期刊文献+

适用于广播监视的安全视频水印方案 被引量:1

Secure video watermarking scheme for broadcast monitoring
下载PDF
导出
摘要 考虑到广播监视应用中对视频片段的认证问题,基于三维离散小波变换,提出一种新颖的顽健视频散列算法,并利用生成的散列值和水印标识形成待嵌入的水印信息,以实现对视频片段的认证。在此基础上利用扩频水印技术提出一种适用于广播监视的安全、顽健的视频水印算法。理论分析和实验结果表明,提出的算法具有很好的安全性和顽健性。 Considered the authentication of video clips applied in broadcast monitoring, a new robust hashing algorithm for video was proposed based on the 3D wavelet transform (3D DWT). The new proposed algorithm could realize the authentication of video clips by using the embedded watermark information created by the hash value and the watermark identifier. This new robust video watermark algorithm could also be applied in the security of broadcast monitoring. Based on the academic analysis and experimental results, the new proposed algorithm has good security and robust performance.
出处 《通信学报》 EI CSCD 北大核心 2009年第8期51-55,共5页 Journal on Communications
基金 河南省科技攻关项目(0624220058) 河南省教育厅科技攻关项目(2007520045)~~
关键词 数字水印 视频散列 三维离散小波变换 广播监视 digital watermarking video hashing 3D DWT broadcast monitoring
  • 相关文献

参考文献9

  • 1CoxIJ MillerML BloomJA.数字水印[M].北京:电子工业出版社,2003..
  • 2GEERT D, TON K, JAAP H, et al. VIVA project: digital watermarking for broadcast monitoring[A]. IEEE/nternational Conference on/mage Processing, IEEE Signal Processing Society[C]. Kobe, Japan, 1999. 202-205.
  • 3TON K, GEERT D, JAAP H, MAURICE M. A video watermarking system for broadcast monitoring[A]. Proceedings of the SPIE[C]. IS and I; SPIE, San Jose, CA, USA, 1999. 103-112.
  • 4SU K, KUNDUR D, HATZINAKOS D. Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance[J]. IEEE Transactions on Multimedia, 2005, 7(1): 52-66.
  • 5和红杰,陈帆.自嵌入水印算法的安全性分析[J].电子学报,2007,35(3):557-562. 被引量:9
  • 6HARTUNG E GIROD B. Digital watermarking of raw and compressed video[A]. Proceeding of SPIE: Digital Compression Technologies and Systems for Video Communication[C]. SPIE - Int Soc for Opt Engineering, Beningham, WA USA, 1996. 205-213.
  • 7COSKUN B, SANKUR B, MEMON N. Spatio-temporal transform based video hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6): 1190-1208.
  • 8LU Z M, GE Q M, NIU X M. Robust adaptive video watermarking in the spatial domain[A]. The 5th International Symposium on Test and Measurement (ISTM'2003)[C]. Shenzhen, China, 2003.1875-1880.
  • 9VOLOSHYNOVESKIY S, BAUMGARTNER N. A stochastic approach to content adaptive digital image watermarking[A]. International Workshop on Information Hiding[C]. Springer Verlag, Dresden, Germany, 1999.211-236.

二级参考文献8

  • 1和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 2B B Zhu,M D Swanson,A H Tewfik.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,21(2):40-49.
  • 3F Deguillaume,S oloshynovskiy,T Pun.Secure hybrid robust watermarking resistant against tampering and copy attack[J].Signal Processing,2003,83(10):2133-2170.
  • 4J Fridrich,M Goljan.Images with self-Correcting capabilities[C].IEEE Press,Kobe,Japan:ICIP'99,1999.25-28.
  • 5C W Wu.On the design of content-based multimedia authentication systems[J].IEEE Trans Multimedia,2002.4(9):385-393.
  • 6M Holliman.N Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Trans on Image Processing,2000.3(9):432-441.
  • 7Douglas R Stinson.Cryptography Theory and Practice[M].By CRC Press,1995.3.
  • 8张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49

共引文献38

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部