期刊文献+

基于码流掩盖定位的3G视频传输纠错算法

Error Correction Algorithm of 3G Video Transmission Basedon Bit Stream Cover Positioning
下载PDF
导出
摘要 3G视频图像在互联网传输过程中,因丢包和网络时延等因素导致视频图像出现差错。传统方法采用视频感知的多粒度哈希纠错算法,当视频被快速篡改时出现码流模糊分块效应,导致视频传输质量不好。提出一种基于码流掩盖定位的3G网络视频传输纠错算法,采用隐马尔科夫模型进行丢包率预测。随机选择多个步长,进行码流迭代掩盖,设计篡改检测算法,用相似度来表述视频内容的差异程度,求解视频整体相似度,通过视频数据的帧间预测和层间预测实现对视频传输的纠错控制。仿真结果表明,该算法能有效降低视频传输的丢包和延时,峰值信噪比提高,视频纠错性能较好。 In the 3G video transmission, due to packet loss and time delay, the video error is occurred. The traditional meth-od using multi granularity Hash correction algorithm for video correction, when the video stream is distorted fast the fuzzy block effect is produced, lead to video transmission quality is reduced. A kind of 3G network video transmission error cor-rection algorithm based on bit stream cover positioning is proposed. Hidden Markov model is used for prediction of packet loss, and multiple steps are selected in random, stream cover design iteration is designed, the tamper detection algorithm is proposed and similarity degree is used to describe the video content for overall similarity. The inter frame prediction and in-ter layer prediction are used to realize video transmission error control. Simulation results show that algorithm can effective-ly reduce the video transmission loss and delay, improve the peak signal to noise ratio, the error correction performance of 3G video is nice.
作者 王倩 张新豪
出处 《科技通报》 北大核心 2014年第10期142-144,共3页 Bulletin of Science and Technology
基金 河南省科技攻关基金资助项目(2011C520016) 2014年河南省科技厅重点攻关(142102210100)
关键词 视频传输 码流定位 纠错算法 video stream transmission bit stream positioning error correction algorithm
  • 相关文献

参考文献5

二级参考文献18

  • 1秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 2Lin Y R, Huang H Y, Hsu W H. An embedded watermark tech- nique in video for copyright protection [ C ]//Proceedings of the 18th Int. Conf. on Pattern Recognition. Piscataway, NJ: Institu- te of Electrical and Electronics Engineers Inc. 2006: 795-798. [DOI: 10. 1109/ICPR. 2006. 244].
  • 3Ahun O, Sharma G, Celik M, et al. A set theoretic framework for watermarking and its application to semifragile tamper detec- tion [ J ]. IEEE Transactions on Information, Forensics and Secu- rity, 2006, 1 ( 4 ) : 479492. [DOI: 10. 1109/TIFS. 2006. 885018 ].
  • 4De Roover C, De Vleeschouwer C, Lefebvre F, et al. Robust video hashing based on radial projections of key frames [ J ]. IEEE Transactions on Signal Processing, 2005, 53 (10) : 4020- 4037. [ DOI: 10. ll09/TSP. 2005. 855414].
  • 5Wang W H, Farid H. Exposing digital forgeries in color filter ar- ray interpolated images [ C ]//Proc. of MM&Sec' 07. New York : Association for Computing Machinery, 2007:715-728.
  • 6Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double MPEG compression [ C ]//Proceedings of the Mul- timedia and Security Workshop Geneva. Switzerland: ACM, 2006 : 37-47.
  • 7Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double quantization [ C ]//Proceedings of the 11 th ACM Multimedia and Security Workshop. Princeton : ACM, 2009 : 39- 48.
  • 8Zhang J, Su Y T. Detecting logo-removal forgery by inconsisten- cies of blur [ C ]//Proceedings of 2009 International Conference on Industrial Mechatronics and Automation. Singapore: IEEE Industrial Electronics Society, 2009: 32-36. [ DOI: 10. 1109/ ICIMA. 2009.5156553 ].
  • 9Kobayashi M, Okabe T, Sato Y. Detecting forgery from static- scene video based on inconsistency in noise level functions [ J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4) :883-892. [ DOI: 10. 1109/TIFS. 2010. 2074194].
  • 10Lee J W, Lee M J, Oh T W, et al. Screenshot identification using combing artifact from interlaced video[ C ]//Proceedings of the 12th ACM Workshop on Multimedia and Security. Princeton: ACM Multimedia and Security Workshop, 2010:653-660.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部