期刊文献+

基于Prewitt算子的视频监控伪虚警鉴别方法 被引量:1

IDENTIFICATION METHOD FOR PSEUDO-FALSE ALARM IN VIDEO SURVEILLANCE BASED ON PREWITT OPERATOR
下载PDF
导出
摘要 在广播电视监视中应用的水印技术,由于在设计水印算法时多考虑了鲁棒性,而忽视了攻击者也在试图扰乱广播电视监视设备的正常工作(如伪造攻击),使其系统鉴别出虚假结果。这必将引发广播电视台与合法广告客户之间的重大纠纷。针对这种纠纷,提出了一种基于Prewitt算子的视频监控伪虚警鉴别方法。通过MATLAB的仿真实验,结果表明该方法具有很强的有效性和准确性。 Watermarking technology applied in radio and television surveillance is considered the robustness a little bit more when designing its algorithm but overlooked the attackers' attempts in trying to disrupt the regular operation of surveillance equipment of radio and television(such as forgery attack),so that there are the false results to be identified by the system.This will inevitably lead to significant disputes between the radio and television companies and the legitimate advertisers.In view of such disputes,we propose a prewitt operator-based video surveillance identification method for pseudo-false alarm.Through MATLAB simulation experiment,the results show that this method has a strong validity and accuracy.
出处 《计算机应用与软件》 CSCD 2011年第5期239-242,共4页 Computer Applications and Software
关键词 PREWITT算子 视频监控 伪虚警 Prewitt operator Video surveillance Pseudo-false alarm
  • 相关文献

参考文献5

二级参考文献46

  • 1张华熊,孙水发,仇佩亮.DCT域图像水印方案的可靠性分析[J].计算机辅助设计与图形学学报,2004,16(9):1231-1234. 被引量:6
  • 2胡睿,徐正光.一种基于分块DCT变换和水印置乱的嵌入算法[J].微计算机信息,2005,21(06Z):29-31. 被引量:24
  • 3李雷达,郭宝龙,刘雅宁.基于伪Zernike矩的抗几何攻击图像水印[J].光电子.激光,2007,18(2):231-235. 被引量:21
  • 4和红杰,陈帆.自嵌入水印算法的安全性分析[J].电子学报,2007,35(3):557-562. 被引量:9
  • 5GEERT D, TON K, JAAP H, et al. VIVA project: digital watermarking for broadcast monitoring[A]. IEEE/nternational Conference on/mage Processing, IEEE Signal Processing Society[C]. Kobe, Japan, 1999. 202-205.
  • 6TON K, GEERT D, JAAP H, MAURICE M. A video watermarking system for broadcast monitoring[A]. Proceedings of the SPIE[C]. IS and I; SPIE, San Jose, CA, USA, 1999. 103-112.
  • 7SU K, KUNDUR D, HATZINAKOS D. Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance[J]. IEEE Transactions on Multimedia, 2005, 7(1): 52-66.
  • 8HARTUNG E GIROD B. Digital watermarking of raw and compressed video[A]. Proceeding of SPIE: Digital Compression Technologies and Systems for Video Communication[C]. SPIE - Int Soc for Opt Engineering, Beningham, WA USA, 1996. 205-213.
  • 9COSKUN B, SANKUR B, MEMON N. Spatio-temporal transform based video hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6): 1190-1208.
  • 10LU Z M, GE Q M, NIU X M. Robust adaptive video watermarking in the spatial domain[A]. The 5th International Symposium on Test and Measurement (ISTM'2003)[C]. Shenzhen, China, 2003.1875-1880.

共引文献23

同被引文献14

  • 1徐巧玉,王恒迪,车仁生.立体视觉测量系统中三维拼接技术的研究[J].光电子.激光,2009,20(10):1332-1336. 被引量:7
  • 2张震,马驷良,张忠波,刘辉,宫跃欣,孙秋成.一种改进的基于Canny算子的图像边缘提取算法[J].吉林大学学报(理学版),2007,45(2):244-248. 被引量:53
  • 3Lourakis M I A, Halkidis S T, Orphanoudakis S C. Matching disparate views of planar surfaces using projective invariants. Image and Vision Vomputing[J]. 2000, 18(,q) :673-683.
  • 4Akinlar C, Topal C. EDLines: A real-time line segment detec- tor with a false detection control [J]. Pattern Recognition Let ters. 2011, 32(13): 1633-1642.
  • 5Canny J. A eomputationM approach to edge detection [J]. IEEE Transactions on Pattern Analysis and Machine Intelli- gence. 1986, 8(6):679-698.
  • 6Zhang Y, Rochett P I. The Bayesian operating point of the canny edge detector [J]. IEEE Transaction on Image Process- ing. 2006,15(11):3409-3416.
  • 7Health A. Sarkar S. Sanocki T. Comparison of edge detectors: A methodology and Initial study, computer vision and Image Understanding[J]. 1998, 69(1): 38-54.
  • 8Roberts I. G. Machine perception of three-dimensional solids[J].Optieal and Eleclro-Optical Information Processing, 1965,10(3) :159-197.
  • 9Bao P, Zhang I., Wu X I.. Canny edge detection enhancement by scale muhiplication[J]. IEEE Transactions on Pattern A- nalysis and Machine Intelligence, 2005,27(9): 1485-1490.
  • 10Lee Y S, Koo H S, Jeong C S. A straight line detection using principal component analysis. Pattern Recognition Letters [J].2006, 27(14):1744-1754.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部