期刊文献+

一种有效识别正版视频的TDIA算法

An Efficient Genuine-Video Identification Algorithm:TDIA
下载PDF
导出
摘要 结合视频压缩标准、脆弱数字水印及视频通信技术,文中提出一种有效识别正版视频的TDIA算法.它包括嵌入算法和识别算法两部分.为消除通信干扰对水印的影响,将迭代方法引入识别算法.基于盗版操作与通信干扰的本质不同,研究讨论了迭代方法的性能.最后,基于迭代结果,借助Chernoff Bound理论,分析了TDIA算法的识别误差.对于码流BER(Bit Error Rate)10-3、视频I帧总数n360的Mpeg2编码视频,该算法识别误差小于10-18. An efficient genuine-video identification algorithm named as TDIA is proposed, which based on integration of video compression standards, fragile watermarking and video communication technology. It includes two parts, embedding algorithm and identification algorithm. Iterative method is introduced on the identification algorithms to eliminate the communications interference for the impact of watermarking. The performance of the iterative method is investigated according to the difference of nature between piracy operation and communications interference. Finally, the identification errors of TDIA algorithm are analyzed based on the results of iteration and by dint of the theory of Chernoff Bound. The total identification error of the algorithm is less than 10^-18 when BEN (Bit Error Rate) of encoded video stream is not more than 10^-3 and the total number of I-frames of Mpeg2 encoding video is more than 360.
出处 《计算机学报》 EI CSCD 北大核心 2010年第1期175-183,共9页 Chinese Journal of Computers
关键词 脆弱数字水印 正版视频 盗版视频 录制盗版 Mpeg2编解码器 fragile watermarking genuine-video pirated-video camcorder piracy Mpeg2 codec
  • 相关文献

参考文献25

  • 1Eskicioglu A M, Town J, Delp E J. Security of digital entertainment content from creation to consumption. Signal Processing: Image Communication, 2003, 18(4): 237-262.
  • 2GY/Z175-2001.数字电视广播条件接收系统规范.[S].国家广播电影电视总局,2001..
  • 3Eskicioglu A M, Delp E J. An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication, 2001, 16(7): 681-699.
  • 4Maes M, Kalker T, Linnartz J P M G et al. Digital watermarking for DVD video copy protection. IEEE Signal Processing Magazine, 2000, 17(5): 47- 57.
  • 5Andreaux J P, Durand A, Furon T et al. Copy protection system for digital home networks. IEEE Signal Processing Magazine, 2004, 21(2): 100- 108.
  • 6Radhakrishnan R, Memon N. Multimedia analysis for content identification//Multimedia Content Analysis, Signals and Communication Technology. Springer, 2009: 275-295.
  • 7Nikolaidis N, Pitas I. Image and video fingerprinting for digital rights management of multimedia data//Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems. Japan, 2006 : 801-807.
  • 8Trappe W, Wu M, Wang Z, Ray Liu K J. Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing, 2003, 51(4) : 1069 -1087.
  • 9Wu M, Trappe W, Wang Z, Ray Liu K J. Collusion resistant fingerprinting for multimedia. IEEE Signal Processing Magazine, 2004, 21(2):15 -27.
  • 10周国瑞,孙世新,王文江.抗共谋数字指纹实现问题研究[J].计算机科学,2010,37(1):28-33. 被引量:1

二级参考文献49

  • 1Wagner N R. Fingerprinting [C]//Proc. IEEE Symp. Security and Privacy. 1983 : 18-22.
  • 2Blakley GR, Meadows C, PurdyGB. Fingerprinting long forgi - ving Messages[C]//LNCS. 1986,218 : 180-189.
  • 3Boneh D, Shaw J. Collusion secure fingerprinting for digital data [J]. IEEE Trans. on Information Theory, 1998, 44 ( 5 ) : 1897- 1905.
  • 4Staddon J, Stinson D,Wei R. Combinatorial properties of frameproof and traceability codes[J]. IEEE Trans. Inform Theory, 2001,47(3) : 1042-1049.
  • 5Zhao H, Wu M, Wang Z, et al. Forensic analysis oi nonlinear collusion attacks for multimedia fingerprinting[J]. IEEE Trans. on Image Processing, 2005,14 (5) : 646-661.
  • 6Wu M, Liu B. Data hiding in image and video : Part I Funda mental issues and solutions[J]. IEEE Trans. Image Processing, 2003,12(6) :685-695.
  • 7He S,Wu M. Joint coding and embedding techniques for multimedia fingerprinting[J]. IEEE Trans. on Info. Forensics and Security,2006,1(2):231-247.
  • 8Wang ZJ,Wu M,Trappe W, et al. Group-oriented fingerprinting for multimedia forensics[J]. EURASIP J. Appl. Signal Process, 2004,14:2153 -2173.
  • 9Schaathum H G, Fernandez M. Boneh - Shaw fingerprinting and soft decision decoding[OL].http://www, computing, surrey. ac. uk/personal/st/H. Schaathun/research/public/Reports/2005 289. pdf.
  • 10Schaathum H G. On watermarking/fingerprinting for copyright protection[OL].http://www, nik. no/2005/Schaathun, pdf.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部