期刊文献+
共找到448篇文章
< 1 2 23 >
每页显示 20 50 100
Improving Video Watermarking through Galois Field GF(2^(4)) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
1
作者 Yasmin Alaa Hassan Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2024年第1期1423-1442,共20页
Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity.This study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4))... Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity.This study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their interaction with distinct irreducible polynomials.The primary aim is to enhance watermarking techniques for achieving imperceptibility,robustness,and efficient execution time.The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process.Scene selection is used strategically to embed watermarks in the most vital frames of the video,while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria,maintaining the video's visual quality.Concurrently,careful consideration is given to execution time,crucial in real-world scenarios,to balance efficiency and efficacy.The Peak Signal-to-Noise Ratio(PSNR)serves as a pivotal metric to gauge the watermark's imperceptibility and video quality.The study explores various irreducible polynomials,navigating the trade-offs between computational efficiency and watermark imperceptibility.In parallel,the study pays careful attention to the execution time,a paramount consideration in real-world scenarios,to strike a balance between efficiency and efficacy.This comprehensive analysis provides valuable insights into the interplay of GF multiplication tables,diverse irreducible polynomials,scene selection,adaptive thresholding,imperceptibility,and execution time.The evaluation of the proposed algorithm's robustness was conducted using PSNR and NC metrics,and it was subjected to assessment under the impact of five distinct attack scenarios.These findings contribute to the development of watermarking strategies that balance imperceptibility,robustness,and processing efficiency,enhancing the field's practicality and effectiveness. 展开更多
关键词 video watermarking galois field irreducible polynomial multiplication table scene selection adaptive thresholding
下载PDF
Multiresolution Video Watermarking Algorithm Exploiting the Block-Based Motion Estimation 被引量:1
2
作者 Salwa A. K. Mostafa Abdelrahman Ali 《Journal of Information Security》 2016年第4期260-268,共9页
This paper presents a novel technique for embedding a digital watermark into video frames based on motion vectors and discrete wavelet transform (DWT). In the proposed scheme, the binary image watermark is divided int... This paper presents a novel technique for embedding a digital watermark into video frames based on motion vectors and discrete wavelet transform (DWT). In the proposed scheme, the binary image watermark is divided into blocks and each watermark block is embedded several times in each selected video frame at different locations. The block-based motion estimation algorithm is used to select the video frame blocks having the greatest motion vectors magnitude. The DWT is applied to the selected frame blocks, and then, the watermark block is hidden into these blocks by modifying the coefficients of the Horizontal sub-bands (HL). Adding the watermark at different locations in the same video frame makes the scheme more robust against different types of attacks. The method was tested on different types of videos. The average peak signal to noise ratio (PSNR) and the normalized correlation (NC) are used to measure the performance of the proposed method. Experimental results show that the proposed algorithm does not affect the visual quality of video frames and the scheme is robust against a variety of attacks. 展开更多
关键词 Digital video watermarking Wavelet Transform Motion Vector Motion Estimation video Frame
下载PDF
Fragile video watermarking technique by motion field embedding with rate-distortion minimization 被引量:6
3
作者 KUO Tien-ying LO Yi-chung 《通讯和计算机(中英文版)》 2009年第1期16-23,共8页
关键词 视频水印技术 计算机技术 安全技术 函数
下载PDF
An H.264/AVC Video Watermarking Scheme in VLC Domain for Content Authentication 被引量:1
4
作者 Sun Tanfeng Jiang Xinghao +3 位作者 Lin Zhigao Zhou Yue Lu Huan Wang Shilin 《China Communications》 SCIE CSCD 2010年第6期30-36,共7页
关键词 H.264/AVC 视频水印 VLC 内容认证 认证算法 低比特率 预测模式 能量关系
下载PDF
A Blind DWT-SCHUR Based Digital Video Watermarking Technique 被引量:2
5
作者 Lama Rajab Tahani Al-Khatib Ali Al-Haj 《Journal of Software Engineering and Applications》 2015年第4期224-233,共10页
Digital watermarking is one of the most powerful tools used in ownership and copyrights protection in digital media. This paper presents a blind digital video watermarking technique based on a combination scheme betwe... Digital watermarking is one of the most powerful tools used in ownership and copyrights protection in digital media. This paper presents a blind digital video watermarking technique based on a combination scheme between the Discrete Wavelet transform in (DWT) and the real Schur Decomposition. The scheme starts with applying twolevel DWT to the video scene followed by Schur decomposition in which the binary watermark bits are embedded in the resultant block upper triangular matrix. The proposed technique shows high efficiency due to the use of Schur decomposition which requires fewer computations compared to other transforms. The imperceptibility of the scheme is also very high due to the use of DWT transform;therefore, no visual distortion is noticed in the watermarked video after embedding. Furthermore, the technique proves to be robust against set of standard attacks like: Gaussian, salt and pepper and rotation and some video attacks such as: frame dropping, cropping and averaging. Both capacity and blindness features are also considered and achieved in this technique. 展开更多
关键词 video watermarkING SCHUR Decomposition Discrete WAVELET TRANSFORM (DWT)
下载PDF
Video Watermark Using Multiresolution Wavelet Decomposition
6
作者 王凤碧 黄均才 周明天 《Journal of Electronic Science and Technology of China》 2005年第2期120-122,160,共4页
A novel technique for the video watermarking based on the discrete wavelet transform (DWT) is present. The intra frames of video are transformed to three gray image firstly, and then the 2th-level discrete wavelet dec... A novel technique for the video watermarking based on the discrete wavelet transform (DWT) is present. The intra frames of video are transformed to three gray image firstly, and then the 2th-level discrete wavelet decomposition of the gray images is computed, with which the watermark W is embedded simultaneously into and invert wavelet transform is done to obtain the gray images which contain the secret information. Change the intra frames of video based on the three gray images to make the intra frame contain the secret information. While extracting the secret information, the intra frames are transformed to three gray image, 2th-level discrete wavelet transform is done to the gray images, and the watermark W’ is distilled from the wavelet coefficients of the three gray images. The test results show the superior performance of the technique and potential for the watermarking of video. 展开更多
关键词 图像水印 内帧 直接小波转换 小波分解 DWT
下载PDF
STUDY ON SEMANTIC-BASED VIDEO WATERMARKING METHOD
7
作者 Wang Xuhai Tong Ming Qin Kezhen 《Journal of Electronics(China)》 2010年第3期428-432,共5页
A new video watermarking method for the Audio Video coding Standard (AVS) is proposed. According to human visual masking properties, this method determines the region of interest for watermark embedding by analyzing v... A new video watermarking method for the Audio Video coding Standard (AVS) is proposed. According to human visual masking properties, this method determines the region of interest for watermark embedding by analyzing video semantics, and generates dynamic robust watermark according to video motion semantics, and embeds watermarks in the Intermediate Frequency (IF) Discrete Cosine Transform (DCT) coefficients of the luminance sub-block prediction residual in the region of interest. This method controls watermark embedding strength adaptively by video textures semantics. Ex- periments show that this method is robust not only to various conventional attacks, but also to re-frame, frame cropping, frame deletion and other video-specific attacks. 展开更多
关键词 Digital watermarking SEMANTICS CLONING Association rules Audio video coding Standard (AVS)
下载PDF
New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features
8
作者 Raheem Ogla Eman Shakar Mahmood +1 位作者 Rasha I.Ahmed Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2023年第9期3075-3096,共22页
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind... The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods. 展开更多
关键词 video watermarking fragile digital watermark copyright protection moving objects color image features H.264
下载PDF
An Anti-Recompression Video Watermarking Algorithm in Bitstream Domain 被引量:1
9
作者 Jing Sun Xiaoping Jiang +2 位作者 Jin Liu Fan Zhang Congying Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第2期154-162,共9页
Following the popularity of digital video application,video copying and dissemination have become very easy;however,this makes video hacking and piracy a potential threat in video communication.Video watermarking tech... Following the popularity of digital video application,video copying and dissemination have become very easy;however,this makes video hacking and piracy a potential threat in video communication.Video watermarking technology can solve the problem of copyright protection,and thus,it has been extensively researched.The robustness of the video watermarking algorithm in the bitstream domain is poor,especially the anti-recompression ability,since the watermarked video may be compressed again before transmitting.Considering this,this paper proposes a video watermarking algorithm in the bitstream domain based on moving object detection.To increase the robustness of the watermarking scheme,the moving macroblocks that belong to the moving object in each P frame can be identified via the moving object detection algorithm.Then,watermark embedding in the moving macroblocks is performed using codeword substitution to ensure the consistency of the bitstream.Moving object detection and watermark embedding are independent and are both carried out in the bitstream domain by partially decoding the bitstream;this avoids the complete decoding and reconstruction of the video,making the method to be highly efficient.The simulation results confirm that the proposed method is robust against recompression and has little impact on the video visual quality and no influence on the bit rate. 展开更多
关键词 video watermarking recompression moving object detection
原文传递
Video Identification Based on Watermarking Schemes and Visual Cryptography
10
作者 Maged Wafy Samr Gamal Zanaty Mahmoud Elkhouly 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期441-453,共13页
Related to the growth of data sharing on the Internet and the wide-spread use of digital media,multimedia security and copyright protection have become of broad interest.Visual cryptography(VC)is a method of sharing a... Related to the growth of data sharing on the Internet and the wide-spread use of digital media,multimedia security and copyright protection have become of broad interest.Visual cryptography(VC)is a method of sharing a secret image between a group of participants,where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original,and certain other groups are defined as prohibited,and even if they combine knowledge of their parts,they can’t obtain any information on the secret image.The visual cryptography is one of the techniques which used to transmit the secrete image under the cover picture.Human vision systems are connected to visual cryptography.The black and white image was originally used as a hidden image.In order to achieve the owner’s copy right security based on visual cryptography,a watermarking algorithm is presented.We suggest an approach in this paper to hide multiple images in video by meaningful shares using one binary share.With a common share,which we refer to as a smart key,we can decrypt several images simultaneously.Depending on a given share,the smart key decrypts several hidden images.The smart key is printed on transparency and the shares are involved in video and decryption is performed by physically superimposing the transparency on the video.Using binary,grayscale,and color images,we test the proposed method. 展开更多
关键词 Visual cryptography(VC) video watermarking PSNR
下载PDF
A blind video watermarking scheme based on ICA and shot segmentation 被引量:4
11
作者 SUN Jiande LIU Ju 《Science in China(Series F)》 2006年第3期302-312,共11页
Video watermark is the main method to protect the copyright of digital video. In this paper, a blind video watermarking scheme based on independent component analysis (ICA) and shot segmentation is presented. In this ... Video watermark is the main method to protect the copyright of digital video. In this paper, a blind video watermarking scheme based on independent component analysis (ICA) and shot segmentation is presented. In this scheme, the global histogram comparison approach is used to segment the video, and ICA is performed on each ob- tained segment to get its independent component frames (ICFs). The copyright informa- tion is embedded into the principal independent component frames (PICFs) according to the single watermark embedding (SWE) scheme. The content-based shot segmentation for video sequences is used here to improve the robustness to temporal desynchroniza- tion. The watermark embedded in PICFs provides better robustness to intra-video collu- sion attack. And blind detection is achieved by using the SWE scheme. The simulations show the feasibility and validity of this scheme. It can resist most of the common frame-based and video-based attacks. The watermark can be detected blindly. And it is robust to temporal desynchronization and intra-video collusion. 展开更多
关键词 ICA 数字水印 信息安全 视频
原文传递
Robust Watermarking of Mobile Video Resistant against Barrel Distortion 被引量:2
12
作者 Huawei Tian Yanhui Xiao +2 位作者 Gang Cao Jianwei Ding Bo Ou 《China Communications》 SCIE CSCD 2016年第9期131-138,共8页
In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the orig... In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression. 展开更多
关键词 鲁棒水印 移动视频 桶形失真 图像显示 虚拟视图 JPEG压缩 桶形畸变 水印嵌入
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
13
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of ... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA(timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 视频数据 多点传送 MAC 信息证实代码 数字水印 MLUT
下载PDF
Turbo-Based DNW Algorithm for Compressed Video in VLC Domain 被引量:3
14
作者 LINGHe-fei LUZheng-ding ZOUFu-hao 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期297-302,共6页
In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turb... In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turbo code was used to encode the message prior to watermark embedding and decode the watermark posterior to watermark detection. From the analysis and experiments, the following conclusion could be drawn. The T-DNW algorithm has little higher computational complexity than DNW. And both algorithms have the same performance in terms of watermark visual quality impact. Furthermore, the T-DNW algorithm is much more robust against some common attack than DNW. Although the T-DNW algorithm sacrifices a half payload, we think the achievements are encouraging. 展开更多
关键词 DNW算法 实时视频水印 VLC域 水印图像 图像识别 水印模式 解密
下载PDF
基于张量分解与场景分割的鲁棒视频水印算法
15
作者 张天骐 闻斌 +1 位作者 熊天 吴超 《计算机工程》 CAS CSCD 北大核心 2023年第8期250-256,264,共8页
数字技术的进步使得用户更便捷地在互联网上上传和下载数据,但是由此引发了盗取伪造、非法滥用等问题。数字水印技术可以有效遏制滥用数据的行为。针对现有视频水印算法在面对视频帧攻击时抵抗能力差的问题,提出一种结合张量分解与视频... 数字技术的进步使得用户更便捷地在互联网上上传和下载数据,但是由此引发了盗取伪造、非法滥用等问题。数字水印技术可以有效遏制滥用数据的行为。针对现有视频水印算法在面对视频帧攻击时抵抗能力差的问题,提出一种结合张量分解与视频场景分割的鲁棒视频水印算法,提高嵌入水印图像后载体视频的不可见性。将载体视频分割为若干个视频场景,并将视频场景从RGB颜色空间转换到YCbCr颜色空间,根据视频场景中每帧的Y分量构造高阶张量,得到相应的张量特征图并进行不重叠分块处理。根据特征图子块联合熵确定嵌入水印的子块,利用奇异值分解对选定块分解得到U矩阵,并将水印信息嵌入到U矩阵中,通过对水印图像进行Arnold置乱处理,增加水印图像的安全性。实验结果表明,在载体视频“suzie.avi”的MPSNR值为55 dB以上时,该算法对不同攻击参数的高斯噪声、椒盐噪声、泊松噪声、模糊、帧丢失、帧平均以及帧交换等攻击都具有较强的鲁棒性,归一化互相关系数均在0.938之上。 展开更多
关键词 视频水印 张量分解 场景分割 联合熵 奇异值分解
下载PDF
高校思政课实践教学系统微视频功能设计研究
16
作者 陈晨 《自动化技术与应用》 2023年第6期139-142,159,共5页
为改善教学质量,提出基于高校思政课实践教学学习系统的微视频功能设计研究。分析前期需求,开发设置情境、内容展示、师生互动与总结评论四个模式,利用摄像机完成微视频制作;在后期处理中使用抗线性共谋攻击的视频水印算法,经过子区域... 为改善教学质量,提出基于高校思政课实践教学学习系统的微视频功能设计研究。分析前期需求,开发设置情境、内容展示、师生互动与总结评论四个模式,利用摄像机完成微视频制作;在后期处理中使用抗线性共谋攻击的视频水印算法,经过子区域选取、JND值计算与水印嵌入等步骤实现微视频功能设计。仿真实验表明方法能够帮助激发学生学习兴趣,提高思政课实践教学效果。 展开更多
关键词 实践教学系统 微视频制作 水印算法
下载PDF
基于QDCT全局均分策略的鲁棒视频水印方案 被引量:1
17
作者 陶新宇 熊礼治 张翔 《计算机科学》 CSCD 北大核心 2023年第11期168-176,共9页
视频水印作为一种应用前景广阔的版权保护技术,近年来受到了广泛关注。与原始域方案不同,压缩域方案不需要完全编解码视频,具有更高的效率;并且视频存储和传输一般需要经过压缩编码才能进行,使得压缩域的鲁棒视频水印方案成为了研究热... 视频水印作为一种应用前景广阔的版权保护技术,近年来受到了广泛关注。与原始域方案不同,压缩域方案不需要完全编解码视频,具有更高的效率;并且视频存储和传输一般需要经过压缩编码才能进行,使得压缩域的鲁棒视频水印方案成为了研究热点。但现有的压缩域方案大多利用压缩域中的QDCT系数个体来嵌入水印,使得算法的鲁棒性不高。为了增加压缩域算法的鲁棒性,文中提出了一种基于QDCT全局均分策略的鲁棒视频水印方案。首先,利用非零系数个数选出视频中兼具纹理和高空间复杂度的块作为水印块,将两块水印块组成块对;然后,分别计算出块对中所有系数的总和,根据系数总和的大小以及水印信息,通过全局均分策略修改后序块内所有非零系数的幅值,来满足方案设置的块对系数和规则,以实现水印的嵌入。实验结果表明,在保证含水印视频具有较高视觉质量的前提下,该方案抵抗重压缩攻击和噪声攻击的鲁棒性均优于现有压缩域的鲁棒视频水印方案,分别提高了8%,9%。 展开更多
关键词 视频水印 鲁棒水印 H.264编解码 重压缩攻击 均分策略
下载PDF
基于小波变换和HVS的视频水印算法研究
18
作者 罗成娥 严威 苏永红 《计算机与网络》 2023年第17期48-52,共5页
为解决视频数据的版权保护问题,提出了一种以二进制图像为视频水印信号,使用混沌序列和ARnold置乱处理加密水印,结合人体视觉系统(Human Vision System,HVS)对图像纹理区域、运动区域的掩蔽特性,通过小波变换将其嵌入到视频自适应频带... 为解决视频数据的版权保护问题,提出了一种以二进制图像为视频水印信号,使用混沌序列和ARnold置乱处理加密水印,结合人体视觉系统(Human Vision System,HVS)对图像纹理区域、运动区域的掩蔽特性,通过小波变换将其嵌入到视频自适应频带的一种隐水印视频水印算法。该算法采用Matlab编程仿真,通过实验结果数据分析,证明该算法具有较好的隐秘性、随机检测性、保密性、实时性和鲁棒性。 展开更多
关键词 视频水印 混沌序列 ARNOLD置乱 离散小波变换 人体视觉系统 隐秘性 鲁棒性
下载PDF
以鲁棒性为目标的数字多水印研究 被引量:33
19
作者 陈真勇 唐龙 +1 位作者 唐泽圣 熊璋 《计算机学报》 EI CSCD 北大核心 2006年第11期2037-2043,共7页
单个的数字水印算法或方案难以应付多种攻击方法的攻击,为此,文章对应用多水印方法提高水印抗攻击鲁棒性问题进行探讨.根据水印抵抗攻击的能力,给出了水印抗攻击鲁棒性的分类定义,同时根据这种能力提高的程度对多水印进行了分类,并由此... 单个的数字水印算法或方案难以应付多种攻击方法的攻击,为此,文章对应用多水印方法提高水印抗攻击鲁棒性问题进行探讨.根据水印抵抗攻击的能力,给出了水印抗攻击鲁棒性的分类定义,同时根据这种能力提高的程度对多水印进行了分类,并由此引申出相关的命题.深入探讨了多水印带来的主要问题,并提出了解决多水印问题的多目标优化数学模型.以视频水印为例,对抗几何变换攻击和帧同步攻击的视频水印联合进行了实验,实验结果表明多目标优化模型能够有效解决多水印带来的问题,且多水印方法能够提高水印抵抗攻击的能力. 展开更多
关键词 多水印 视频水印 鲁棒性 多目标优化 版权保护
下载PDF
一种基于H.264/AVC的视频可逆脆弱水印算法 被引量:12
20
作者 张维纬 张茹 +3 位作者 刘建毅 伍淳华 钮心忻 杨义先 《电子与信息学报》 EI CSCD 北大核心 2013年第1期106-112,共7页
结合H.264压缩编码标准的特性,该文提出一种新的基于H.264/AVC的视频可逆脆弱水印算法。算法先计算当前宏块预测残差块量化的离散余弦变换(DCT)系数的哈希值生成认证码,再把认证码作为水印信息嵌入到下一个相邻宏块活性最大的4′4块的... 结合H.264压缩编码标准的特性,该文提出一种新的基于H.264/AVC的视频可逆脆弱水印算法。算法先计算当前宏块预测残差块量化的离散余弦变换(DCT)系数的哈希值生成认证码,再把认证码作为水印信息嵌入到下一个相邻宏块活性最大的4′4块的最后一个非零量化DCT系数中。在解码端,通过比较认证码和提取的水印信息进行视频数据完整性的认证。实验结果表明,该算法对视频质量和码率的影响较小,并且能对认证通过的视频数据进行还原和对认证失败的视频Ⅰ帧遭篡改区域进行有效的定位。 展开更多
关键词 视频水印 脆弱水印 可逆水印 H 264 视频认证
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部