期刊文献+

广播监视中的安全视频水印算法

Secure Video Watermark Algorithm in Broadcast Monitoring
下载PDF
导出
摘要 分析广播监视应用中对视频片段及水印的双重认证问题,基于三维离散小波变换,提出一种高安全性的鲁棒视频水印算法。该算法生成视频哈希值,并用私钥对版权信息和哈希值进行签名,由生成的签名和哈希值构建待嵌入的水印,以实现广播监视中对视频片段及水印的双重认证。理论分析和实验结果表明,该算法对于广播监视应用具有较好的安全性和鲁棒性。 This paper analyses double authentication of a video clip and a watermark in application of broadcast monitoring. For the problem of double authentication, a secure video watermark algorithm for broadcast monitoring is proposed based on the 3D Discrete Wavelet Transform(3D-DWT). A robust hash is computed from video clips, and video hash and copyright information are signatured by secret key. The short hash and the signature using the proposed algorithm are combined to create the watermark to be embedded, and they are used in the double authentication of video clips and the embedding watermark respectively. Analysis and experimental results show that the algorithm has good security and robustness for broadcast monitoring.
作者 刘丽 彭代渊
出处 《计算机工程》 CAS CSCD 北大核心 2010年第4期7-9,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60572142) 河南省科技攻关基金资助项目(0624220058) 河南省教育厅科技攻关基金资助项目(2007520045)
关键词 数字水印 广播监视 离散小波变换 视频签名 digital watermark broadcast monitoring Discrete Wavelet Transform(DWT) video signature
  • 相关文献

参考文献5

  • 1VIVA Home Page[Z]. (2008-10-10). http://www.intec.rug.ac.be/ ResearctdGroups/hfhsdesigrdviva/index.htm.
  • 2Kalker T, Depovere G, Haitsma J, et al. A Video Watermarking System for Broadcast Monitoring[C]//Proceedings of Conf. on Security and Watermarking of Multimedia Contents. San Jose, CA, USA: [s. n.], 1999: 103-112.
  • 3Su Karen, Kundur D, Hatzinakos D. Spatially Localized Image-dependent Watermarking for Statistical Invisibility and Collusion Resistance[J]. IEEE Transactions on Multimedia, 2005, 7(1): 52-66.
  • 4和红杰,陈帆.自嵌入水印算法的安全性分析[J].电子学报,2007,35(3):557-562. 被引量:9
  • 5Hartung F, Girod B. Digital Watermarking of Raw and Compressed Video[C]//Proc. of Conf. on Digital Compression Technologies and Systems for Video Communication. Berlin, Germany: [s. n.], 1996: 205 -213.

二级参考文献8

  • 1和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 2B B Zhu,M D Swanson,A H Tewfik.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,21(2):40-49.
  • 3F Deguillaume,S oloshynovskiy,T Pun.Secure hybrid robust watermarking resistant against tampering and copy attack[J].Signal Processing,2003,83(10):2133-2170.
  • 4J Fridrich,M Goljan.Images with self-Correcting capabilities[C].IEEE Press,Kobe,Japan:ICIP'99,1999.25-28.
  • 5C W Wu.On the design of content-based multimedia authentication systems[J].IEEE Trans Multimedia,2002.4(9):385-393.
  • 6M Holliman.N Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Trans on Image Processing,2000.3(9):432-441.
  • 7Douglas R Stinson.Cryptography Theory and Practice[M].By CRC Press,1995.3.
  • 8张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部