期刊文献+

基于内容特征的视频半脆弱水印算法 被引量:1

A Semi-fragile Video Watermarking Algorithm Based on Content Features
下载PDF
导出
摘要 相比数字图像水印,在采用半脆弱水印技术进行视频内容认证时,由于嵌入水印量比较大,对算法的运行速度提出了更高的要求。本文改进了基于亮度分块的数字视频空域半脆弱水印算法,能保持水印的鲁棒性不变,且提高了水印的嵌入速度。基于相邻亮度分块的平均值大小关系在非恶意操作前后保持不变的特点,本文运用改进算法生成水印序列,并在时域上将水印嵌入DCT系数中。该算法具有不涉及具体编码格式,无需原视频参与认证,快速定位篡改区域的优点。仿真实验结果表明水印嵌入达到了18.37MB/s的速度,对画质影响不可见,实验结果同时证明了算法具有良好的实时性。 Because of the large number of watermark embedding,using semi-fragile video water-marking for content authentication demands a higher level of operating speed compared with digital image water-marking. In this paper,we improve the spatial semi-fragile watermarking algorithm which based on lumi-nance blocks,and the algorithm can keep a better robustness as well as embedding speed. By using the optimized algorithm,which is based on the feature that two adjacent luminance blocks has a constant ener-gy relationship in the non-malicious situation,the watermarking sequences are produced and embedded in-to DCT coefficient. This algorithm has its advantages,such as,does not involve specific encoding format, does not need original video for authentication,and even can localize the tampered region quickly. The simulation experimental results demonstrate the embedding speed reach 18. 37MB/s,and with invisible quality loss,meanwhile,it shows that the algorithm has good realtime response.
出处 《中国传媒大学学报(自然科学版)》 2014年第5期48-53,共6页 Journal of Communication University of China:Science and Technology
关键词 半脆弱水印 亮度分量 DCT 兼容性 实时性 semi-fragile luminance component DCT compatibility real-time
  • 相关文献

参考文献18

二级参考文献79

  • 1张永平,郭宝龙.一种带反馈的半脆弱认证水印算法[J].西安电子科技大学学报,2004,31(5):724-727. 被引量:2
  • 2曾牛,程胜利.数字水印技术研究[J].交通与计算机,2004,22(6):41-44. 被引量:6
  • 3曹华,周敬利,余胜生,苏曙光.基于H.264低比特率视频流的半脆弱盲水印算法实现[J].电子学报,2006,34(1):40-44. 被引量:20
  • 4施化吉,翁正岭,李星毅.基于MPEG-Ⅰ/Ⅱ视频内容认证的半脆弱水印方案[J].计算机工程,2006,32(14):160-162. 被引量:7
  • 5张立和,米晓莉,孔祥维.基于运动速度的视频水印算法[J].计算机应用研究,2007,24(4):187-189. 被引量:4
  • 6LI Z, SUN Q, LIAN Y, et al. Joint source channel authentication resource allocation and unequal authenticity protection for multimedia over wireless networks [ J]. IEEE Transactions on Multimedia, 2007, 9(4) : 837 -850.
  • 7SUN Q, HE D, TIAN Q. A secure and robust authentication scheme for video transcoding[ J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10) : 1232 - 1244.
  • 8WONG P, MEMON N. Secret and public key authentication watermarking schemes that resist vector quantization attack[ C]//Security and Watermarking of Multimedia Contents. San Jose: SPIE, 2000, 3971 : 417 - 427.
  • 9DU R, FRIDRICH J. Lossless authentication of MPEG-2 video [ C]// IEEE International Conference on Image Processing. Rochester, NY: IEEE, 2002, 2:893 - 896.
  • 10BIJAN M, STARD R. Content authentication and tamper detection in digital video[ C]//IEEE International Conference on Image Processing. Vancouver: IEEE, 2000, 1:458-461.

共引文献122

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部