期刊文献+

基于汉明纠错机制的抗帧操作的视频水印 被引量:1

Video Watermarking Robust Against Frame Operations Based on Hamming Code Correction
下载PDF
导出
摘要 提出一种基于(7,4)汉明码纠错机制的抗视频帧操作的帧定位算法,可通过识别含水印帧来提取受到帧操作攻击的水印信息.首先利用改进的简单线性迭代聚类(simple linear iterative clustering,SLIC)超像素分割算法提取视频帧的固有特征X,这里X是一串7位的0-1序列,是由SLIC超像素分割算法通过预处理、量化等运算得到的聚类中心.将视频帧的固有特征X与汉明码结合形成一个特殊的编码S.以编码S为定位码,利用(7,4)汉明码的纠错机制修改1位可隐藏3位的性能来实现定位码的标识,再基于DCT-SVD(discrete cosine transformation-singular value decomposition)分解将水印信息嵌入到含定位标识的视频中.实验结果表明,该算法不仅能抵抗帧删除、帧添加和重编码等攻击,也能抵抗常见的信号处理操作. A frame alignment algorithm is proposed using the(7,4) Hamming code correction to resist these attacking operations.In this algorithm,the watermark is extracted by identifying watermarked frames.The simple linear iterative clustering(SLIC) superpixels method is used to extract the frames' natural characteristics X,which is a 7-bit binary sequence representing the clustering centers obtained using SLIC via preprocessing and quantization.The approach takes advantage of(7,4) Hamming code correction that can hide three bits of the target code S by modifying only one bit.The watermark is then embedded into the video containing alignment marks with DCT-SVD decomposition.Experimental results show that the proposed approach can resist attacks such as frame dropping,frame insertion and recoding.It is also robust against common signal processing operations.
出处 《应用科学学报》 CAS CSCD 北大核心 2016年第5期585-597,共13页 Journal of Applied Sciences
基金 国家自然科学基金(No.61370218)资助
关键词 定位码 帧删除 重编码 视频水印 targeting codes frame dropping recoding video watermarking
  • 相关文献

参考文献2

二级参考文献15

  • 1倪伟,郭宝龙.基于增强位平面的自适应运动估计算法[J].光电子.激光,2005,16(2):203-208. 被引量:4
  • 2王新宇,张兆扬.一种基于H.264/AVC的快速运动估计算法[J].光电子.激光,2005,16(9):1123-1128. 被引量:8
  • 3Cox I J, Miller M I. The first 50 years of electronic watermarking [ J]. Journal of Applied Signal Processing, 2002 (2) : 126-132.
  • 4Honsinger C W, Jones P W, Rabbani M, et al. Lossless Recovery of an Original Image Containing Embedded Data: US, 6278791 [ P]. 2001-08-21.
  • 5Fridrieh J, Goljan M, Du R. Invertible authentication [ J ]. Proceedings of SPIE, 2001, 4314 : 197-208.
  • 6Vleeschouwer C D, Delaigle J F, Macq B. Circular interpretation of bijective transformations in Iossless watermarking for media asset management[ J ]. IEEE Transactions on Multimedia, 2003, 5(1): 97-105.
  • 7Du R, Fridrich J. Lossless authentication of MPEG-2 video [ C]//Proceedings of IEEE International Conference on Image Processing. Piscataway, NJ, USA: IEEE Press, 2002, 2: 893- 896.
  • 8Shang Y. A new invertible data hiding in compressed videos or images[ C ]//Proceedings of the 3rd International Conference on Natural Computation. Washington DC, USA: IEEE Computer Society, 2007 : 576-580.
  • 9Yin P, Yu H H. Classification of video tampering methods and countermeasures using digital watermarking [ J]. Proceedings of SPIE, 2001, 4518: 239-246.
  • 10Park J Y, Lim J H, Kim G S, et al. Invertible semi-fragile watermarking algorithm distinguishing MPEG-2 compression from malicious, manipulation [ C ]//Proceedings of International Conference on Consumer Electronics. New York, NY, USA: IEEE Press, 2002: 18-19.

共引文献14

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部