期刊文献+

基于运动矢量和模式选择的视频水印方案 被引量:1

Video watermark scheme based on motion vector and mode selection
下载PDF
导出
摘要 根据H.264编码的新标准,提出一种基于运动矢量和模式选择的视频水印方案。将水印嵌入到具有小分割模式的宏块中,通过在运动搜索中最小化拉格朗日函数选择嵌入水印后具有最佳率失真性能的运动矢量作为嵌入点。实验结果表明,该算法对视频的质量和码率影响较小,并且水印对视频的重量化编码和噪声攻击有一定的鲁棒性。 According to the new H.264 coding standard,a video watermark scheme based on motion vector and mode selec-tion is proposed.The watermark is embedded into the motion vector with small splitting.By minimizing the Laragian function in motion search to find the motion vector that has the best rate distortion performance.Experimental results demonstrate that the algorithm can achieve robustness to the re-encoding and noise attacks with little affect to video quality and bit rate.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第24期93-96,共4页 Computer Engineering and Applications
基金 福建省自然科学基金(No.A0610022)
关键词 视频水印 模式选择 H.264 拉格朗日函数 video watermark mode selection H.264 Laragian function
  • 相关文献

参考文献6

二级参考文献54

  • 1LIU Quan JIANG Xuemei ZHOU Zude.A Unified Digital Watermark Algorithm Based on Singular Value Decomposition and Spread Spectrum Technology[J].Chinese Journal of Electronics,2005,14(4):621-624. 被引量:3
  • 2朱仲杰,王玉儿,蒋刚毅,梁丰.基于自适应策略的稳健视频水印算法[J].计算机工程与应用,2006,42(36):35-37. 被引量:3
  • 3张立和,杨成,孔祥维.基于运动矢量统计的同步视频水印算法[J].光电子.激光,2007,18(2):236-240. 被引量:6
  • 4Sattar F, Barkat B. A new time-frequency based fragile watermarking scheme for image authentication [ A ]. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing [ C ] , Victoria, BC, Canada, 2003 : 992- 995.
  • 5Maeno K, Sun Q, Chang S F, et al. New semi-fragile watermarking technique using random bias and non-uniform quantization [ A ]. In Proceedings of SPIE Security and Watermarking of Multimedia Contents IV[ C] ,San Jose,CA,USA,2002: 659-670.
  • 6Fridrich J. Image watermarking for tamper detection [ A ]. In: Proceedings of the International Conference on Image Processing [ C ], Chicago, IL, USA, 1998:404-408.
  • 7Kundur D, Hatzinakos D. Digtal watermarking for telltale tamper proofing and authentication [ J ]. Proceedings of the IEEE, 1999, 87(7) :1167-1180.
  • 8Lin C Y, Chang S F. Semi-fragile watermarking for authenticating JPEG visual contents [ A]. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents [ C ] , San Jose, CA, USA,2000 : 140-151.
  • 9Voyatzis G, PITAS. Chaotic mixing of digital images and applications to watermarking [ A ]. In: Proceedings of the European Conference on Multimedia Applications Services and Techniques [ C ], Louvain-La- Neuve, Belgium, 1996: 687-689.
  • 10Berrou C, Glavieux A,Thitimasjshima P. Near Shannon limit errorcorrecting coding and decoding :Turbo-codes [ A ]. In : Proceedings of ICC '93,1993 : 1064-1070.

共引文献52

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部