期刊文献+

视频水印技术综述 被引量:23

Survey of video watermarking
下载PDF
导出
摘要 介绍了视频水印技术的原理和主要应用领域,分析了视频水印技术的特点和面临的挑 战,阐述了视频水印的模型及算法分类,探讨了视频水印的发展趋势。 The basic theories and main application fields of video watermarking were described,then the fundamental principles and specific challenges of video watermarking were analyzed,and its models and classification of algorithms were expatiated on. Finally the possible directions for further research were pointed out.
出处 《计算机应用》 CSCD 北大核心 2005年第4期850-852,共3页 journal of Computer Applications
关键词 数字水印 视频水印 信息隐藏 版权保护 digital watermarking video watermarking information hiding copyright protection
  • 相关文献

参考文献11

  • 1王志雄,王慧琴,李人厚.数字水印应用中的攻击和对策综述[J].通信学报,2002,23(11):74-79. 被引量:19
  • 2COX I,MILLER M,BLOOM J.Digital Watermarking[M].Los Altos,CA:Morgan Kaufmann Publishers,2001.
  • 3COX I,MILLER J.The first 50 years of electronic watermarking[J].EURASIP Journal of Applied Signal Processing,2002,2(2002):126-132.
  • 4EGGERS JJ,GIORD B.Blind watermarking applied to image authentication[A].Proceeding of ICASSP'01[C].Salt Lake City,Utah,USA:IEEE Computer press,2001.1-4.
  • 5VOYATZIS G,PITAS I.The use of watermarks in the protection of digital multimedia products[J].Proceedings of IEEE,1999,87(7):1197-1207.
  • 6GWENAEL DOERR,JEAN-LUC DUGELAY.A guide tour of video watermarking[J].Signal Processing:Image Communication,2003,18:263-282.
  • 7HARTUNG F,GIROD B.Watermarking of uncompressed and compressed video[J].Signal Processing ,1998 ,66(3):283-301.
  • 8LANGELAAR GC,LAGENDIJK RL,BIEMOND J.Real-time labe-ling methods for MPEG compressed video[A].Proceedings of the Eighteenth Symposium on Information Theory in the Benelux[C].1997.25-32.
  • 9LANGELAAR GC,LAGENDIJK RL,BIEMOND J.Watermark removal based on nonlinear filtering[A].ASCI'98 Conference[C].1998.9-11.
  • 10NTALIANIS KS,DOULAMIS ND,DOULAMIS AD,et al.Automatic stereoscopic video object-based watermarking using qualified significant wavelet trees[A].IEEE 2002 International Conference on Image Processing[C].2002,(18):188-189.

二级参考文献19

  • 1[1]HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proceedings of IEEE, 1999,87(7):1079-1107.
  • 2[2]VOYATZIS G, PITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999,87(7):1197-1207.
  • 3[3]BONCELET X X C, ARCE G. A multiresolution watermark for digital images[A]. Proc IEEE Int Conf Image Processing[C]. Santa Barbara, CA: Oct 1997.1097-1100.
  • 4[4]BARTOLINI M B F,CAPPELLINI V, PIVA A. A DCT-domain system for robust image watermarking[A].Signal Processing[C]. 1998.1202-1206.
  • 5[5]TAO,DICKINSON B. Adaptive watermarking in the DCT domain[A]. Proc Int Cong Image Processing (ICIP)[C]. Lausanne, Switzerland: Sept 1996.540-543.
  • 6[6]COX I J, LINNARTZ J P. Some general methods for tampering with watermarks[J]. IEEE J Selct Areas Commun (Special Issue on Copyright and Privacy Protection), 1998,16(5) :587-593.
  • 7[7]NIKOLAIDIS A,TSEKERIDOU S. A survey on watermarking application scenarios and related attacks[A]. Signal Processing[C]. 2001.991-995.
  • 8[8]STONE H S. Analyis of Attacks on Image Watermarks with Randomized Coefficients[M]. NJ: NEC RES Inst Princeton, 1996 .
  • 9[9]HARTUNG F. Difital Watermarking and Fingerprinting of Uncompressed and Compressed Video[D]. Erlangen, Germany: Telecommun Lab, Univ Erlangen-Nuremberg, 1999.
  • 10[10]KUGN M. StirMark[EB/DL]. http://www.cl.cam.ac.uk/~mgk25/stirmark/,1997-11.

共引文献18

同被引文献126

引证文献23

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部