期刊文献+

抵抗帧丢失攻击的视频水印技术 被引量:3

A Video Watermarking Technology Which Can Protect Video from Frame Dropping Attack
原文传递
导出
摘要 文章提出了一个基于盲对称检测的视频水印时间同步模型,在嵌入模型中使用有限状态机来生成嵌入密钥,在检测模型中用队列存放预测的多个连续帧所使用的密钥,从而实现视频水印检测的时间同步。实验结果表明,此方法可以有效地对抗帧丢失等时间同步攻击。 In this paper, a temporal synchronization model for blind symmetrical video watermark detection is presented. In the embedding models, we use the finite state machine to construct the embedding watermark key. In the watermark detector, we use a queue to perform a search to establish and maintain temporal synchronization. Experimental results support that the method can protect video from frame dropping attack.
出处 《信息安全与通信保密》 2006年第11期117-119,共3页 Information Security and Communications Privacy
关键词 视频水印 帧攻击 时间同步 video watermark frame dropping temporal synchronization
  • 相关文献

参考文献4

  • 1[1]Eskicioglu A M,Delp E J.An overview of multimedia content protection in consumer electronics devices.Signal Processin Image Communication,Apr.2001,16(7):681-699.
  • 2[2]Petitcolas F A P,Anderson R J,Kuhn M G.Information Hiding-A Survey.Proc.IEEE,1999,87(7):1062-1078.
  • 3[3]Lancini R,Mapelli F,Tubaro S.A robust video watermarking technique in the spatial domain.Proceedings of the IEEE Region-8 International Symposium on Video/Image Processing and Multimedia Communications,Zadar,Croatia,2002:251-256.
  • 4[4]Lin E T,Delp E J.Temporal synchronization in video watermarking.IEEE Transactions on Signal Processiong:Supplement on Secure Media,Oct.2004,52(10):3007-3022.

同被引文献26

  • 1庞娇阳,梅文博.MPEG-4码流中的数字水印[J].计算机工程与应用,2005,41(30):55-56. 被引量:4
  • 2[1]K.Su,D.Kundur,D.Hatzinakos,A Novel Approach to Collusion-resistant Video Watermarking[J].in:Proceedings of SPIE 4675,Security and Watermarking of Multimedia Content Ⅳ,2002:491-502.
  • 3[2]H.Zhao,M.Wu,Z.Wang,et al.Non-linear Collusion Attacks on Independent Fingerprints for Multimedia[J].in Proc.IEEE Int.Conf.Acoust.,Speech,Signal Process,2003(5):664-667.
  • 4[3]D.Boneh and J.Shaw.Collusion-secure Fingerprinting for Digital Data.[J].IEEE Trans.Inf.Theory.1998,44(5):1897-1905.
  • 5[4]G.Doёrr and J.-L.Dugelay.A Guide Tour of Video Watermarking[J].Signal Processing,Image Communication,2003,18(4):263-282.
  • 6[5]Eugene T.Lin and Edward J.Delp.Temporal Synch Ronization in Video Watermarking[J].IEEE TRANSACTIONS ON SIGNAL PROCESSING,2004,52 (10).
  • 7[6]Gwenaёl Doёrr and Jean-Luc Dugelay.Security Pitfalls of Frameby-Frame Approaches to Video Watermarking[J].IEEE TRANSACTIONS ON SIGNAL PROCESSING,2004,52 (10):2955-2964.
  • 8[7]I.Cox and M.Miller.Preprocessing media to Facilitate Later Insertion of a Watermark[J].Proc.Int.Conf.Digital Signal Process,2002,(1):67-70.
  • 9[8]Chun-Shien Lu and Chao-Yung Hsu.Near-Optimal Watermark Estimation and Its Countermeasure:Anti-disclosure Watermark for Multiple Watermark Embedding[J].IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,2007,17(4):454-467.
  • 10[9]C.Voloshynovskiy,S.Pereira,A.Herrigel,et al.Generalized Watermarking Attack Based on Watermark Estimation and Perceptual Remodulation[J].Proc.SPIE-Security Watermarking Multimedia Contents Ⅱ,2000,3971:358-370.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部