期刊文献+

一种自适应的DCT-SVD域视频水印算法

An adaptive video watermarking algorithm based on DCT and SVD
在线阅读 下载PDF
导出
摘要 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。 In this paper, a blind adaptive video watermarking algorithm based on DCT ( discrete cosine transformation) and SVD (singular value decomposition) is proposed. The algorithm first partitions the video stream into several shots, And both the frames of the shots are transformed into DCT-SVD domain. the watermarking sequence is embedded into the largest singular value. Experiments showed the new algorithm meet the transparency requirements at the same time meet the requirements of a certain robustness, resistance to low-pass filtering, median filter, noise and H.264 compression, anti Collusion, Cut-and-splice attacks.
出处 《微计算机信息》 2009年第33期62-63,86,共3页 Control & Automation
关键词 视频水印 奇异值分解 DCT变换 H.264 video watermarking svd dct H.264
  • 相关文献

参考文献5

  • 1J.Zhang, A.T.S .Ho, Robust Digital Image-in-video Watermarking for the Emerging H.264/AVC Standard, IEEE 2005 Workshop on Signal Processing Systems (SIPS'05), Athens, Greece, Novemher 2-4, 2005. pp.657-662.
  • 2G. Qiu , P. Marzilian, A.T.S. Ho, D. lie and Q. Sun, A Hybrid Watermarking Scheme for H.264 Video. Proceedings of the 17th International Colfference on Pattern Recognition, ICPR, vol. 4, Aug.2004. pp. 865-868.
  • 3周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 4张志明,周学广.采用奇异值分解的数字水印嵌入算法[J].微计算机信息,2006,22(07Z):69-71. 被引量:13
  • 5W Kong; B Yang; D Wu 等. SVD Based Blind Video Watermarking Algorithm .Innovative Computing, Information and Control, 2006. ICICIC apos;06. First International Conference on Volume 1, Issue , 50-01 Aug. 2006 Page(s): 265 - 268.

二级参考文献12

  • 1付男,王民北,江涛.数字水印技术及其在手机终端上的设计与应用[J].微计算机信息,2005,21(08X):13-14. 被引量:2
  • 2王新梅 肖国镇.纠错码-原理与方法[M].西安电子科技大学出版社,1996.10.
  • 3Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 4Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 5Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 6Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 7Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 8Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 9Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 10Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.

共引文献105

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部