期刊文献+

实时流媒体数字水印系统的实现及其性能评价

Realization of real-time streaming media digital watermarking system and its performance evaluation
下载PDF
导出
摘要 为了将视频水印技术应用于实时流媒体的安全传输,设计并实现了一个实时流媒体数字水印系统。该系统基于客户机/服务器(C/S)架构,采用模块化的思路进行设计,服务器端支持以数字形式输入的视频流,客户端可以在解码播放的同时实时提取出数字水印信息。为了满足流媒体的实时、安全传输,提出了一种改进的水印算法,该算法计算每段码流中所有可变长度码(VLC)对应的游程累积和,当累积和大于30时修改该段码流中最后一个VLC的值。最后将该算法与经典的差分能量水印(DEW)算法在鲁棒性、不可感知性、水印容量和计算复杂性等方面进行了对比,结果表明提出的算法优势明显。 To apply video watermarking technique in real?time streaming media security transmission,a real?time streaming media digital watermarking system was designed. On the basis of client/server(C/S)frameworks,the system is designed by mod?ularized method. The server?side supports video streaming inputted in digital form,and the client?side can extract digital water?marking information while decoding playing. To guarantee real?time and security transmission of streaming media,an improved watermarking algorithm is proposed. The algorithm calculates cumulative sums corresponding to all variable length codes(VLC)in each code streaming. When the cumulative sum is larger than 30,the last VLC value in code streaming in this section is modi?fied. The proposed algorithm and classical differential energy watermarking(DEW)are compared in the aspects of robustness, imperceptibility,watermarking capacity and computing complexity. The comparison results show that the advantage of the pro?posed algorithm is outstanding.
作者 李莹
出处 《现代电子技术》 北大核心 2015年第15期45-49,共5页 Modern Electronics Technique
关键词 流媒体 数字水印 动态图像专家组 性能评价 streaming media digital watermarking MPEG performance evaluation
  • 相关文献

参考文献10

二级参考文献69

  • 1王丹华,范铁生,魏晓蕊.基于补丁算法的频域音频数字水印的改进方案[J].自动化技术与应用,2007,26(1):99-101. 被引量:2
  • 2郑融,金聪,魏文芬,李蓓.一种基于混沌加密的DCT域数字图像水印算法[J].计算机应用,2005,25(10):2365-2366. 被引量:12
  • 3文志强,李陶深,兰红星,覃团发.改进的差分能量水印技术[J].微电子学与计算机,2006,23(10):194-196. 被引量:1
  • 4Chen Y Y, Pan H K, Tseng Y C. A Secure Data hiding Scheme for Two Color Mages[J]. IEEE Trans on Communication, 2002,50(8) : 1227-1231.
  • 5张卫明,张新鹏,王朔中.适用于灰度级信号的数据嵌入方法[C]//第七届全国信息隐藏暨多媒体信息安全学术会议,2007:58-62.
  • 6Eizion T. Constructions for Perfect Mixed Codes and Other Covering Codes [J]. IEEE Trans on Information Theory, 1993,39 (1) : 209-214.
  • 7王朔中,张新鹏,张开文.数字密写和密写分析--互联网时代的信息战技术[M].北京:清华大学出版社,2004.
  • 8Mbanaso U M,Cooper G S,Chadwick D W,et al.Privacy Preserving Trust Authorization Framework Using XACML[C]∥Wowmom.[s.l.]:[s.n.],2006:673-678.
  • 9Information Technology.Open Systems Interconnection:Security Frameworks for Open Systems:Access Control Framework[S].ITU-T Recommendation X.812|ISO/IEC 10181-3,1995.
  • 10Extensible access control markup language[EB/OL].2005.http://www.oasis-open.org/commit-tees/xacml.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部