期刊文献+

一种基于视频的无损信息隐藏方法 被引量:3

A Lossless Information Hiding Method Based on Video
下载PDF
导出
摘要 描述了一种基于MPEG-Ⅱ彩色视频中的无损信息隐藏方法,该方法在Alattar算法的基础上,使宿主矢量类型的判别由四个不等式,减少到两个不等式,降低了算法的时间复杂度.数据嵌入过程中采用简单数据链路SDL成帧.在局域网上进行了隐秘传输模拟实验,从嵌入信息的视频中正确提取出所嵌入汉字或二值指纹图像后,原宿主视频可无损恢复.该方法较适用于视频中的隐秘传输及产权保护等领域. A lossless information hiding method based on MPEG-2 color video is proposed in this paper. The method is based on Alattar's algorithm and it reduced type discriminant conditions from Alattar's 4 inequations to 2 inequations, so it reduced time complexity. A simple data link frame is used during data hiding processing and covert communication experiments are simulated in local networks by using the algorithm. Host video information can be restored losslessly after embedded Chinese characters or fingerprinting images are correctly extracted from the video which embedded information. The method can be applied to covert communication or copyright protection of video product.
出处 《中国科学院研究生院学报》 CAS CSCD 2006年第2期165-173,共9页 Journal of the Graduate School of the Chinese Academy of Sciences
关键词 无损 隐秘传输 视频 指纹 简单数据链路 lossless, covert communication, video, fingerprinting, simple data link
  • 相关文献

参考文献2

二级参考文献17

  • 1[1]F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding--A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 2[2]D Kirovski,H S Malvar.Spread-spectrum watermarking of audio signals[J].IEEE Transaction on Signal Processing,2003,51(4):1020-1033.
  • 3[3]J A Bloom,I J Cox,et al.Copy protection for DVD video[J].Proceedings of the IEEE,July 1999,87(7):1267-1276.
  • 4[5]Gang Pan,Zhaohui Wu,Yunhe Pan.A data hiding method for few-color images[A].Acoustics,Speech,and Signal Processing,Proceedings[C].Orlando,Florida:IEEE,2002,4.IV-3469-IV-3472.
  • 5[6]J Chou,K Ramchandran,A Ortega.High capacity audio data hiding for noisy channels[A].Information Technology:Coding and Computing[C].Las Vegas,Nevada:IEEE,2001.108-112.
  • 6[8]R G van Schyndel,A Z Osborne.A digital watermark[A].IEEE International Conferenca on Image Processing (Vol.2)[C].Austin,TX USA:IEEE,Nov 1994.86-90.
  • 7[9]Min Wu,E Tang,B Lin.Data Hiding in digital binary image[A].Multimedia and Expo,2000[C].New York:IEEE,2000,1.393-396.
  • 8[10]Yu-Chee Tseng,Yu-Yuan Chen,Hsiang-Kuang Pan.A secure data hiding scheme for binary images[J].IEEE Transactions on Communications,Aug 2002,50(8):1227-1231.
  • 9Hyvaerinen, A and Oja. E.. Independent Component Analysis: Algorithms and Applications[J]. Neural Networks, 2000,13 (4 - 5) : 411 - 430.
  • 10Hyvaerinen and Oja. E.. A Fast Fixed-Point Algorithm for Independent Component Analysis[J ]. Neural Computation, 1997,9(7) : 1483 - 1492.

共引文献27

同被引文献27

  • 1郭志川,程义民,王以孝,谢于明.一种无损的隐秘传输方法与仿真[J].系统仿真学报,2006,18(6):1638-1642. 被引量:7
  • 2BARN1 M, BARTOUN F, CHECCACCI N. Watermarking of MPEG-4 video objects [ J]. IEEE Transactions on Multimedia, 2005, 7(1): 23-32.
  • 3LANGELAAR G C, LAGENDIJK R L, BIEMOND J. Real time la- beling of MPEG-2 compressed video[ J]. Journal of Visual Commu- nication and Image Representation, 1998, 9(4): 256-270.
  • 4SHANG Y. A new invertible data hiding in compressed videos or im- ages[ C]//2007 International Conference on Natural Computation. Washington, DC: IEEE, 2007:576-580.
  • 5叶登攀 戴跃伟 王执锋.用于压缩视频/图像的无损信息隐藏方法.通信学报,2007,28(11):64-69.
  • 6ALATI'AR A M. Reversible watermark using the difference expan- sion of a generalized integer transform [ J]. IEEE Transactions on Image Processing. 2004, 13(8) : 1147 - 1156.
  • 7DU R, FRIDRICH J. Lossless authentication of MPEG-2 video [ C]//Proceedings 2002 International Conference on Image Process- ing. New York: IEEE, 2002:893-896.
  • 8FALLAHPOUR M, MEGIAS D. Reversible data hiding based on H. 264/AVC intra prediction[ C]// Digital Watermarking, LNCS 5450. Berlin: Springer, 2009:52-60.
  • 9XUAN G R, ZHU J, CHEN J. Distortion]ess data hiding on integer wavelet transform[ J]. Electronics Letters, 2002, 38(25) : 1646 - 1648.
  • 10XUAN G R, SHI Y Q, NI Z, et al. Reversible data hiding for JPEG images based on histogram pairs[ C]// International Conference on Image Analysis and Recognition. Berlin: Springer, 2007:715 - 727.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部