H.264/AVC视频完整性认证关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,数字信号处理技术和宽带网络设施的飞速发展,使得数字内容的制造和分发越来越便利。曾经只有专业水准才能完成的数字图像/视频的编辑工作,如今可以借助很多便宜甚至免费的软、硬件轻松完成。这种便利无疑为大多数内容用户带来方便和实惠,但也会产生一系列问题。首先,在不影响合法用户享受数字多媒体的前提下,对诸如数字音乐,电影和书籍等多媒体内容进行版权保护,成为了一项新的课题,亟待研究。其次是内容认证方面,由于多媒体数据的易编辑特性,使得人们对它的真实性产生质疑,特别是当这些数据用作呈堂证供的时候。此外,为了保护公民财产安全,很多公共场合都安装监控摄像机。为了方便存储和传输,越来越多的监控摄像机采用数字格式存储视频。监控系统的视觉数据无疑是很重要的,并且他们的真实性需要得到保证,这样数字视频才能够无可置疑地作为可靠和有效的证据使用。因此,编码传输过程中鲁棒、高效的视频认证及篡改修复机制的研究成为信息安全领域的热点问题。
     针对上述诸多问题,本课题重点在H.264/AVC编码标准的基础上,结合视频序列的时间特性与编码特性,设计高效、鲁棒,水印容量可调的认证算法,对H.264编解码过程中的码长、码率等指标的影响降低到最小,同时进行篡改检测、定位机制与篡改恢复机制的研究,形成一套完善的视频认证系统。主要研究成果包括:
     1、基于残差块量化分层系数模型与“十字区域”运动矢量相结合的H.264鲁棒水印算法。
     视觉质量是水印算法性能最直观的衡量标准,为了提高算法的视觉质量,通常需要对图像进行复杂度分析。在压缩编码传输过程中的视频水印算法,比图像水印算法增加了时间维度的信息,即大量的帧间信息。简单的图像复杂度分析不再适用于视频水印算法。本课题着力针对亮度、纹理、空间信息综合考虑的视频复杂度分析,通过调制帧内目标宏块的残差量化分层系数与帧间宏块“十字区域”的运动矢量来共同完成标识信息的嵌入,有效缓解视频质量与水印算法鲁棒性之间的矛盾。
     2、基于零系数备用空间与帧间预测模式相结合的H.264容量多级提升的信息隐藏算法。
     水印容量是衡量水印算法性能的另一重要标准,扩大水印容量对于传统的水印算法而言,势必会使视频质量下降,如何在水印容量与视频质量之间进行取舍是水印算法的关键问题。本课题将这方面作深入研究,帧内编码部分利用DCT变换、量化后残差块的若干零系数构造备用空间用来存储标识水印信息;在帧间编码部分利用H.264帧间可变长码(VLC)的无差值补偿特性,引入信息变长分组概念,在帧间预测模式部分隐藏标识水印信息,本文将帧内帧间两部分相结合设计一种安全的水印容量可多级提升的视频信息隐藏算法,有效改善视频质量与水印容量之间的矛盾。
     3、基于数字水印技术的H.264主动目标识别算法。
     智能视频监控系统包括运动目标分割、目标识别以及目标跟踪等环节的研究。其中目标识别主要是在运动目标分割、提取的基础上,对每个目标(监控范围内有多个目标)提取其自身的不变特征,做出标记,以绘制出各目标的运动轨迹,是智能视频监控的主要内容。本文提出基于水印的主动目标识别概念,在H.264标准上,当前帧中进行运动目标检测并分割,在重构帧的运动目标中嵌入不同的水印,重构图像将在下一帧用于预测,这样水印信息被传递到下一帧,在下一帧与中通过提取参考帧运动目标预测值中的水印信息即可有效地实现目标识别,随后继续在下一帧的重构帧中嵌入水印,循环处理,直至完成整段视频的运动目标识别。
     4、H.264视频完整性认证系统及篡改恢复机制研究。
     视频完整性认证系统应当包括认证码的提取、标识信息的嵌入,篡改检测及定位几个过程,视频序列比图像信息更复杂,不能简单的采用图像hash值提取的方法提取视频认证码。本课题提出空间能量波动分析方法,针对不同特征的视频帧,有针对性的采用改进的SQ与VQ量化方法,有效提取出视频认证码,并结合改进的前文中H.264鲁棒水印算法与H.264大容量信息隐藏算法,构成H.264视频完整性认证系统,并进行篡改修复策略的研究,在一定程度上修复篡改操作。
In recent years, digital signal processing technology and broadband network infrastructure havedeveloped rapidly, which makes the manufacture and distribution of digital content more and moreconvenient. In the past only the professionals could edit the multimedia files, the work that can beaccomplished easily by some cheap or even free software and hardware nowadays. The change ofsituation brings convenience and benefits to most of the content users undoubtedly, however, somepotential problems come into being. First of all, a new issue is to exert: how to carry out copyrightprotection for digital multimedia contents (eg, digital music, movies and books) without affectinglegitimate users’ normal operation? Secondly, concerning the content authentication, the authenticityof multimedia data will be questioned due to its easily editing feature, especially when those data areused as sworn evidence in court. In addition, many surveillance cameras are installed in publicplaces to protect the civil property. In order to facilitate storage and transmission, digital videoformat is applied in more and more surveillance cameras. Visual data of guaranteed authenticity insurveillance system, with which digital video can be served as reliable and valid evidence, which isvery important. Therefore, research on robust coding transmission, efficient video authentication andtamper recover mechanism becomes a hot issue in the field of information security.
     In response to problems mentioned above, this paper based on the H.264/AVC coding standard,mainly focus on designing an efficient, robust and adjustable watermark capacity authenticationalgorithm on the combination of time and coding characters of video sequences. The algorithmminimizes the influence on the parameter indicators such as bit-length and bit-rate in the H.264coding process. At the same time, researches on the tamper detection mechanism and tamperrecovery mechanism form a set of video authentication system. The main achievements are listed asfollows.
     First of all, a novel robust watermarking algorithm is proposed, based on the quantized layeredcoefficients of the residual macroblock and the motion vectors in the “crossing region”.
     Visual quality is the most intuitive standard measurement of watermarking algorithmperformance. In order to improve the visual quality of watermarking algorithm, image complexityanalysis is always necessary. Compared with the image watermarking algorithm, videowatermarking algorithm in the coding and transmission includes the information of time dimension,namely a large number of inter-frame information. Simple analysis of image complexity no longerapplies to video watermarking. The study emphasizes on the video complexity analysis composed ofbrightness, texture, spatial information, and embedding watermarking by modulating the quantized layered coefficients of intra residual macroblock and motion vectors in the “crossing region” of theinter-frame macroblock. The algorithm effectively alleviates the conflict between video quality androbustness of video watermarking algorithm.
     Secondly, the H.264video information hiding algorithm with adjustable watermarking capacityis proposed, based on spare space formed by zero-value DCT coefficients and inter prediction mode,.
     Watermarking capacity is another standard measurement of watermarking algorithmperformance. To the traditional algorithm, expanding the quantity of watermark embedded willdegrade the visual quality. Thus the key issue of watermarking algorithm lies in the trade-offbetween watermark capacity and video quality. The further research launches in this area. During theintra-frame coding, quantized zero-value DCT coefficients of residual marcoblock are utilized toform a spare space, information hiding is achieved by modifying one zero-value DCT coefficients ofspare space. In the course of inter-prediction, we introduce the concept of information variablelength group and achieve information hiding by using no difference compensation characteristics ofthe H.264inter-frame variable length coding. These two courses are composed to form H.264videoinformation hiding algorithm with adjustable watermarking capacity, improving the conflict betweenwatermarking capacity and visual quality of video watermarking algorithm.
     Thirdly, H.264active object recognition is proposed based on digital watermarking.
     Intelligent video surveillance system includes the study on moving object segmentation, objectrecognition, object tracking and so on. Among these, based on the results of object segmentation,object recognition is the main content of intelligent video surveillance system, which extracts theinvariant features of each object, making a mark to draw each one’s trajectory. In this dissertation,we proposed the concept of active object recognition based on digital watermarking. On the H.264coding standard, we detect the moving objects and segment them. Then we embed differentwatermarks in different objects in the reconstructed frame, which is used as the reference frame forprediction in next frame, thus, the watermarks are transmitted to the next frame. Object recognitionis realized by extracting the watermarks from the objects in the reference frame of the next frame,and embedding the watermarks in objects in the reconstructed image of the next frame, doing thisprocess circularly until completing the whole moving object identification.
     Finally, H.264/AVC video integrity authentication system is proposed and the research ontamper recovery mechanism is carried.
     Video integrity authentication system includes the processes of authentication code extraction,identification information embedding, tamper detection and localization. Video is more complicatedthan image, so that the image hash extraction method is not suitable to extract video authenticationcode. The analysis method of spatial energy fluctuation is proposed, aiming to improve the SQ orVQ quantitative methods to extract the video authentication codes effectively from video frames with different characteristics. Then we constitute H.264video integrity authentication system whichconsists of improved robust watermarking algorithm and information hiding algorithm with largecapacity aforementioned. At last, the research carried on tamper recovery mechanism to recover thetamper area in a certain degree.
引文
[1] Wei-Hung Lin, Shi-Jinn Horng, Tzong-Wann Kao, et al. Image copyright protection withforward error correction [J]. Expert Systems with Applications,2009.36(9): p.11888-11894.
    [2]刘虹.数字视频版权保护与内容认证的基本理论及关键技术研究[D].武汉理工大学,2008.
    [3]段贵多.针对版权保护和内容认证的图像数字水印研究[D].电子科技大学,2009.
    [4] Radu O. Preda, Dragos N. Vizireanu. A robust digital watermarking scheme for videocopyright protection in the wavelet domain[J]. Measurement,2010.43(10): p.1720-1726.
    [5] Emina ao lu, M., E. U ar,. Eren, The positive outcomes of information security awarenesstraining in companies-A case study[J]. Information Security Technical Report,2009.14(4): p.223-229.
    [6] Da Veiga, A., J.H.P. Eloff. A framework and assessment instrument for information securityculture [J]. Computers& Security,2010.29(2): p.196-207.
    [7]付钰,吴晓平,叶清等.基于模糊集与熵权理论的信息系统安全风险评估研究[J].电子学报,2010,(7):1489-1494.
    [8]李赵红.基于数字水印的图像认证技术及其关键问题研究[D].北京交通大学,2008
    [9] Chin-Chen Chang, Pei-Yu Lin. Adaptive watermark mechanism for rightful ownershipprotection [J].Journal of Systems and Software,Volume81,Issue7,July2008,Pages1118-1129.
    [10] Tien-You Lee, Shinfeng D. Lin.Dual watermark for image tamper detection and recovery [J].Pattern Recognition, Volume41, Issue11, November2008, Pages3497-3506.
    [11] Ming-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang. Dual-wrapped digital watermarkingscheme for image copyright [J].Computers&Security,Volume26,Issue4,June2007,Pages319-330.
    [12] Chin-Chen Chang, Pei-Yu Lin, Jieh-Shan Yeh.Preserving robustness and removability fordigital watermarks using subsampling and difference correlation [J]. Information Sciences,Volume179, Issue13,13June2009, Pages2283-2293
    [13] Dengpan Ye, Changfu Zou, Yuewei Dai. et al. A new adaptive watermarking for real-timeMPEG videos [J]. Applied Mathematics and Computation, Volume185, Issue2,15February2007, Pages907-918
    [14] Wei-Bo Wang, Guo-Qin Zheng, Jun-Hai Yong.et al. A numerically stable fragile watermarkingscheme for authenticating3D models [J]. Computer-Aided Design, Volume40, Issue5, May2008, Pages634-645
    [15] Jian Wang, Ron Healy, Joe Timon. A robust audio watermarking scheme based on reducedsingular value decomposition and distortion removal [J]. Signal Processing, Volume91, Issue8, August2011, Pages1693-1708.
    [16] Sourour Karmani, Ridha Djemal, Rached Tourki. Efficient hardware architecture of2D-scan-based wavelet watermarking for image and video [J]. Computer Standards&Interfaces, Volume31, Issue4, June2009, Pages801-811.
    [17] Hao Yin, Feng Qiu, Chuang Lin, et al. A novel key-embedded scheme for secure videomulticast systems [J]. Computers&Electrical Engineering, Volume32, Issue5, September2006, Pages376-393.
    [18] Lei-da LI, Bao-long GUO, Lei GUO. Rotation, scaling and translation invariant imagewatermarking using feature points [J]. The Journal of China Universities of Posts andTelecommunications, Volume15, Issue2, June2008, Pages82-87.
    [19] Min-Jeong Lee, Dong-Hyuck Im, Hae-Yeoun Lee, et a1. Real-time video watermarkingsystem on the compressed domain for high-definition video contents: Practical issues [J].Digital Signal Processing, In Press, Corrected Proof, Available online30August2011.
    [20] Radu O. Preda, Dragos N. Vizireanu. A robust digital watermarking scheme for videocopyright protection in the wavelet domain [J]. Measurement, Volume43, Issue10, December2010, Pages1720-1726.
    [21] Yan Liu, Jiying Zhao. A new video watermarking algorithm based on1D DFT and Radontransform [J]. Signal Processing, Volume90, Issue2, February2010, Pages626-639.
    [22] Suk-Hwan Lee, Ki-Ryong Kwon. A watermarking for3D mesh using the patch CEGIs [J].Digital Signal Processing, Volume17, Issue2, March2007, Pages396-413.
    [23] Dooseop Choi, Hoseok Do, Hyuk Choi, Taejeong Kim. A blind MPEG-2video watermarkingrobust to camcorder recording [J]. Signal Processing, Volume90, Issue4, April2010, Pages1327-1332.
    [24] Saraju P. Mohanty, Elias Kougianos. Real-time perceptual watermarking architectures forvideo broadcasting [C]. Journal of Systems and Software, Volume84, Issue5, May2011,Pages724-738.
    [25] Jing Zhang, Ho, A.T.S. Robust digital image-in-video watermarking for the emergingH.264/AVC standard [C]. Signal Processing Systems Design and Implementation,2005.IEEEWorkshop on2-4Nov.2005:657-662.
    [26]曹亮.基于H.264编码的视频加密与视频水印研究[D].西安理工大学,2009.
    [27] Dengpan Ye, Changfu Zou, Yuewei Dai,et al. A new adaptive watermarking for real-timeMPEG videos [J]. Applied Mathematics and Computation, Volume185, Issue2,15February2007, Pages907-918.
    [28] K. Tanaka, Y Nakamura, K. Matsui. Embedding secret information into dithered multilevelimage[C].Proceeding of1990IEEE Milltary Communication Conference,1990,2l0-216.
    [29] Hartung F., Girod B.. Digital watermarking of raw and compressed video.in: Proceedings ofSPIE Digital Compression Technologies and Systems for Video Communications. Berlin,Germany: SPIE,1996.205-213.
    [30] Liu H M, Chen N, Huang X L, et a1. A robust DWT-based video watermarking algorithm[A].In:IEEE International Symposium on Circuits and System. Scottsale, Arizona,2002,631-634.
    [31] Hartung F,Girod B.Watermarking of uncompressed and compressed video[J]. SignalProcessing. Special Issue on Copyright Protection and Access Control for MultimediaServices,1998,66(3):283-301.
    [32] Deguillaume F, Csurka G, Ruanaidh J. O, et a1. Robust3D DFT video watermarking[A]. In:Ping Wag Wong, Edward J Delp. Sectwity and Watermarking of Multimedia Contents[C].Proceedings of SPIE. Vol.1999,3657:113-124.
    [33] Swanson M D, Zhu B, et a1. Multiresolution scene-based video watermarking usingperceptual models[J]. IEEE Journal on Selected Areas in Communications.1998,l6(4):540-550.
    [34] Hartung F, Girod B. Digital watermarking of MPEG-2coded video in the bitstreamdomain[A].Proceeding of International Conference on Acoustics,and signal Processing[C],Munich,l997,4:2621-2624.
    [35] G. C. Langelaar, R. L.Lagendijk,J. Biemond.Real-time labeling of MPEG-2compressedvideo[J]. J.of Visual Comm. And Image Representation.1998,9(4):256-270.
    [36] G. C. Langelaar, R. L.Lagendijk.Optimal differential energy watermarking of DCT encodedimages and video[J]. IEEE Trans.on Image Processing,2001,10(1):148-158.
    [37] Jordan, F., Ebrahimi, T., Kunt,M. View-dependent texture coding using the MPEG-4videocoding scheme[C]. Proceedings of the1998IEEE International Symposium on Circuits andSystems,ISCAS’98. Volume5,31May-3June,1998:498-501.
    [38] Nicolas, H., Jordan, F. Interactive optimization and massively parallel implementations ofvideo compression algorithms[C]. Proceedings of International Conference On ImageProcessing, Volume l,16.19Sept.1996:229-232.
    [39] Zhang J, Li J G, Zhang L. Video watermarking technique in motion vector[A]. XIV BrazilianSymposium on Computer Graphics and Image Processing, Flodan polls, Brazil,2001,179-182.
    [40]朱仲杰,蒋刚毅,郁梅等.基于运动矢量的视频图像数字水印算法[J].电路与系统学报,2002,7(3):58-61.
    [41] Hartung F, Eisert P, Girod B. Digital watermarking of MPEG-4facial animation parameters [J].Computer&Graphics,1998,22(3):425-435.
    [42] Linnartz JP MG Talstra J C. MPEG Pty-marks: cheap detection of embedded copyright data inDVD-video[A].In:Computer Security-ESORICS98,5th European symposium on Reasearchin Computer Security[C], Louvain-la-Neuve, Belgium,1998, Lecture Notes in ComputerScience,V01.1485,221-240.
    [43] Z Li, Q Sun, Y Lian, et al. Joint source channel authentication resource allocation and unequalauthenticity protection for multimedia over wireless networks[J]. IEEE Transactions onMultimedia,2007,9(4):837-850.
    [44] Q Sun, D He, Q Tian. A secure and robust authentication scheme for video transcoding.[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(10):1232-1244.
    [45] S Thiemert, H Sahbi, M Steinebach. Using entropy for image and video authenticationwatermarks[C] Security and Watermarking of Multimedia Contents VIII.[sl]: SPIE,2006:470-479.
    [46]雷红雨,戴跃伟,王执铨.一种可定位攻击区域的高容量MPEG视频认证方案[J].南京理工大学学报:自然科学版,2008,32(1):55-59.
    [47] Chuen-Ching Wang, Yih-Chuan Lin. An automated system for monitoring the visual qualityand authenticity of satellite video streams using a fragile watermarking approach [J]. DigitalSignal Processing, Volume20, Issue3, May2010, Pages780-792.
    [48] Santi P. Maity, Malay K. Kundu, Seba Maity. Dual purpose FWT domain spread spectrumimage watermarking in real time [J]. Computers&Electrical Engineering, Volume35, Issue2,March2009, Pages415-433.
    [49] Pan-Pan Niu, Xiang-Yang Wang, Yi-Ping Yang,et al. A novel color image watermarkingscheme in nonsampled contourlet-domain [J]. Expert Systems with Applications, Volume38,Issue3, March2011, Pages2081-2098.
    [50] G. Frideman. The trustworthy digital camera: Restoring credibility to the photographicimage[C].IEEE Trans. Consum. Electron., vol.39, no.4,pp.905-910, Nov.1993.
    [51] C. Y. Lin, S. F. Chang. Semi-fragile watermarking for authenticating JPEG visualcontent[C].in Proc. SPIE Int. Conf. Security Watermarking Multimedia Contents II, Jan.2000.
    [52] A. Pramateftakis, T. Oelbaum, K. Diepold. Authentication of MPEG-4-based surveillancevideo[C]. in Proc. IEEE Int. Conf. Image Process.(ICIP), Oct.2004, vol.1, pp.33-37.
    [53] C. W. Wu. On the design content-based multimedia authentication systems[C]. IEEE Trans.Multimedia, vol.4, no.9, pp.385-393, Sep.2002.
    [54] C. Y. Lin, S. F. Chang.Issues and solutions for authenticating MPEG video[C].in Proc. SPIEInt. Conf. Security Watermarking Multimedia Contents, Jan.1999.
    [55] S. Walton. Information authentication for a slippery new age[C]. Dr Dobbs J., vol.20,pp.18-26, Apr.1995.
    [56] P. Wong. A public key watermark for image verification and authentication[C].in Proc.IEEEInt. Conf. Image Process.(ICIP), Oct.1998, vol.1, pp.455-459.
    [57] M. Yeung, F. Mintzer. An invisible watermarking technique for image verification [C]. in Proc.IEEE Int. Conf. Image Process.(ICIP), vol.1. Santa Barbara, CA, Oct.1997, pp.680-683.
    [58] R. Du, J. Fridrich. Lossless authentication of MPEG-2video[C]. in Proc. IEEE Int. Conf.Image Process.,2002, vol.2, pp.893-896.
    [59] K. Maeno, Q. Sun, S.-F. Chang, et al. New semi-fragile image authentication watermarkingtechniques using radom bias and nonuniform quantization [C]. IEEE Trans. Multimedia, vol.8,no.2.Feb.2006, pp.32-45.
    [60] S. Chen, H. Leung. Chaotic watermarking for video authenticationin surveillanceapplications[C].IEEE Trans.Circuits Syst.Video Technol,vol.18, no.5,May2008. pp.704-709.
    [61] C. Fei, D. Kundur, R. H. Kwong. Analysis and design of secure watermark-basedauthentication systems[C].IEEE Trans.Inf. Forensics Secur.vol.1, no.1, pp.43-55, Mar.2006.
    [62]王美华,裴庆祺,范科峰.基于脆弱水印的H.264视频完整性认证方案[J].西安电子科技大学学报,2007,34(5):823-826.
    [63] D Pr frock, H Richter, M Schlauweg, et al. H.264/AVC video authentication using skippedmacroblocks for an erasable watermark[J]. SPIE,2005, l(1):59-60.
    [64] J Zhang and ATS Ho.“An efficient authentication method for H.264AVC”[J]. Semantics andDigital Media Technology,2005,30(1):157-164.
    [65]田玲.视频编码率失真特性及帧编码复杂度模型研究[D].电子科技大学,2010.
    [66]李康顺,金晶,王峰,.基于片类型和帧间预测的H.264去块滤波新算法[J].计算机应用研究,2011,(7):2761-2764,2781.
    [67]丁媛媛. H.264/AVC视频编码关键技术的研究[D].吉林大学,2009.
    [68]张淑芳.基于H.264的视频编码快速算法及复杂度—失真模型研究[D].天津大学,2007.
    [69]李晓妮,陈贺新,孙元等.基于H.264的嵌入式音视频同步编码技术[J].吉林大学学报(工学版),2011,(5):1475-1479.
    [70]于志宏.视频安全与网络安全若干问题研究[D].吉林大学,2009.
    [71]毕厚杰.新一代视频压缩编码标准——H.264/AVC [M].人民邮电出版社.2005.05:98-99.
    [72]王宝亮.基于H.264的多视点立体视频关键技术研究[D].天津大学,2010.
    [73]郑兆青.用于H.264视频编码的运动估计VLSI结构研究[D].华中科技大学,2007
    [74] Soon-kak Kwon, A. Tamhankar, K.R. Rao.Overview of H.264/MPEG-4part10[J].Journal ofVisual Communication and Image Representation,Volume17,Issue2,April2006,Pages186-216.
    [75] Szu-Wei Lee, C.-C. Jay Kuo. Novel H.264/AVC entropy coding mode decision [J]. Journal ofVisual Communication and Image Representation,Volume22,Issue6,August2011,Pages557-562.
    [76] Seung-Hwan Kim, Jin Heo, Yo-Sung Ho. Efficient entropy coding scheme for H.264/AVClossless video coding [J]. Signal Processing: Image Communication, Volume25, Issue9,October2010, Pages687-696.
    [77]柳辉.可伸缩性视频编码的转码及其应用[D].中国科学技术大学,2009.
    [78]郑振东,王沛, and李莉,基于运动矢量域与DCT域的混合视频水印方案.中国图象图形学报,2009(12): p.2631-2634.
    [79]曹华.基于H.264低比特率视频流的半脆弱盲水印算法实现.电子学报,2006(01): p.40-44.
    [80]周海涛,周诠,马伟等.一种压缩域低灰度平滑块数字水印方案[J].西安交通大学学报,2008,(4):404-408.
    [81]方春,张翠芳,王宏霞等.基于整数DCT变换的新水印算法[J].中国图象图形学报,2008,(9):1694-1700.
    [82] Hefei Ling, Liyun Wang, Fuhao Zou,et al. Robust video watermarking based on affineinvariant regions in the compressed domain [J].Signal Processing,2011,91(8):1863-1875.
    [83]王小静,杨高波,朱宁波.基于半脆弱水印的H.264/AVC视频流的内容级认证[J].通信学报,2009,(11):71-78.
    [84]魏志成,戴居丰,杨闽.基于改进遗传算法的自适应图像扩频水印[J].天津大学学报,2007,(5)563-568.
    [85]刘达,胡波.一种基于DCT的静态图像水印改进算法[J].电路与系统学报,2004,(3):72-75.
    [86] Jing-Ming Guo, Chia-Hao Chang. Prediction-based watermarking schemes using ahead/postAC prediction [J]. Signal Processing,2010,90(8):2552-2566
    [87]张冬明.复杂度可分级的视频编码技术研究[D].中国科学院研究生院.2006.
    [88] Chien-Chuan, K.,Y. Bo-Zhi. An Integrated Technique for Video Watermarking. Computer andInformation Science,2007.ICIS2007.6th IEEE/ACIS International Conference on.2007:37-42.
    [89]李智,陈孝威.基于熵模型的高透明性自适应视频水印算法[J].软件学报,2010(7):1692-1703.
    [90] Christian Collberg, Andrew Huntwork, Edward Carter.More on graph theoretic softwarewatermarks: Implementation, analysis, and attacks [J].Information and Software Technology,Volume51, Issue1, January2009, Pages56-67.
    [91] Leida Li, Xiaoping Yuan, Zhaolin Lu.Rotation invariant watermark embedding based onscale-adapted characteristic regions [J].Information Sciences, Volume180, Issue15,1August2010, Pages2875-2888.
    [92] Xianyong Wu, Zhi-Hong Guan.A novel digital watermark algorithm based on chaotic maps[J].Physics Letters A, Volume365, Issues5-6,11June2007, Pages403-406.
    [93]曾高荣,裘正定,章春娥.失真补偿量化索引调制水印的性能分析[J].电子与信息学报,201032(1):86-91.
    [94]刘连山,李人厚.基于离散余弦变换直流分量的盲视频水印方案[J].西安交通大学学报.2006.40(4):402-405
    [95]霍菲菲,高新波.基于三维小波变换的视频水印嵌入与盲提取算法[J].电子与信息学报.200729(2):447-450.
    [96]肖尚勤.鲁棒数字水印算法研究[D].华中科技大学.2008.
    [97]徐长勇,平西建,刘翠卿.安全的MPEG压缩视频数字隐写算法[J].中国图象图形学报A,2009.14(11):2237-2246.
    [98] Chen Tian-hang, Liu Shao-hui, Yao Hang·xun, et a1.Spatial video watermarking based onstability of DC coefficients [A].In: Yeung DS(eds):Lecture Notes in Artificial Intelligence3930[C], Berlin, German: Springer-Verlag.2006:1033-1042.
    [99] Lancini R, Mapelli F, Tubaro S.A robust video watermarking technique in the spatial domain
    [A].In: Proceedings of International Symposium OH Video/Image Processing and MultimediaCommunications[C], Zadaz, Croatia,2002:251-256.
    [100] Chae J J, Manjunath B S. Data hiding in video [A]. In: Proceedings of InternationalConference on Image Processing[C], Kobe, Japan.1999,1:311-315.
    [101] Simitopoulos D, Tsaftaris S A, Bouigouris N V, et a1. Compressed domain videowatermarking of MPEG streams [A]. In: Proceedings of International Conference onMultimedia and Expo[C], Lausanne, Switzerland,2002:569-572.
    [102] Liu Hong-mei, Shao Feng-lian, Huang Ji-wu. A MPEG-2video watermarking algorithm withcompensation in bit stream [A]. In: Safavi-Naini R. Yung M(eds): Lecture Notes in ComputerScience3919[C], Berlin, German: Springer-VerLag,2006:123-134.
    [103] Dawen Xu, Rangding Wang, Jicheng Wang. A novel watermarking scheme for H.264/AVCvideo authentication [J]. Signal Processing: Image Communication, Volume26, Issue6, July2011, Pages267-279.
    [104]张立和,杨成,孔祥维.基于运动矢量统计的同步视频水印算法[J].光电子·激光200718(2):236-240.
    [105]胡洋,张春田,苏育挺.基于H.264/AVC的视频信息隐藏算法[J].电子学报,2008.36(4):690-694.
    [106] Yang Gao-bo, Li Jun-jie, He Ying-liang, et a1. An information hiding algorithm based onintra-prediction modes and matrix coding for H.264/AVC video stream [J]. AEU-InternationalJournal of Electronics and Communications, In Press,Corrected Proof, Available online18May2010.
    [107]周巍,史浩山,段哲民, et al. H.264的帧间/帧内预测模式快速选择算法[J].西北工业大学学报,2008.26(1):47-52.
    [108]王让定,朱洪留,徐达文, et al.基于编码模式的H.264/AVC视频信息隐藏算法[J].光电工程,2010.37(5):144-150.
    [109] S.K. Kapotas, E.E. Varsaki, A.N. Skodras. Data Hiding in H.264Encoded Video Sequences
    [A]. In Multimedia Signal Processing,2007. MMSP2007. IEEE9th Workshop on[C].2007:373-376
    [110] Hai-ping HUANG, Ru-chuan WANG, Li-juan SUN, et al. Research on tasks schedule and datatransmission of video sensor networks based on intelligent agents and intelligent algorithms[J]. The Journal of China Universities of Posts and Telecommunications, Volume16, Issue6,December2009, Pages84-91
    [111]李鹏飞,陈朝武,李晓峰.智能视频算法评估综述[J].计算机辅助设计与图形学学报,2010,(2):352-360.
    [112] Chris Poppe, Sarah De Bruyne, Tom Paridaens, et al. Moving object detection in theH.264/AVC compressed domain for video surveillance applications [J]. Journal of VisualCommunication and Image Representation, Volume20, Issue6, August2009, Pages428-437.
    [113] Georgios Kordelas, Petros Daras. Viewpoint independent object recognition in clutteredscenes exploiting ray-triangle intersection and SIFT algorithms [J]. Pattern Recognition,Volume43, Issue11, November2010, Pages3833-3845.
    [114] Zhenjun Han, Qixiang Ye, Jianbin Jiao. Combined feature evaluation for adaptive visualobject tracking [J]. Computer Vision and Image Understanding, Volume115, Issue1, January2011, Pages69-80.
    [115]贾云得,机器视觉[M],科学出版社,2000:235-244
    [116] Robert T. Collins, Alan J.Lipton, et al. A System for Video Surveillance and Monitoring.Carnegie Mellon University,2000.
    [117] Haritao glu I, Harwood.D, et al. W4:Real-Time surveillance of People and Their Acticities,IEEE Transactions on Pattern Analysis and Machine Intelligence,2000,22(8):809-830.
    [118]林洪文,涂丹,李国辉.基于统计背景模型的运动目标检测方法[J],计算机工程,2003,29(16):97-99
    [119] A.Murat Tekalp, Digital video processing[M],Tsinghua University Press,1998
    [120] Horn B, Schunch B, Detemining optical flow, Artificial Intelligence,1981,17:185-203
    [121]唐英干,关新平.基于二维相关性的图像分割及快速递推算法[J].铁道学报.2007.29(5):60-63.
    [122]赵钦佩,姚莉秀,程建等.基于颜色信息与区域生长的图像分割新算法[J].上海交通大学学报200741(5):802-806,812
    [123]吕雁,冯大政.融合Ratio边缘信息的水平集SAR图像分割方法[J].西安电子科技大学学报(自然科学版)201037(3):492-495.
    [124] Jan Flusser. On the inverse problem of rotation moment invariants[J], Pattern Recognition,2002,35:3015-3017
    [125]童卓,李霆.基于遗传算法的图像不变矩匹配[J],计算机工程与科学,2002.24(3):14-17
    [126]杨小冈,付光远,缪栋.基于图像NMI特征的目标识别新方法[J],计算机工程,2002,6:79-82
    [127]门蓬涛,张秀彬,张峰等.基于NMI特征的运动目标识别与跟踪[J],微计算机信息,2004.20(3):24-26
    [128]门蓬涛,张秀彬,张峰等.图像特征识别方法研究[J],微计算机信息,2004.20(5):103-105
    [129] James V. Stone. Object recognition: view-specificity and motion-specificity [J]. VisionResearch, Volume39, Issue24, December1999, Pages4032-4044.
    [130]李宁,须德,傅晓英等.结合人体运动特征的行为识别[J].北京交通大学学报,2009,(2):5-10,16.
    [131]杨晓超,周越,张一等.基于增强步态能量图和Gabor特征的辨别共同向量身份识别[J].上海交通大学学报,2008,(12):1888-1892.
    [132] Babak Taati, Michael Greenspan. Local shape descriptor selection for object recognition inrange data[J]. Computer Vision and Image Understanding, Volume115, Issue5, May2011,Pages681-694.
    [133] Victor H. Diaz-Ramirez. Constrained composite filter for intraclass distortion invariant objectrecognition. Optics and Lasers in Engineering, Volume48, Issue12, December2010, Pages1153-1160
    [134] H. W. Tang, V. Srinivasan, S. H. Ong. Invariant object recognition using a neural templateclassifier[J]. Image and Vision Computing, Volume14, Issue7, July1996, Pages473-483.
    [135]张锐,洪峻,明峰.基于目标CSAR回波模型的SAR自动目标识别算法[J].电子与信息学报,2011,(1):27-32.
    [136]高勇,何刚,张晓晖.基于不变矩和禁忌搜索算法的图像识别方法[J].系统工程与电子技术,2010,(4):851-853.
    [137] Feng Zhang, Shang-qian Liu, Da-bao Wang, et al. Aircraft recognition in infrared image usingwavelet moment invariants[J]. Image and Vision Computing, Volume27, Issue4,3March2009, Pages313-318.
    [138] Veerabhadrappa, Lalitha Rangarajan. Diagonal and secondary diagonal locality preservingprojection for object recognition[J]. Neurocomputing, Volume73, Issues16-18, October2010,Pages3328-3333
    [139]郝志成,朱明.智能目标检测与跟踪系统的设计与实现[J].光电工程,2007,(1):27-31,45.
    [140]连晓峰,张弢,刘载文.一种改进的运动人体目标检测方法研究[J],计算机仿真,2011.28(2):308-311
    [141]焦波,李国辉,涂丹等.一种用于运动目标检测的快速收敛混合高斯模型[J]中国图象图形学报A.200813(11):2139-2143
    [142]李翠芸,姬红兵. Rao-Blackwellized粒子滤波的红外多个弱目标检测前跟踪[J]光学精密工程.200917(9):2342-2349
    [143] Nicolas Thome, Djamel Merad, Serge Miguet. Learning articulated appearance models fortracking humans: A spectral graph matching approach[J]. Signal Processing: ImageCommunication, Volume23, Issue10, November2008, Pages769-787
    [144] Bangjun Lei, Li-Qun Xu. Real-time outdoor video surveillance with robust foregroundextraction and object tracking via multi-state transition management[J]. Pattern RecognitionLetters, Volume27, Issue15, November2006, Pages1816-1825
    [145]张海英,温玄,张田文.低信噪比多目标检测的贪心算法[J].计算机学报200831(1):142-150
    [146]齐美彬,魏星,蒋建国.基于三角核估计模型的运动目标检测方法[J].合肥工业大学学报(自然科学版)200629(4):389-402
    [147] JinMin Choi, Yung Jun Yoo, Jin Young Choi. Adaptive shadow estimator for removing shadowof moving object[J]. Computer Vision and Image Understanding, Volume114, Issue9,September2010, Pages1017-1029
    [148] Roland Perko, Ale Leonardis. A framework for visual-context-aware object detection in stillimages[J]. Computer Vision and Image Understanding, Volume114, Issue6, June2010, Pages700-711
    [149] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Boston, MA:Kluwer Academic Publishers,1992.
    [150] I. Katsavounidis, C.-C. Kuo, and Z. Zhang, A new initialization technique for generalizedLloyd iteration,” IEEE Signal Process. Lett., vol.1, no.10, pp.144-146, Oct.1994.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700