期刊文献+

一种基于镜头分割的视频水印方案 被引量:1

A Video Watermarking Scheme Based on Scene-split
在线阅读 下载PDF
导出
摘要 针对视频水印常见的共谋攻击和时间同步攻击两种攻击方式,在对逐帧嵌入方法抗时间同步攻击问题的基础上提出了一种基于镜头分割的视频水印模型;通过在各帧图像变化不大的场景内嵌入高度相似的水印信息,在各场景之间嵌入不相关的水印信息达到抵抗共谋攻击的目的;通过有限状态机来生成用于各个镜头的嵌入密钥,在检测时有限搜索这些密钥实现时间同步。仿真结果表明,该算法不仅具备了较好的抵抗共谋攻击的能力,同时还提高了逐帧嵌入方法抗时间同步攻击问题的算法对抗帧删除攻击的能力。 A frame-to-frame video watermarking scheme is presented based on scene-division, which has the capability to resist any normal attack, especially the collusion attack in this paper. In the proposed scheme, the collusion attack is resisted mainly through embedding watermarks, which have high-level similarity to approximately invariant scenes and watermarks being uncorrelated to different scenes. Meanwhile, the embedded key is generated for each scene by limited state machine, and can be used to achieve time-synchronization by searching them in watermark detection.
出处 《西华大学学报(自然科学版)》 CAS 2007年第6期38-41,共4页 Journal of Xihua University:Natural Science Edition
关键词 视频水印 共谋攻击 时间同步 video watermarking collusion attack time-synchronization
  • 相关文献

参考文献12

  • 1[1]K.Su,D.Kundur,D.Hatzinakos,A Novel Approach to Collusion-resistant Video Watermarking[J].in:Proceedings of SPIE 4675,Security and Watermarking of Multimedia Content Ⅳ,2002:491-502.
  • 2[2]H.Zhao,M.Wu,Z.Wang,et al.Non-linear Collusion Attacks on Independent Fingerprints for Multimedia[J].in Proc.IEEE Int.Conf.Acoust.,Speech,Signal Process,2003(5):664-667.
  • 3[3]D.Boneh and J.Shaw.Collusion-secure Fingerprinting for Digital Data.[J].IEEE Trans.Inf.Theory.1998,44(5):1897-1905.
  • 4[4]G.Doёrr and J.-L.Dugelay.A Guide Tour of Video Watermarking[J].Signal Processing,Image Communication,2003,18(4):263-282.
  • 5[5]Eugene T.Lin and Edward J.Delp.Temporal Synch Ronization in Video Watermarking[J].IEEE TRANSACTIONS ON SIGNAL PROCESSING,2004,52 (10).
  • 6[6]Gwenaёl Doёrr and Jean-Luc Dugelay.Security Pitfalls of Frameby-Frame Approaches to Video Watermarking[J].IEEE TRANSACTIONS ON SIGNAL PROCESSING,2004,52 (10):2955-2964.
  • 7[7]I.Cox and M.Miller.Preprocessing media to Facilitate Later Insertion of a Watermark[J].Proc.Int.Conf.Digital Signal Process,2002,(1):67-70.
  • 8[8]Chun-Shien Lu and Chao-Yung Hsu.Near-Optimal Watermark Estimation and Its Countermeasure:Anti-disclosure Watermark for Multiple Watermark Embedding[J].IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,2007,17(4):454-467.
  • 9[9]C.Voloshynovskiy,S.Pereira,A.Herrigel,et al.Generalized Watermarking Attack Based on Watermark Estimation and Perceptual Remodulation[J].Proc.SPIE-Security Watermarking Multimedia Contents Ⅱ,2000,3971:358-370.
  • 10[10]W.Macy and M.Holliman.Quality Evaluation of Watermarked Video[J].Proc SPIE-Security Watermarking Multimedia Contents Ⅱ,2000,3971:486-500.

二级参考文献4

  • 1[1]Eskicioglu A M,Delp E J.An overview of multimedia content protection in consumer electronics devices.Signal Processin Image Communication,Apr.2001,16(7):681-699.
  • 2[2]Petitcolas F A P,Anderson R J,Kuhn M G.Information Hiding-A Survey.Proc.IEEE,1999,87(7):1062-1078.
  • 3[3]Lancini R,Mapelli F,Tubaro S.A robust video watermarking technique in the spatial domain.Proceedings of the IEEE Region-8 International Symposium on Video/Image Processing and Multimedia Communications,Zadar,Croatia,2002:251-256.
  • 4[4]Lin E T,Delp E J.Temporal synchronization in video watermarking.IEEE Transactions on Signal Processiong:Supplement on Secure Media,Oct.2004,52(10):3007-3022.

共引文献2

同被引文献5

  • 1钱刚,曾贵华.典型视频镜头分割方法的比较[J].计算机工程与应用,2004,40(32):51-55. 被引量:29
  • 2Karen Su,Deepa Kundur,Dimitrios Hatzinakos. Statistical Invisibility for Collusion-Resistant[J]. IEEE Transactions on Multimedia,2005,7 (1):43-51.
  • 3LU Zhe-ming, GE Qing-ming, NIU Xia-mu. Robust adap tire video watermarking in the spatial domain. Proc of the 5 th International Symposium on Test and Measurement[C]. Shenzhen, International Academic Publishers, 2003:1875-1880.
  • 4Eugene T.Lin,Edward J.Delp.temporal synch ronization in video watermarking[J]. IEEE Transactions on signal processing,2004,52(10): 263-282.
  • 5刘丽,李晓举,彭代渊.基于分集技术的抗线性共谋攻击的视频水印方案[J].计算机应用研究,2008,25(12):3725-3727. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部