期刊文献+

适用于广播监视的视频水印协议 被引量:3

Video Watermarking Protocol for Broadcast Monitoring
下载PDF
导出
摘要 数字水印技术被广泛应用于多媒体版权保护、广播监视等领域中.在广播监视中,广告商首先在他的广告中嵌入水印信息,之后把该广告发送给广播电视台.为了防止双方可能产生的欺诈,对一段广告、嵌入的水印能够做出双重认证是必不可少的.论文就双重认证提出了一种适合应用在广播监视中的协议,该协议在加密域完成水印的产生和嵌入.协议在加密时应用一种同态公钥密码技术,同时利用嵌入的信息绑定广告、嵌入的水印和本次交易.应用提出的协议,最常见的问题如消费者的权利问题和非绑定问题都可以被解决,甚至广告商或广播电视台的欺诈行为也可以预防. Digital watermarking technology has been widely applied in the fields of multimedia copyright protection and broadcast monitoring,etc.For the purpose of broadcast monitoring,watermark information will first be embedded in the advertisement before it is sent to broadcast and television.In order to prevent possible fraud from any of the parties,it is essential to make two-factor authentication for video clips and watermark.A protocol based on two-factor authentication,specifying the generation and embedding of watermark are completed in the encryption domain,is proposed for broadcast monitoring.The method of using the homomorphic public key cryptography will be adopted.Moreover,the advertisement,the embedded watermark and the transaction are bound with embedding information as well.Based on this protocol,the most common problems such as the customer's right problem and non-binding problem can be solved.It can even help avoid fraud from advertiser and broadcast and television.
出处 《计算机学报》 EI CSCD 北大核心 2014年第11期2389-2394,共6页 Chinese Journal of Computers
基金 国家自然科学基金(51175443) 河南省科技厅科技攻关项目(132102210408 142102210075) 河南省高等学校青年骨干教师资助计划(2011GGJS-138) 河南省教育厅科技攻关项目(12A520046 14A520004)资助~~
关键词 鲁棒水印 广播监视 水印协议 同态公钥密码 robust watermarking broadcast monitoring watermarking protocol homomorphic public key cryptography
  • 相关文献

参考文献13

  • 1Depovere G, Kalker T, Haitsma J, et al. The VIVA project: Digital watermarking for broadcast monitoring/ / Proceedings of the 1999 International Conference on Image Processing. Kobe, Japan, 1999: 202-205.
  • 2Termont P, De Strycker L, Vandewege J, et al. How to achieve robustness against scaling in a real-time digital watermarking system for broadcast monitoring/ /Proceedings of the 2000 International Conference on Image Processing. Vancouver, Canada, 2000: 407 - 410.
  • 3Qiao Lin-Tian , Nahrstedt K. Watermarking schemes and protocols for protecting rightful ownerships and customer's rights. Journal of Visual Communication and Image Repre- sentation, 1998, 9(3): 194-210.
  • 4Memon N, Wong P W. A buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 2001, 10(4): 643-649.
  • 5Lei Chin-Laung , Yu Pei-Ling , Tsai Pan-Lung, Chan MingHwa. An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 2004, 13(12): 1618-1626.
  • 6Kuribayashi M, Tanaka H. Fingerprinting protocol for images based on additive homomorphic property. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.
  • 7Frattolillo F. Watermarking protocol for web context. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 350-362.
  • 8Rial A, Balasch J, Preneel B. A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer. IEEE Transactions on Information Forensics and Security, 2011, 6(1): 202-212.
  • 9Zeng Peng, Cao Zhen-Fu , Choo Kim-Kwang Raymond. An ID- based digital watermarking protocol for copyright protection. Computers and Electrical Engineering, 2011, 37 (4): 526- 531.
  • 10Kumar A, Ansari M D, Ali J, Kumar K. A new buyer-seller watermarking protocol with discrete cosine transform. Communications in Computer and Information Science, 2011, 142(3): 468-471.

二级参考文献24

  • 1张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15
  • 2和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 3ZHU B B,SWANSON M D,TEWFIK A H.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,3:40-49.
  • 4CELIK M U,GAURAV S,et al.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans on Image Processing,2002,11(6):585-595.
  • 5WONG P W,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Trans on Image Processing,2001,10(10):1593-1601.
  • 6FRIDRICH J.Security of fragile authentication watermarks with Localization[A].Security and watermarking of multimedia contents[C].San Jose,California,2002.691-700.
  • 7和红杰,张家树.区分不同篡改的脆弱水印算法[A].第十二届全国图象图形学学术会议(NCIG2005)[C].2005.140-144.
  • 8FRIDRICH J,GOLJAN M.Images with self-correcting capabilities[A].ICIP'99[C].Kobe,Japan,1999.25-28.
  • 9LEE J,WON C S.A watermarking sequence using parities of error control coding for image authentication and correction[J].IEEE Transactions on Consumer Electronics,2000,46(2):313-317.
  • 10WU C W.On the design of content-based multimedia authentication systems[J].IEEE Trans.Multimedia,2002,4(9):385-393.

共引文献38

同被引文献25

  • 1Tew Y, Wong K S. An overview of information hiding in H. 264/ AVC compressed video [J]. IEEE Transactions on Circuit and System for Video Technology, 2014, 24(2) :305-319. [DOI: 10, 1109/TCSVT. 2013. 2276710 ].
  • 2Wang D, Huang S J, Feng G R, et al. Perceptual differential energy watermarking for H. 264/AVC [ J l. Multimedia Tonls amt Applications, 2012, 60(3): 537-550. [DOI: 1 0. 1007/ s11042-O11-0830-1 ].
  • 3Liu Y X, Li Z T, Ma X J, el al. A robust data tliding algorithm for H. 264/AVC video slreams [ J]. Journal of Systems and Soft- ware, 2013, 86(8):2174-2183. [DOI: 10.1016/j. jss. 2013. 03. 1011.
  • 4Li Q. Wang R D, Xu D W. Fragile video watermarking algorithm based on H. 264/AVC [ J ] . Materials Research hmovations, 2013, 17 ( 1 ): 94-100. [DOI: 10. 1179/1432891 713Z. 000000000189 ].
  • 5Xu D W, Wang R D, Shi Y Q. Data hiding in enejspted H. 264/ AVC video streams by codeword substitution [ J]. IEEE Transac- tions on Information Forensies and Security. 2014, 9 (3) : 596- 606. [DOI: 10. 1109/TIFS. 2014. 2302899 ].
  • 6Lie W N, Lin T C I, Tsai D C, et al. Error resilient coding based on reversible data embedding technique for H. 264/AVC video[ C ]//Proeeedings of IEEE International ('nnference on Muhimedia and Expo. Amsterdam: IEEE, 2005 : 1174-1177. [ DOI: 10. 1109/ICME. 2005. 1521636].
  • 7Lin S D, Meng H C, Su Y L. A novel error resilience using re-versible data embedding in H. 264/AVC [ C ]//Proceedings of the 6th International Conference on Information, Communications & Signal Processing. Singapore : IEEE, 2007 : 1-5. [DOI : 10. 1109/ICICS. 2007. 4449605].
  • 8Chung K L, Huang Y H, Chang P C, et al. Reversible data hid- ing-based approach for intra-frame error concealment in H. 264/ AVC [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2010, 20(11 ) : 1643-1647. [DOI: 10. 1109/TCS- VT. 2010. 2077577 ].
  • 9Xu D W, Wang R D, Shi Y Q. An improved reversible data hid- ing-based approach for intra-frame error concealment in H. 264/ AVC [J]. Journal of Visual Communication and Image Repre- sentation, 2014, 25 (2) : 410-422. [DOI: 10. 1016/j. jvcir. 2013. 12.008 ].
  • 10Ni Z C, Shi Y Q, Ansari N, et al. Reversible data hiding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16 (3) : 354-362. [ DOI: 10. 1109/TCSV T. 2006. 869964].

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部