项目 (BK2 0 0 2 10 1)
关键词 内容认证码 特征提取 自嵌入 自恢复 content authentication code(CAC) feature extraction self-embedding self recovery
  • 相关文献

参考文献6

  • 1[1]Lin C Y, Chang S F. Issues and solutions for authenticating MPEG video [ A ]. Proceedings of the SPIE-The International Society for Optical Engineering [C]. San Jose, CA:1999, vol. 3657.54 ~ 57.
  • 2[3]Yin P, Yu H H. Classification of video tampering methods and countermeasures using digital watermarking [ A ]. Proceedings of SPIE-The Intemational Society for Optical Engineering [ C ]. San Jose, CA:2001, vlo. 4518. 239~246.
  • 3[4]Queluz M P. Authentication of digital images and video: generic models and a new contribution [ J]. Signal Processing: Image Communication, 2001,16 ( 5 ): 461 ~ 475.
  • 4[5]Otsu N. A threshold selection method from gray-level histogram [J]. IEEE Transactions on Systems, Man and Cybernetics, 1979,SMC -9(1) :62 ~66.
  • 5朱仲杰,蒋刚毅,郁梅,吴训威.基于运动矢量的视频图象数字水印算法[J].电路与系统学报,2002,7(3):58-61. 被引量:8
  • 6[7]Holliman M, Memon N. Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes [ J ]. IEEE Transactions on Image Processing, 2000,9(3 ) :432 ~441.

二级参考文献2

共引文献7

同被引文献27

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部