浏览全部资源
扫码关注微信
1. 华侨大学 工学院,福建 泉州 362021
2. 国家计算机网络与信息安全管理中心,北京100031
3. 北京邮电大学 信息安全中心,北京100876
[ "张维纬(1982-),男,福建泉州人,博士,华侨大学讲师、硕士生导师,主要研究方向为数字版权管理与数字水印、大数据与云计算安全等。" ]
[ "赵宸(1985-),男,山东青岛人,博士,国家计算机网络与信息安全管理中心助理研究员,主要研究方向为网络安全等。" ]
[ "黄德天(1985-),男,福建龙岩人,博士,华侨大学讲师、硕士生导师,主要研究方向为机器视觉、图像\\视频处理等。" ]
[ "张沛(1982-),男,湖南株洲人,北京邮电大学博士生,主要研究方向为数字水印、知识可视化、通信导航等。" ]
[ "杨义先(1961-),男,四川绵阳人,北京邮电大学教授、博士生导师,主要研究方向为网络与信息安全、密码学、编码理论等。" ]
网络出版日期:2015-10,
纸质出版日期:2015-10-25
移动端阅览
张维纬, 赵宸, 黄德天, 等. 基于代价策略的H.264/AVC半脆弱水印算法[J]. 通信学报, 2015,36(10):110-118.
Wei-wei ZHANG, Chen ZHAO, De-tian HUANG, et al. Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy[J]. Journal on communications, 2015, 36(10): 110-118.
张维纬, 赵宸, 黄德天, 等. 基于代价策略的H.264/AVC半脆弱水印算法[J]. 通信学报, 2015,36(10):110-118. DOI: 10.11959/j.issn.1000-436x.2015180.
Wei-wei ZHANG, Chen ZHAO, De-tian HUANG, et al. Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy[J]. Journal on communications, 2015, 36(10): 110-118. DOI: 10.11959/j.issn.1000-436x.2015180.
针对目前基于H.264/AVC标准的视频半脆弱水印算法存在的问题,提出一种基于代价策略的H.264/AVC半脆弱水印算法。通过消除基于内容的特征码之间的相关性,提高内容认证水印的顽健性。为实现半脆弱水印既能准确定位篡改区域,又对视频质量和码率的影响最小,引入了一个代价函数,通过该函数在残差4×4块的DCT系数中选择一个最佳的系数嵌入水印。实验表明,所提算法嵌入水印对视频质量和码率的影响较小,半脆弱水印对恶意篡改的图像区域能有效、准确地检测和定位。
In order to solve some existing problems on detecting malicious tampering by video watermarking based on H.264/AVC video compression standard
a semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy was proposed.To further improve the robustness of the feature codes in semi-fragile video watermarking algorithm
a new generation algorithm for feature codes by eliminating the correlation of them was proposed.In order to meet the requirement that the semi-fragile watermarks should be uniformly embedded into the video frames to locate the tampered region accurately
a minimal cost function was introduced to select a DCT coefficient in the 4 × 4 block residual to embed watermark which had minimal impact on the video quality and bit rates.Experimental results show that the proposed algorithm can significantly reduce impact on video quality and bit rate because of embedding the watermarking by adopting the minimum cost function and it is sensitive to malicious manipulations.The retrieved feature code and watermarking can detect and locate malicious manipulations.
MEHDI F , SHERVIN S , MEHDI S , et al . Tampering detection in compressed digital video using watermarking [J ] . IEEE Transactions on Instrumentation and Measurement , 2014 , 63 ( 5 ): 1057 - 1072 .
QUELUZ M P . Authentication of digital images and video:generic models and a new contribution [J ] . Signal Processing:Image Communication , 2001 , 16 ( 5 ): 461 - 475 .
DOERR G , DUGELAY J L . A guide tour of video watermarking [J ] . Signal Processing:Image Communication , 2003 , 18 ( 4 ): 263 - 282 .
ZHANG X P , WANG S Z , QIAN Z X , et al . Reference sharing mechanism for watermark self-embedding [J ] . IEEE Transactions on Image Processing , 2011 , 20 ( 2 ): 485 - 495 .
HE H J , CHEN F , TAI H M , et al . Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 1 ): 185 - 196 .
PIPER A,SAFAVI-NAINI R . Scalable fragile watermarking for image authentication [J ] . IET Information Security , 2013 , 7 ( 4 ): 300 - 311 .
CHEN F , HE H J , TAI H M , et al . Chaos-based self-embedding fragile watermarking with flexible watermark payload [J ] . Multimedia Tools and Applications , 2014 , 72 ( 1 ): 41 - 56 .
CHEN S , LEUNG H . Chaotic watermarking for video authentication in surveillance applications [J ] . IEEE Transactions on Circuits and System for Video Technology , 2008 , 18 ( 5 ): 704 - 709 .
SHI Y J , QI M , YI Y G , et al . Object based dual watermarking for video authentication [J ] . Optik , 2013 , 124 : 3827 - 3834 .
MASOUMI M , AMISI S . Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks [J ] . The International Arab Journal of Information Technology , 2012 , 11 ( 2 ): 204 - 212 .
ISO/IEC 14496-10,ITU-T Rec.H.264.Advanced video coding [S ] . 2003 .
HOROWITZ M , JOCH A , KOSSENTINI F , et al . H.264/AVC baseline profile decoder complexity analysis [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2003 , 13 ( 7 ): 704 - 716 .
HORNG S J , FARFOURA M E , FAN P Z , et al . A low cost fragile watermarking scheme in H.264/AVC compressed domain [J ] . Multimedia Tools and Applications , 2014 , 72 ( 3 ): 2469 - 2495 .
KIM T , PARK K , HONG Y.Video watermarking technique for H . 264/AVC [J ] . Optical Engineering , 2012 , 51 ( 4 ):047402.
LI Q , WANG R D , XU D W.Fragile video watermarking algorithm based on H . 264/AVC [J ] . Materials Research Innovations , 2013 , 17 : 94 - 100 .
XU D W , WANG R D.Watermarking in H . 264/AVC compressed domain using Exp-Golomb code words mapping [J ] . Optical Engineering , 2011 , 50 ( 9 ):097402.
CHEN T Y , CHEN T H , LIN Y T , et al . H.264 video authentication based on semi-fragile watermarking [A ] . International Conference on Intelligent Information Hiding and Multimedia Signal Processing [C ] . 2008 . 659 - 662 .
林志高 , 孙锬锋 , 蒋兴浩 . 基于 VLC 域的 H.264/AVC 视频流内容级认证水印算法 [J ] . 上海交通大学学报 , 2011 , 45 ( 10 ): 1531 - 1535 .
LIN Z G , SUN T F , JIANG X H.A content level watermarking scheme for H . 264/AVC video authentication in VLC domain [J ] . Journal of Shanghai Jiaotong University , 2011 , 45 ( 10 ): 1531 - 1535 .
王小静 , 杨高波 , 朱宁波 . 基于半脆弱水印的H.264/AVC视频流的内容级认证 [J ] . 通信学报 , 2009 , 30 ( 11 ): 71 - 78 .
WANG X J , YANG G B , ZHU N B.Content authentication of H . 264/AVC video stream based on semi-fragile watermarking [J ] . Journal on Communications , 2009 , 30 ( 11 ): 71 - 78 .
XU D W , WANG R D , WANG J C.A novel watermarking scheme for H . 264/AVC video authentication [J ] . Signal Processing:Image Communication , 2011 , 26 : 267 - 279 .
LIN C Y , CHANG S F . Semi-fragile watermarking for authentication JPEG visual content [A ] . Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents [C ] . 2000 . 140 - 151 .
LIN C Y , CHANG S F . Issues and solutions for authenticating MPEG video [A ] . Proceedings of the SPIE Security and Watermarking of Multimedia Contents [C ] . San Jose,CA , 1999 . 54 - 65 .
KIM D W , CHOI Y G , KIM H S , et al . The problems in digital water marking into intra-frames of H.264/AVC [J ] . Image and Vision Computing , 2010 , 28 : 1220 - 1228 .
SHAHID Z , CHAUMONT M , PUECH W.Considering the reconstruction loop for data hiding of intra-and inter-frames of H . 264/AVC [J ] . Signal Image and Video Processing , 2013 , 7 ( 1 ): 75 - 93 .
LIN E T , DELP E J . A review of fragile watermarkings [A ] . Proceedings of the ACM Multimedia and Security Workshop [C ] . Orlando , 1999 . 25 - 29 .
FRIDRICH J . Methods for tamper detection in digital images [A ] . Proceedings of the ACM Workshop on Multimedia and Security [C ] . Orlando , 1999 . 19 - 23 .
ZHANG J , HO A T S , QIU G , et al . Robust video watermarking of H.264/AVC [J ] . IEEE Transactions on Circuits and Systems-II:Express Briefs , 2007 , 54 ( 2 ): 205 - 209 .
HU J Q , HUANG J W , HUANG D R , et al . Image fragile watermarking based on fusion of multi-resolution tamper detection [J ] . Electronics Letters , 2002 , 38 ( 24 ): 1512 - 1513 .
王向阳 , 陈利科 . 一种新的自适应半脆弱水印算法 [J ] . 自动化学报 , 2007 , 33 ( 4 ): 361 - 366 .
WANG X Y , CHEN L K . A novel adaptive semi-fragile watermarking scheme based on image content [J ] . Acta Automatica Sinica , 2007 , 33 ( 4 ): 361 - 366 .
段贵多 , 赵希 , 李建平 , 等 . 一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究 [J ] . 电子学报 , 2010 , 38 ( 4 ): 842 - 847 .
DUAN G D , ZHAO X , LI J P , et al . A novel semi-fragile digital watermarking algorithm for image content authentication,localization and recovery [J ] . Acta Electronica Sinica , 2010 , 38 ( 4 ): 842 - 847 .
0
浏览量
788
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构