期刊文献+

用于内容认证的半脆弱可逆视频水印算法 被引量:10

Invertible Semi-fragile Video Watermarking Algorithm Used for Content Authentication
原文传递
导出
摘要 提出了一种运用哈希函数进行MPEG-4内容认证的半脆弱可逆视频水印算法。在YUV视频进行MPEG-4编码的I帧中嵌入两个水印,一个运用哈希函数进行内容完整性验证并嵌入帧序号进行帧间篡改定位,另一个基于直流系数和低频系数用于帧内篡改定位。实验结果表明,算法能够对视频内容进行验证并实现篡改定位,且对MPEG-4压缩具有鲁棒性。另外,算法具有可逆性,能够在视频内容可信的前提下进行无损恢复。 This paper proposes an invertible senti-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. The proposed algorithm embeds two watermarks into I frame while encoding the YUV video to MPEG-4 format. One watelanark using a hash function aims to authenticate the contents and embed the frame number for tamper localization between frames, and the other one based on direct coefficients and low-frequency coefficients is used for the detection of tamper localization within the frame. The experimental results show that the proposed algorithm is able to authenticate the video contents and detect the tamper localization, and it is robust for MPEG-4 compression. In addition, the proposed algorithm is exactly invertible, which means that the original video data is available as long as the watermarked video is credible.
出处 《中国图象图形学报》 CSCD 北大核心 2010年第8期1189-1195,共7页 Journal of Image and Graphics
关键词 视频水印 MPEG-4 半脆弱 可逆 篡改定位 video watermark, MPEG-4, semi-fragile, invertible, tamper localization
  • 相关文献

参考文献8

  • 1Cox I J, Miller M I. The first 50 years of electronic watermarking [ J]. Journal of Applied Signal Processing, 2002 (2) : 126-132.
  • 2Honsinger C W, Jones P W, Rabbani M, et al. Lossless Recovery of an Original Image Containing Embedded Data: US, 6278791 [ P]. 2001-08-21.
  • 3Fridrieh J, Goljan M, Du R. Invertible authentication [ J ]. Proceedings of SPIE, 2001, 4314 : 197-208.
  • 4Vleeschouwer C D, Delaigle J F, Macq B. Circular interpretation of bijective transformations in Iossless watermarking for media asset management[ J ]. IEEE Transactions on Multimedia, 2003, 5(1): 97-105.
  • 5Du R, Fridrich J. Lossless authentication of MPEG-2 video [ C]//Proceedings of IEEE International Conference on Image Processing. Piscataway, NJ, USA: IEEE Press, 2002, 2: 893- 896.
  • 6Shang Y. A new invertible data hiding in compressed videos or images[ C ]//Proceedings of the 3rd International Conference on Natural Computation. Washington DC, USA: IEEE Computer Society, 2007 : 576-580.
  • 7Yin P, Yu H H. Classification of video tampering methods and countermeasures using digital watermarking [ J]. Proceedings of SPIE, 2001, 4518: 239-246.
  • 8Park J Y, Lim J H, Kim G S, et al. Invertible semi-fragile watermarking algorithm distinguishing MPEG-2 compression from malicious, manipulation [ C ]//Proceedings of International Conference on Consumer Electronics. New York, NY, USA: IEEE Press, 2002: 18-19.

同被引文献84

引证文献10

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部