视频水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络技术与压缩技术的发展,人们可以方便快捷地复制和传输各种数字视频。如何对大量的数字视频进行有效的版权保护成为一个迫切需要解决的问题,视频数字水印技术为这一问题提供了一个有效的解决手段。本文对视频数字水印技术进行了研究,主要在以下几个方面取得了一些研究成果:
     提出了一种基于DCT-SVD域的原始视频数字水印算法。它利用视频场景分割技术将视频划分成一个个场景,在不同场景中嵌入不同的水印,从而使水印能够抵抗共谋攻击。在相同场景所有帧中嵌入相同的水印,通过冗余嵌入使水印对帧剪切具有鲁棒性。水印嵌入在各帧的DCT-SVD域,实验结果表明嵌入的水印不仅具有很好的不可感知性,而且对于低通滤波,中值滤波,高斯噪声以及H.264压缩具有良好的鲁棒性。水印的提取不需要原始视频信号,是一种盲水印算法;
     提出了一种在视频按照H.264标准进行压缩的同时嵌入水印的算法,其首先根据Ⅰ帧各个宏块的纹理特征以及所要嵌入水印的位数选择嵌入水印的宏块的位置以及水印扩频的倍数,将扩频后的水印序列嵌入在选择的宏块中。在宏块中嵌入水印时根据针对H.264压缩所特有的4×4DCT变换提出的人类视觉模型,选择合适位置的系数并且做适当的调整来嵌入水印。水印检测时只需要识别嵌入位置系数的符号即可以提取水印。实验证明,该算法兼顾了鲁棒性和透明性的要求,按照该算法嵌入的水印对重压缩,高斯噪声,椒盐噪声,高斯滤波攻击具有一定的鲁棒性。
With the development of compression technology and network technology, people can easily and quickly copy and transmit a variety of digital video, and its copyright protection has become an urgent need to address the issue of digital video watermarking technology that provides an effective means to resolve. In this paper, the digital video watermarking has been studied mainly in the following areas have achieved some results:
     A blind adaptive video watermarking algorithm based on DCT(disc-rete cosine transformation) and SVD (singular value decomposition) is proposed. The algorithm first partitions the video stream into several shots, And both the frames of the shots are transformed into DCT-SVD domain. the watermarking sequence is embedded into the largest singular value. Experiments showed the new algorithm meet the transparency requirements at the same time meet the requirements of a certain robustness, resistance to low-pass filtering, median filter, noise and H.264 compression, and Collusion, Cut-and-splice attacks.
     The paper also propose a algorithm to watermark in video while it is being compressed in accordance with the H.264 standard.First,we choose appropriate macroblocks to be watermarked and proper multiple used for spread spectrum in accordance with various macroblock texture features as well as the length of the watermark sequence.The algorithm embed the spread spectrum watermark sequence into the choosed macroblocks. In accordance with 4×4 DCT transform human vision model proposed specific for H.264 compression,we select a suitable coefficient of each macroblock and make appropriate adjustment to embed watermark. Watermark is extracted by identifying the symbol of the coefficients of the selected locations. Experimental results show that the algorithm takes care of robustness and transparency requirements. The robust watermark embedded has good immunity to some attacks such as the recompression, Gaussian noise, salt and pepper noise, Gaussian filtering an so on.
引文
[1]孙建德.抗时间同步攻击的数字视频水印方法研究:[博士学位论文].济南:山东大学信与信息系统,2005
    [2]Bender W,Gruhl D,Morimoto N,et al.Techniques for data hiding.IBM Systems Journal,1996,35(3-4):313-336
    [3]N.F.Johnson,S.Jajodia.Exploring Steganography:seeing the unseen.IEEE Transactions on Computer,1998,31(2):26-34
    [4]F.A.P.Petitcolas,R.J.Anderson,and M.G.Kuhn.Information Hiding-A Survey",in Proceeding IEEE,Special Issue on Identification and Protection of Multimedia Information,Vol.87,NO.7,July 1999:1062-1078
    [5]Cox J I,Kilian J,Leighton T F,et al.Spread Spectrum Watermarking for Multimedia[J].IEEE transactions on image processing,1997,6(12)
    [6]Su J.K,Hartung F,Girod B.Digital watermarking of text,image,and video documents[J].Computers&Graphics.1998,22(6):687-695
    [7]P Tsai,YC Hu,CC Chang.A color image watermarking scheme based on color quantization[J].Singal Processing.2004,84(1):95-106
    [8]Makur A,Sethu Selvi S.Variable dimension vector quantization based image watermarking[J].Singal Processing.2001,81(4):889-893
    [9]Cvejic N,Scppanen T.Spreadspectrum audio watermarking using frequency hopping and attack characterization[J].Singal Processi-ng.2004,84(1):207-213
    [10]Eggers J,Ihlenfeldt W,Girod B.Digital Watermarking of Chemical Structure Sets[C].In:Information Hiding:4th International Workshop,IHW 2001:200-214
    [11]Komatsu and H.Tominaga.Authentication System Using Concealed Images in Telematics,Memoirs of the School of Science and Engineering,Waseda University,1988.52:45-60,
    [12]Gwenael Doerr,Jean-Luc Dugelay.A Guide Tour of Video Watermarking [M].Signal Processing:Image Communication,2003,18:263-282
    [13]Ingemar Cox,Matthew Miller,Jeffrey Bloom,et al.Digital watermarking and steganography,Morgan Kaufmann,2008:16-32
    [14]Ruanaidh J.o,Petersen H,Herdgel A,et al.Cryptographic Copyright protection for digital images based on watermarking techniques[J].Theoretical Computer Science.1998,226(1-2):117-142
    [15]Kaller T,Depovere G,Haitsma J,et al.A video watermarking system for Broadcast monitoring[J].Proceedings of IS&T/SPIE/E125,Security and Watermarking of Multimedia Content.1999,3657:103-112
    [16]任传伦,李远征,杨义先.一种安全的指纹身份认证系统的设计[J].计算机工程与应用.2003(17):33-34
    [17]M.P.Queluz.Authentication of digital images and video:Generic models and a new contribution[J].Signal Processing:Image Communication.2001,16:461-475
    [18]J.A.Bloom,I.J.Cox,T.kaller,et al.Copy protection for DVD Video,Proceedings of the IEEE,1999,87(7):1267-1276
    [19]王炳锡,陈琦,邓峰森.数字水印技术.西安电子科技大学出版社,2003
    [20]刘连山,李人厚,高琦.视频水印技术综述.计算机辅助设计与图形学学报,2005,17(3):379-386
    [21]http://www.petitcolas.net/fabien/watermarking/stirmark/index.html
    [22]S.Pereia,S.Voloshnovkiy,M.Maribelet al.Seeond Generation Benchmarking and Application Oriented Evaluation,Berlin:Spinger-Verlag,2001,LNCS 2137:340-353
    [23]V.Solachidis,A.Tefas,N.Nikolaids,et al.A Benchmarking Protocol for Watermarking Methods,Proceedings of 2001 IEEE International Conference on Image Processing,2001:1023-1026
    [24]张江,赵黎,杨士强.视频水印技术综述[J].计算机应用.2005年04期:119-121
    [25]R.Anderson.Information Hiding,volume 1174 of Lecture Notes in Computer science.Berlin New York:Springer-Verlag,1996
    [26]谢荣生.盲检测图像数字水印技术研究[博士学位论文].哈尔滨:哈尔滨工程大学,2002
    [27]Hartung F,Girod B.Watermarking of uncompressed and compressed video[J].Signal Processing,Special Issue on Copyright Protection and Access Control for Multimedia Services,1998,66(3):283-301
    [28]P.P.Chan,M.R.Lyu.A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code,in Proc.ICICS,2003:202-213
    [29]Swanson M D,Zhu B,Tewfik A H.Multiresolution scene-based video watermarking using perceptual models.IEEE Journal on Selected Areas in Comminocations,1998,16(4):540-550
    [30]F.Degulliaume,G.Csukra,J.O'Ruanaidh,et al.Robust 3D DFT video watermarking.In Ping Wah Wong,Edward J.Delp,eds.Proceedings of SPIE, Security and Watermarking of Multimedia Contents.San Jose:SPIE,1999:113-124
    
    [31]Information Technology Coding of Audio-Visual Objects[S].Visual ISO/IEC 14496-2C Committee Draft May 1998
    
    [32]I.E.G.Richardson,H.264 and MPEG-4 Video Compression. New York :Wiley 2004
    [33]毕厚杰.新一代视频压缩标准——H.264/AVC,人民邮电出版社,2005
    
    [34]T.Wiegand,B.Girod. Lagrange multiple seleetion in hybrid video coder control[A].IEEE International Conferenee on Image Proeessing,Thessaloniki,Sep.2001
    
    [35]A.Joch,F.Kossentini,H.Schwarz et al. Performance comparison of video coding standards using Lagrangian coder conirol[A].Proc.IEEE Int.Conf Image Processing[C],2002,4:IV-3728-IV-3721
    
    [36]A.Hallapuro,M.Karczewicz,H.Malvar. Low Complexity Transform and Quantization-Part I:Basic Implementation,JVT document JVT-B038,Geneva,2002
    
    [37]D.Simitopoulos,S.A.Tsaftaris,N.V.Boulgouris,etal Compressed-Domain Video Watermarking of MPEG Streams.IEEE International Conference on Multimedia and ExPo,26-29 Aug.2002:569-572
    
    [38]T.Y.Chung et al.Digital Watermarking for copyright protection of MPEG-2 Compressed Video. IEEE Trans. Consumer Eleetronics,Aug.1998:895-901
    
    [39]W.Zeng,B.liu.A Statistical Watermarking Detection Technique Without Using OriginalImages for Resolving Rightful Ownerships Of DigitalImages.IEEE Transaction on Image Processing,Vol.8,No.11,Nov. 1999:1534-1548
    
    [40]M.Barni,F.Bartolini,N.Checcacci.Watermarking of MPEG-4 Video Objects.IEEE Transactions on Multimedia,Vol.7,No.1,Feb.2005:23-32
    
    [41]Ta-Te Lu,Wei-Lun Hsu,Pao-Chi Chang.Blind Video Watermarking for H.264.Canadian Conference on Electrical and Computer Engineering,2006:2353-2356
    
    [42]A.Golikeri, P.Nasiopoulos,Z.J.Wang. An improved scalar quantization-based digital video watermarking scheme for H.264/AVC. Proceedings . IEEE International Symposium on Circuits and Systems,2006:81-84
    [43]J.Zhang, A.T.S .Ho. Robust Digital Image-in-video Watermarking for the Emerging H.264/AVC Standard, IEEE 2005 Workshop on Signal Processing Systems (SIPS'05), Athens, Greece, November 2-4,2005:657-662
    
    [44] G. Qiu, P. Marzilian, A.T.S. Ho, et al. A Hybrid Watermarking Scheme for H.264 Video.Proceedings of the 17th International Conference on Pattern Recognition, ICPR, vol. 4, Aug.2004:865-868
    
    [45]Lu C S,Chen J R ,Liao Mark H Y et al. Real-time MPEG-2 video watermarking in the VLC domain [A]. In Proceedings of the 16th International Conference on Pattern Recognition,Quebec,Canada,2002:552-555
    
    [46]G.C.Langelaar,R.L.Lagendijk,J.Biemond. Real-time labeling of MPEG2 compressed video[J]. J.of Visual Comm. and Image Representation. 1998, 9(4):256-270
    
    [47]G.C.Langelaar,R.L.Lagendijk.Optimal differential energy watemarking of DCT encoded images and video[J]. IEEE Transaction on Image Proeessing,2001.10(1):148-158
    
    [48]Hartung F, Eisert P,Girod B. Digital watermarking of MPEG-4 facial animation parameters [J]. Computer & Graphics ,1998 ,22 (3): 425-435
    
    [49]M. Noorkami,R. M. Mersereau. Compressed-domain video watermarking for H.264.IEEE International Conference on Image Processing, 2005. Volume 2, .2005:II-890-3
    
    [50]Dekun Zou, Jeffrey A. Bloom. H.264/AVC stream replacement technique for video watermarking.IEEE International Conference on Acoustics,Speech and Signal Processing, Las Vegas, NV, USA 2008:1749-1752
    
    [51]Cong-Van Nguyen,David B.H.Tay,Guang Deng. A Fast Watermarking System for H.264/AVC Video.IEEE Asia Pacific Conference on Circuits and Systems,2006:81-84
    
    [52]Zhang HX,Qiu PL.Application of Shuffling Techniques within Watermarking. Journal of Circuits and Systems, 2001,6(3):32-36
    
    [53]Zou JC, Tie XY. Arnold transformation of digital image with two dimensions and its periodicity. Journal of North China University of Technology, 2000,12(1): 10-14
    
    [54]Zhou B, Chen J. A geometric distortion resilient image watermarking algorithm based on SVD[J].Chinese Journal of Image and Graphics, 2004, 9:506-512
    [55]W Kong,B Yang,D Wu,et al.SVD Based Blind Video Watermarking Algorithm.Innovative Computing,Information and Control,2006.ICICIC apos.06First International Conference on Volume 1,Issue,30-01 Aug.2006 Page(s):265-268
    [56]季白杨,陈纯,钱英.视频分割技术的发展[J]计算机研究与发展,2001,38(1):36-42
    [57]BaiLin Hao.Staring with parabolas:An introduction to chaotic dynamics [M].Shanghai:Shanghai Scientificand Technological Education Publishing House,1993
    [58]A.B.Watson.DCT Quantization Matrices Optimized for Individual Images,Human Vision,Visual Processing,and Digital Display,1993,SPIE-1913:202-216
    [59]Maneli Noorkami,Russell M.Mersereau.A Framework for Robust Watermarking of H.264-Encoded Video with controllable detection performance,IEEE Transactions on Information Forensics and Security,2007 2(1):14-23

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700