期刊文献+

一种用于视频流的强鲁棒性数字水印方案 被引量:4

Robust Digital Watermarking Scheme for Video Stream
下载PDF
导出
摘要 研究了视频流的水印嵌入和提取,为视频流提供版权保护。针对现阶段越来越多的视频流盗版现状,为了保护版权方的利益,提出了一种将版权方信息作为数字水印嵌入到视频流中的方法。通过该方法,在视频流中嵌入了不易破坏的版权方的信息,该信息可作为流媒体的追溯标记和证据。经实验证明:改进方案与其他数字水印方案相比,具有很强的鲁棒性,可抵抗视频的重复编码,抵抗分辨率缩放,抵抗一定程度的内容修改,支持水印的盲提取。 To provide copyright protection for video stream, the watermark embedding and extraction were stud- ied. For more and more of stream piracies, in order to protect the interests of copyright side, the paper presented a digital watermark embedding method which puts copyright information into video stream. Using this method, the in- formation embedded in the video stream is not easy to be damaged. And the information can be the retrospectively la- bel and evidence for the streaming media. The experiment shows that: compared with other digital watermarking schemes, it has a strong robustness to resist the repeated video encoding, resolution scaling and a certain degree of content changes, h also supports watermark extraction.
作者 丁瑶 于志强
出处 《计算机仿真》 CSCD 北大核心 2012年第6期128-131,共4页 Computer Simulation
关键词 数字水印 离散余弦变换 强鲁棒性 盲提取 色度分量 Digital watermarking DCT Strong robustness Blind extraction Chrominance components
  • 相关文献

参考文献6

  • 1I Cox, J Killian. Secure spread spectrum Watermarking for Multimedia[J]. IEEE Trans on Image Proc , 1997,6 (12) : 1673 - 1687.
  • 2G J Zhan, et al. Embedding watermark in MPEG video sequence [J]. IEEE Fourth Workshop on Multimedia Signal Processing, 2001,3 -5:535 -540.
  • 3M Barni, et al. ADCT domain system for robust image watermarking[ J]. Signal Process, 1998,66:357 - 372.
  • 4F A P Petitcolas, R J Anderson, M G Kuhn. Information hiding a survey[ C]. Proc IEEE, 1999,87(7) :1062 - 1078.
  • 5P Moulin, A O'Sullvanj. Information - theoretic analysis of watermarking[C]. Proc Int Conf On Ac , Sp And Sig , Proc( ICASSP), Turkey: Istanbul, 2000.
  • 6李金龙,杨守义,穆晓敏.基于参数自适应的ISS盲水印算法[J].中国图象图形学报,2007,12(6):991-996. 被引量:2

二级参考文献7

  • 1Cox I J,Miller M L,Bloom J A.Digital Watermarking[M].USA:Morgan Kaufman Press,2002.
  • 2Cox I J,Kilian J,Leighton T,et al.Secure spread spectrum watermarking for images,audio and video[A].In:ICIP'96,IEEE Proceeding on International Conference on Image Processing[C].Lausanne,Switzerland,1996,(3):243 ~ 246.
  • 3Malvar H S,Florencio D A F.Improved spread spectrum:a new modulation technique for robust watermarking[J].IEEE Transactions on Signal Processing,2003,51(4):898 ~ 905.
  • 4Malvar H S,Florencio D A F.An improved spread spectrum for robust watermarking[A].In:IEEE International Conference on Acoustics,Speech,and Signal Processing[C].Orlando,FLORIDA,USA,2002,(4):3301 ~04.
  • 5Watson A B.DCT quantization matrices visually optimized for individual images[A].In:Proceedings of SPIE on Human Vision,Visual Processing,and Digital Display Ⅳ[C].San Jose,California,USA:SPIE Press,1913,1913(14):202 ~216.
  • 6Kim S W,Suthaharan S.An entropy masking model for multimedia content watermarking[A].In:IEEE Proceedings of The 37th Hawaii International Conference on System Sciences,2004[C].Big Island,Hawaii,USA,2004,Track 7.
  • 7Watson A B,Taylor M,Borthwick R.Image quality and entropy masking[A].In:Proceedings of SPIE on Human Vision,Visual Processing,and Digital Display Ⅷ[C],San Jose,California,USA,1997,3016:2~12.

共引文献1

同被引文献23

  • 1胡海波,王林.关于因特网自治系统的连接率的幂律关系[J].西安理工大学学报,2005,21(2):204-207. 被引量:6
  • 2冯国.Linux驱动程序开发实例[M].北京:机械工业出版社,2011.
  • 3Grossglauser M, Tse D. Mobility increases the capacity of ad hoc wireless networks [ J ]. IEEE/ACM Transactions on Networking, 2002, 10(4) : 477 - 486.
  • 4K Zhao, A Kumar, J Yen. Achieving High Robustness in Supply Distribution Networks by Rewiring[ J]. IEEE Transactions on En- gineering Management. 2011,58 (2) :347 - 362.
  • 5M E J Newman. The structure and function of networks[J]. Com- puter Physics Communications, 2002,147:40 - 45.
  • 6Wang Bu - Chin. Digital Signal Processing Techniques and Appli- cations in Radar Image Processing [ M ]. Wiley - , 2008 -8.
  • 7Zou J,Ji Q,Nagy G.A comparative study of local matchingapproach for face recognition[J]. IEEE Trans. on ImageProcessing,2007,16(10): 2617-2628.
  • 8Gottumukkal R,Asari V K. An improved face recognitiontechnique based on modular PCA approach[J]. PatternRecognition Letters,2004,25(4): 429-436.
  • 9Ke J,Qian J X,Qiao Y Z. A modified particle swarm opti-mization algorithm[J]. Journal of Circuits and System,2003,8(5):87-91.
  • 10Wang R,Wei X L,Wu L F,et al.Privacy-aware TrustEvaluation Model for Web Service[J].AISS,2013,5(8):823-825.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部