期刊文献+

一种应用于广播监视的视频水印方案

A Video Watermarking Scheme for Broadcast Monitoring
下载PDF
导出
摘要 针对广播监视中的视频认证问题,提出一种基于宿主视频特征值的水印算法:首先结合三维小波变换和离散余弦变换变换提取视频特征值,并利用特征值和版权保护信息共同组成水印信息,然后根据人眼视觉特征自适应的选取嵌入区域,并利用扩频通信技术提高水印的鲁棒性。理论分析和实验结果表明,提出的水印算法抗攻击能力强,实时性好,可用于视频认证。 According to the problem of video authentication in broadcast monitoring,A watermark scheme based on video features was proposed.Firstly,the video features were extracted by using 3D discrete wavelet transform and discrete cosine transform,then the video features and watermark identifier information created watermark.Secondly,the human visual characteristics were used to select a self-adaptive embedding locations,after that,the spread spectrum communication technology solution was applied to in crease the watermark robustness.Academic analysis and experimental results show the scheme can resist various attacks and has good real-time capabilities,the scheme can be used to video authentication.
作者 李静 LI Jing(Information and Network Management Center,North China Electric Power University,Hebei 071003,China)
出处 《电脑知识与技术》 2013年第5期3129-3132,共4页 Computer Knowledge and Technology
关键词 视频水印 三维离散小波变换 离散余弦变换 广播监视 数字水印攻击 video watermark 3D discrete wavelet transform discrete cosine transform broadcast monitoring attacks on digital watermarking
  • 相关文献

参考文献4

  • 1刘丽,彭代渊.一种新的适用于广播监视的安全视频水印算法[J].计算机学报,2009,32(11):2239-2246. 被引量:7
  • 2Karen Su,Deepa Kundur,Dimitrios Hatzinakos. Spatially localized image-dependent watermarking for statistical invisibility and collu-sion resistance:IEEE Transactions on Multimedia,2005 [C]. IEEE Circuits & Systems Society,2005.
  • 3Budhia U, Kundur D, Zoumtos T. Digital video steganalysis exploiting statistical visibility in the temporal domain:JEEE Transactionson information forensics and security,2009[C]. IEEE Signal Processing Society,2009.
  • 4和红杰,陈帆.自嵌入水印算法的安全性分析[J].电子学报,2007,35(3):557-562. 被引量:9

二级参考文献18

  • 1和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 2B B Zhu,M D Swanson,A H Tewfik.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,21(2):40-49.
  • 3F Deguillaume,S oloshynovskiy,T Pun.Secure hybrid robust watermarking resistant against tampering and copy attack[J].Signal Processing,2003,83(10):2133-2170.
  • 4J Fridrich,M Goljan.Images with self-Correcting capabilities[C].IEEE Press,Kobe,Japan:ICIP'99,1999.25-28.
  • 5C W Wu.On the design of content-based multimedia authentication systems[J].IEEE Trans Multimedia,2002.4(9):385-393.
  • 6M Holliman.N Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Trans on Image Processing,2000.3(9):432-441.
  • 7Douglas R Stinson.Cryptography Theory and Practice[M].By CRC Press,1995.3.
  • 8H.264/AVC Joint Model12(J M-12)Reference Software. http://iphome.hhi.de/suehring/t ml/ . 2007
  • 9Kalker Ton,Depovere Geert,Haitsma Jaap,Maes Maurice.A video watermarking system for broadcast monitoring[].SPIE Proceeding.1999
  • 10Depovere Geert,Kalker Ton,Haitsma Jaap,Maes Maurice,De Strycker Lieven,Termont Pascale,Vandewege Jan,Lan-gell Andreas,Al m Claes,Norman Per,O’Reilly Gerry,Howes Bob,Vaanholt Henk,Hintzen Rein,Donnelly Pat,Hudson Andy.VI VA project:Digital watermarking for broadcast monitoring[].Proceedings of theInternational Conference on I mage Processing(ICIP’).1999

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部