基于H.264的版权保护和内容认证数字视频水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,随着高清数字电视、视频点播等技术的迅速发展及多媒体共享网站的盛行,视频媒体正逐渐成为人们生活的重要组成部分。如何有效地对数字视频进行版权保护和内容认证,已成为当前多媒体安全领域研究的热点。视频数据量大,通常在存储和传输过程中需要压缩编码,H.264/AVC是当前市场最受欢迎的视频编解码标准,因此,研究基于H.264/AVC编解码标准的视频水印技术的需求极为迫切。
     本文针对当前基于H.264/AVC的视频水印算法的一些不足,结合H.264的压缩编码标准特性及人类视觉特性HVS(Human Visual System),重点研究了用于版权保护的视频鲁棒水印和用于内容认证的视频脆弱水印和半脆弱水印。具体的研究内容包括四个部分:基于纹理特征的差分能量视频水印算法、基于人眼可察觉变化步长-JND(Just noticeable difference)模型的鲁棒视频水印算法、基于内容特征的H.264实时可逆脆弱水印算法以及基于误差补偿策略的半脆弱水印算法,其中主要的工作和创新点如下:
     1.针对现有的一些基于H.264/AVC的视频水印算法只在宏块的1个系数上嵌入1比特水印,导致水印鲁棒性较差的问题,结合H.264压缩编码标准的特性,提出了一种新的基于纹理特征的差分能量视频水印算法。算法先对当前帧4×4块进行整数离散余弦变换,判断其是否是纹理块,再采用差分能量的方式自适应选择系数嵌入水印。所提的算法提高了水印的鲁棒性,能有效抵抗高斯噪声、低通滤波、重编码等常见的视频水印攻击。并且对视频质量和码率的影响较小。
     2.现有的基于8×8浮点DCT变换的JND模型不能直接应用于采用4×4整数变换的H.264/AVC视频水印算法中。首先分析了现有的基于4x4DCT变换的JND模型的不足,提出了一种新的更加精确的JND模型。由于并不是所有JND值大于量化值的整数DCT系数都适合嵌入水印,本文对水印的嵌入位置进行了研究,提出了在H.264/AVC编码过程中量化后的残差块DCT系数的直流和低频分量不适合嵌入水印的结论,并通过理论分析和实验说明了结论的合理性。为了增加水印的鲁棒性,根据不同频带的DCT系数,采用不同的水印嵌入和提取算法。所提算法的水印不仅满足不可见性和鲁棒性,嵌入容量也较高。
     3.已提出的基于H.264/AVC的视频脆弱水印算法大多数是不可逆的。分析了不可逆的原因,提出了一种基于内容特征的实时可逆脆弱水印算法。算法先计算当前宏块预测残差块量化的DCT系数的哈希值以生成认证码,再把认证码作为水印信息以可逆的方式嵌在下一个相邻宏块活性最大的4×4块的最后一个非零量化DCT系数中。在解码端,通过比较认证码和提取的水印信息进行视频数据完整性的认证和原始数据的还原。算法对视频质量和码率的影响较小,并且能对认证通过的视频数据进行还原和对认证失败的视频Ⅰ帧遭篡改区域进行有效的定位。
     4.为进一步提高半脆弱视频水印特征码的鲁棒性,通过消除特征码之间的相关性,提出了一种新的特征码生成算法。针对半脆弱水印要均匀嵌在视频图像帧中以实现准确定位篡改区域的要求,引入了一个最小失真选择函数,通过这个函数在残差4×4块中选择一个对视频质量和码率影响最小的DCT系数嵌入水印。和已有的算法相比,采用最小失真选择函数可以较显著地降低嵌入水印对视频质量和码率的影响,并且半脆弱水印对于可接受的“内容保持”类修改具有鲁棒性,而对“内容篡改”类修改具有敏感性,并且对恶意篡改能有效、准确地定位。
In recent years, with the rapid development of HD digital TV and VOD (video on demand) technology accompanied by the popularity of multimedia sharing site, video multimedia has gradually become a significant part in people's daily life. Thus, the efficient methods for copyright protection and content authentication of digital video have been research hotspots in academic field of multimedia security.Because of the large amount of data, video need to be compressed in the process of storing and transferring and H.264/AVC is the most popular encoding and decoding standard on market nowadays, which makes the demand for video watermarking based on H.264/AVC more and more urgent.
     Analysizing on the shortcomings of the existing video watermarking algorithms based on H.264/AVC and considering the properties of H.264/AVC and HVS (Human Visual System), this articlefocuses on video robust watermarking used for copyright protection and fragile watermarking and semi-fragile watermarking used for content authentication.The comprehend content of this research is consisted by energy-differential video watermarking algorithm based on textural features, video robust watermarking based on JND model, H.264real-time reversible fragile watermarking algorithm based on content features and semi-fragile watermarking algorithm based on error compensation strategy. And the main innovation points of this article could be concluded as following:
     Firstly, to solve the problem of robustness insufficiency of video watermarking based on H.264/AVC caused by only embedding lbit watermark in one coefficient of macro-block, this article put forward a new energy-differential video watermarking algorithm based on textural features by considering the properties of H.264compressing and encoding standard. The proposed algorithm firstly performs the4x4integer Discrete Cosine Transform on the current frame in purpose of identifying whether it is the texture block. Then the watermarking is embedded by adopting the way of differential energy for selecting the appropriate coefficients adaptively. The experimental result shows that the proposed algorithm has little impact on the video quality and bit-rate, moreover, its robustness can effectively resist the common attacks such as the gauss noise, low pass filter and re-coded performed on the video watermarking.
     Secondly, the existing JND models based on8x8floating point DCT transform can't be directly applied to video watermarking algorithms based on H.264/AVC because of which adopts the4x4integer transform. After analyzing on the shortcomings of the existing JND models based on the4×4integer transform, the article proposes a new and more accurate JND model. Since not all of the JND values of integer DCT coefficients which arelarger than the quantization are suitable for embedding watermarks, after researching the embedding position for watermarks, we come to a conclusion that the DC and low-frequency component of the DCT coefficients of the quantized residual blocksare not suitable for embedding watermarks, and the theoretical analysis and experimentsshow that our conclusion is reasonable. In order to improve the robustness of watermarking, we propose different watermarking embedding and extraction algorithmsaccording to the different frequency ranges of DCT coefficients. The proposed watermarking algorithm not only meetsthe imperceptibility and robustness requirement, but also has highembedding capacity.
     Thirdly, the majority of existing fragile video watermarking algorithms based on H.264/AVC are irreversible. We analyze the reasons and propose a real-time reversible fragile video watermarking based on content features. The proposed algorithm firstly performs the hash value of quantized DCT coefficients of predictive residue blocks in current macro-block, and then creates the authentication code. And after that, embed the code into the last nonzero quantized DCT coefficient in the most active4×4block of the next adjacent macro-block as watermark information in the reversible manner. The integrality authentication is carried out and the original data isrestoredint thethe decoding end by the comparison of the authentication code and the extracted watermark information. The experimental result shows that the proposed algorithm has little impact on the video quality and bit-rate, moreover, the original video can be recovered if the authentication is successful and the tampered area of I frame can be effectively located if the authentication fail.
     Fourthly, to further improve the robustness of the feature codes in semi-fragile video watermarking algorithm, we propose a new generation algorithm for feature codes by eliminating the correlation of them. In order to meet the requirement that the semi-fragile watermarks should be uniformly embedded into the video frames to locate the tampered region accurately, this paper introduces a minimal distortion selection function to select a DCT coefficientin the4×4block residualto embed watermark which has minimal impact on the video quality and bit rates.compared with existing algorithms, the proposed algorithm can significantly reduce impact on video quality and bit rate because of embedding the watermarking by adopting the minimum distortion selection function. Experimental results show that the scheme has robustness against the content-preserving manipulations and it is sensitive to malicious manipulations. What's more, the retrieved feature code and watermarking can detect and locate malicious manipulations.
引文
[1]数字水印技术及应用[M].科学出版社.北京,2004.
    [2]钮心忻.信息隐藏与数字水印[M].北京邮电大学出版社.北京,2004.
    [3]许甲甲,张卫明,俞能海等.一种基于秘密共享与运动矢量的视频水印算法.电子学报,40(1),2012:8-13.
    [4]Kwon SK, Tamhankar A, Rao KR. An overview of H.264/MPEG-4 part 10. Journal of Visual Communication and Image Representation,17(2),2003:186-216.
    [5]http://techcrunch.com/2010/05/19/webm-google-h-264/.
    [6]http://gigaom.com/2011/12/19/h264-80-percent-of-videos/.
    [7]Cox IJ, Miller ML, Bloom JA. Watermarking application and their properties. Proceedings of the International Conference on Information Technology, Las Vegas, 2000:62-69.
    [8]Mansouri A, Aznaveh AM, Torkamani F, et al. A low complexity video watermarking in H.264 compressed domain. IEEE Transactions on Information Forensics and Security.5(4),2010:649-657.
    [9]Deguillaume F, Csurka G, Pun T. Countermeasures for unintentional and intentional video watermarking attacks. Security and Watermarking of Multimedia Contents II, Processing of SPIE.3971,2000:346-357.
    [10]Hartung F, Su JK, Girod B. Spread spectrum watermarking:malicious attacks and counterattacks. Processing of SPIE,3657,1999:147-158.
    [11]Doerr G, Dugelay JL. A guide tour of video watermarking. Signal Processing:Image Commun.18,2003:263-282.
    [12]Kim DW, Choi YG, Kim HS, et al. The problems in digital water marking into intra-frames of H.264/AVC. Image and Vision Computing,28,2010:1220-1228.
    [13]Koz A, Alatan A. A. Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System. IEEE Transactions on Circuits and System for Video Technology.18(3),2008:326-337.
    [14]Sun ZW, Liu J, Sun JD, et al. A motion location based video watermarking scheme using ICA to extract dynamic frames. Neural Comput & Applic.18,2009:507-514.
    [15]Chen HY, Zhu Y.S, A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique. Multimed Tools Appl (2012). http://link.springer.com/article/ 0.1007%2Fs11042-012-1238-2#page-2
    [16]Shi YJ, Qi M, Yi YG, et al. Object based dual watermarking for video authentication, Optik-Int. J. Light Electron Opt, http://dx.doi.org/10.1016/j.ijleo.2012.11.078,2013.
    [17]Boland FM, Ruanaidh JJK, Dautzenberg C. Watermarking digital images for copyright protection. Processings of International Conference on Image Processing and its Applications, Edinburgh, UK,1995:326-330.
    [18]Preda RO, Vizireanu DN. A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement.43,2010:1720-1726.
    [19]Singh ThR, Singh KhM, Roy S. Video watermarking scheme based on visual cryptography and scene change detection. Int J Electron Commun (AEU) (2013), http://dx.doi.org/10.1016/j.aeue.2013.01.008
    [20]Faragallah OS. Efficent video watermarking based on singular value decomposition in the discrete wavelet transform domain. Int J Electron Commun (AEU),67, 2013:189-196.
    [21]Koch E, Rindfrey J, Zhao J. Copyright protection for multimedia data. Processings of the International Conference on Digital Media and Electronic Publishing. Leeds, UK,1994.
    [22]Huang HY, Yang CH, Hsu WH, A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation. IEEE Transactions on Information Forensics and Security.5(4),2010:625-637.
    [23]Chen SY, Leung H. Chaotic watermarking for video authentication in surveillance applications, IEEE Transactions on Circuits and System for Video Technology.18(5), 2008:704-709.
    [24]Liu Y, Zhao JY, A new video watermarking algorithm based on 1D DFT and radon transform. Signal Processing,90,2010:626-639.
    [25]Choi D, Do H, Choi H, et al. A blind MPEG-2 video watermarking robust to camcorder recording. Signal Processing,90,2010:1327-1332
    [26]Ye DP, Zou CF, Dai YW, et al. A new adaptive watermarking for real-time MPEG videos. Applied Mathematics and Computation.185(2),2007:907-918
    [27]Wang YL, Permain A. Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks:A Set of Approaches in DCT Domain. IEEE Transactions on image processing,15(6),2007:1536-1543.
    [28]Lee MJ, Im DH, Lee HY, et al.Real-time video watermarking system on the compressed domain for high-definition video contents:Practical issues. Digital Signal Processing,22,2012:190-198.
    [29]Hartung F, Eisert P, Girod B. Digital watermarking of MPEG-4 facial animation parameters. Comput.& Graphics,22(4),1998:425-435.
    [30]Jordan F, Kutter M, Ebrahimi T. Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. ISO/IEC JTC1/SC29/WG11/MPEG97/M2281,1997.
    [31]Zou D, Jeffrey AB. H.264 stream replacement watermarking with CABAC encoding. IEEE International Conference on Multimedia and Expo. Singapore,2010:117-121.
    [32]Nguyen C, Tay DBH, Guang D. A fast watermarking system for H.264/AVC video. IEEE Asia Pacific Conference on Circuits and Systems.2006:81-84.
    [33]Tian LH, Zheng NN, Xue JRA, et al. A CAVLC-based Blind Watermarking Method for H.264/AVC Compressed video. Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, Washington DC, USA,2008:1295-1299.
    [34]He YL, Yang GB, Zhu NB. A real-time dual watermarking algorithm of H.264/AVC video stream for video-on-demand service. International Journal of Electronics and Communications.66,2012:305-312.
    [35]Noorkami M, Mersereau RM. A framework for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Transactions on Information Forensics and Security.2(1),2007:14-23.
    [36]Wang DW, Huang SJ, Feng GR. Perceptual differential energy watermarking for H.264/AVC. Multimedia Tools and Applications.60(3),2012:537-550.
    [37]Nookami M, Mersereau RM. Digital waterarming in P-Frames with controlled video bit-rate increase. IEEE Transactions on Information Forensics and Security.3(3), 2008:441-445.
    [38]Mansouri A, Torkamani-Azar F, Aznaveh AM. Motion Consideration in H.264/AVC compressed video watermarking. PCM 2009, LNCS 5897,2009:877-886.
    [39]Chen WM, Lai CJ, Wang HC. H.264 video watermarking with secret image sharing. IET Image Process,5(4),2011:349-354.
    [40]Zhang LW, Zhu YS, Po LM. A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC. ICASSP 2010,2010:1758-1761.
    [41]Sakazawa S, Takishima Y, Nakajima Y. H.264 native video watermarking mothod. ISCAS 2006,2006:1439-1442.
    [42]Wu CH. Zheng Y, Ip WH, et al. A flexible H 264/AVC compressed video watermarking scheme using particle swarm optimization based dither modulation. Int. J. Electron. Commun.65,2011:27-36.
    [43]Wang P, Zhang ZD, Li L. A video watermarking scheme based on motion vectors and mode selection.2008 International Conference on Computer Science and Software Engineering,2008:233-237.
    [44]Mohaghegh N, Fatemi O. H.264 copyright protection with motion vector watermarking. ICALIP 2008,2008:1384-1389.
    [45]郑振东,王沛,陈胜.基于运动矢量区域特征的视频水印方案.中国图象图形学报,13(10),2008:1926-1929.
    [46]Walton S. Information authentication for a slippery new age. Dr Dobbs Journal, 20(4),1995:18-26.
    [47]Yeung M, Mintzer F. An invisible watermarking technique for image verifi-cation. Proceedings of IEEE international conference on image processing.1997:680-683.
    [48]Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging,11(2),2002:262-274.
    [49]Wong PW. A public Key watermark for image verification and authentication. Proceedings of IEEE international conference on image processing.1998:455-459.
    [50]Marvel LM, Hartwing GW, Boncelet JC. Compression compatible fragile and semi-fragile temper detection. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents. CAUSA.3971(12),2000.
    [51]Kundur D, Hatzinakos D. Digital watermarking for telltable temper-proofing and authentication. Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information.87(7),1999:1167-1180.
    [52]Mehmood N, Mushtaq M. A fragile watermarking scheme using predictioin modes for H.264/AVC content authentication. SICK 2012,2012:1014-1021.
    [53]Saadi KA, Bouridane A, Guessoum A. Combined fragile watermarking and digital signature for H.264/AVC video authentication. EUSIPCO 2009,2009:1799-1803.
    [54]Wang RD, Li Q, Zhu HL, Xu DW. Fragile watermarking scheme suitable for the authentication of H.264/AVC video content. Jounal of Information&Computational Science,9(13),2012:3693-3706.
    [55]杨高波,李俊杰,王小静,刘争艳.基于脆弱水印的H.264视频流完整性认证.湖南大学学报.36(6),2009:67-71.
    [56]Sun TF, Jiang XH, Lin ZG, et al. An H.264/AVC video watermarking scheme in VLC domain for content authentication.7(6),2010:30-36.
    [57]Dittmann J. Content-fragile watermarking for image authentication. Proceedings of SPIE Conference on Security and Watermakring of Multimedia Contents. San Jose. 4314,2001:175-184.
    [58]Lin CY, Chang SF. Semi-fragile watermarking for authentication JPEG visual content. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents.2000:140-151.
    [59]Radu OP. Semi-fragile watermarking for image authenticatin with sensitive tamper localization in the Wavelet domain. Measurement.46,2013:367-373.
    [60]Park JY, Lin JH, Kin GS, et al. Invertibale semi-fragile watermarking algorithm distinguishing MPEG-2 compressin from malicious manipulation. Proceedings of International Conference on Consumer Electronics. New York,2002:16-19.
    [61]曾骁,陈真勇等.用于内容认证的半脆弱可逆视频水印算法.中国图象图形学报.15(8),2010:1189-1195.
    [62]Chen TY, Chen TH, Lin YT et al. H.264 video authentication based on semi-fragile watermarking. International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2008:659-662.
    [63]林志高,孙锬锋,蒋兴浩.基于VLC域的H.264/AVC视频流内容级认证水印算法.上海交通大学学报.45(10),2011:1531-1535.
    [64]Wiegand T, Sullivan GJ, Bjontegaard G, et al. Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and System for Video Technology. 13(7),2003:560-576.
    [65]曹华,周敬利,余胜生,苏曙光.基于H.264低比特率视频流的半脆弱盲水印算法 实现.电子学报,34(1),2006:40-44.
    [66]Qiu G, Marziliano P, Ho ATS, et al. A hybrid watermarking scheme for H.264/AVC video. Proceedings of the 17th International Conference on Pattern Recognition. Cambridge, UK,2004,4:865-868.
    [67]Zhang J, Ho ATS, Qiu G, et al. Robust video watermarking of H.264/AVC. IEEE Transactions on Circuits and Systems-II:Express Briefs,54(2),2007:205-209.
    [68]Noorkami M, Mersereau RM. Compressed-domain video watermarking for H.264. 2005 International Conference on Image Processing (ICIP).1(5),2005:1229-1232.
    [69]Langelaarg C, Lagendijk RR. Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing.10(1),2001: 148-158.
    [70]Niu YQ, Kyan M, Krishnan S. A combined just noticeable distortion model-guide image watermarking. Signal, Image and Vision Processing,5(4),2011:517-526.
    [71]Den CJV, Lambrecht B, Kunt M. Characterization of human visual sensitivity for video imaging applications. Signal Processing,67,1998:255-269.
    [72]Naccari M, Pereira F. Advanced H.264/AVC-based perceptual video coding: architecture, tools, and assessment. IEEE Transactions on Circuits and System for Video Technology.19(3),2009:337-346.
    [73]Wu HR, Rao KR. Digital video image quality and perceptual coding. Boca Raton, CRC Press.2005.
    [74]Tong HY, Venetsanopoulos AN. A perceptual model for JPEG applications based on block classification, texture masking, and luminance masking. IEEE International Conference on Image Processing(ICIP'08), Chicago,1998:428-432.
    [75]冯林,李彦君,邵刚等.利用人眼视觉系统理论实现DCT域快速分形编码.计算机辅助设计与图形学学报.17(1),2005:67-73.
    [76]胡军全,黄继武,黄达人.一种基于HVS的图像易碎水印.电子学报.31(7),2003:1057-1061.
    [77]Chou CH, Li YC. A perceptually tuned subband image coder based on the measure of Just Noticeable Distortion profile. IEEE Transaction on Circuits and Systems for Video Technology.5(6),1995:467-476.
    [78]Chiu YJ, Berge T. A Software-Only Videocodec Using Pixelwise Conditional Differential Replenishment and Perceptual Enhancements. IEEE Transaction on Circuits and Systems for Video Technology.9(3),1999:438-450.
    [79]Yang XK, Lin WS, Lu Z, et al. Just-noticeable-distortion profile with nonlinear additivity model for perceptual masking in color images. IEEE International Conference on Acoustics, Speech, and Signal Processing. Hongkong,2003:609-612.
    [80]Lin A, Lin WS, Zhang F et al. Enhanced just noticeable differecnce estimation with image decomposition.17th IEEE International Conference on Image Processing. Hongkong,2010:317-320.
    [81]Wu JJ, Qi F, Shi GM. Self-similarity based structural regularity for just noticeable difference estimation. J. Vis. Commun. Image R.23,2012:845-852.
    [82]Ahumada AJ, Peterson HA. Luminance-model-based DCTquantization for color compression. Hum. Vision Visual Process. Digital Display III.1992:365-374.
    [83]Watson AB. DCT quantization matrices visually optimized for individual images. Proceeding of SPIE Int. Conf. Human Vision, Visual Processing and Digital Display. San Jose CA.1993:202-216.
    [84]Zhang XK, Lin WS, Xue P. Improved estimation for just noticeable visual distortion. Signal Process.85(4),2005:795-808.
    [85]Wei Z, Ngan KN. Spatial just noticeable distortion profile for image in DCT domain. Proceedings of IEEE International Conference on Multimedia and Expo. 2008:925-928.
    [86]Wei Z, Ngan KN. Spatial-temporal just noticeable distortion profile for grey scale image/video in DCT domain. IEEE Transactions on Circuits and System for Video Technology.19(3),2009:337-346.
    [87]Podilchuk CI, Zeng W. Image-adapive watermarking using visual models. Proceedings of the IEEE 16,1998:525-539.
    [88]Wolfgang RB, Podilchuk CI, Delp EJ. Perceptual watermarks for digital images and video. Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information.87,1999:1108-1126.
    [89]Ling HF, Lu ZD, Zou FH, et al. An energy modulated watermarking algorithm based on Watson perceptual model. J. Softw.17(5),2006:1124-1132.
    [90]Niu YQ, Kyan M, Ma L, et al. Visual saliency's modulatory effect on just noticeable distortion profile and its application in image watermarking. Signal Processing: Image Communication. Available online 21 August 2012.
    [91]Tsai HM, Chang LW. Highly imperceptible video watermarking with the Watson's DCT-based visual model. IEEE International Conference on Multimedia and Expo, 2004:1927-1930.
    [92]凌贺飞,邹复好,卢正鼎等.基于对数缩放的幅度调制水印算法研究.中国科学E辑:信息科学,37(2),2007:297-314.
    [93]Xu DW, Wang RD, Wang JC. Video watermarking based on spatio-temporal JND profile. IWDW 2008, LNCS 5450,2008:327-341.
    [94]Su PC, Wu CS, Chen IF, et al. A practical design of digital video watermarking in H.264/AVC for content authentication. Signal Processing:Image Communication. 26,2011:413-426.
    [95]Cox IJ, Kilian J, Leighton T, et, al. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing.6,1997:1673-1687.
    [96]Huang JW, Shi YQ, Shi Y. Embedding image watermarks in dc components. IEEE Transactions on Circuits and System for Video Technology.10(6),2000:974-979.
    [97]Xu DW, Wang RD, Wang JC. Blind digital watermarking of low bit-rate advanced H.264/AVC compressed video. IWDW 2009, LNCS 5703,2009:96-109.
    [98]Ali MA, Edirisinghe EA. Watermarking H.264/AVC by modifying DC coefficients. 2009 International Conference on CyberWorlds,2009:241-245.
    [99]Shahid Z, Chaumont M, Puech W. Spread spectrum-based watermarking for tardos code-based fingerprinting for H.264/AVC video. Processing of ICIP, 2010:2105-2108.
    [100]Gong X, Lu HM. Towards fast and robust watermarking scheme for H.264 video. Tenth IEEE International Symposium on Multimedia,2008:649-653.
    [101]唐建,温安平.基于预测残差能量优先级的H.264/AVC视频水印算法.CCPR'08, 2008:1-6.
    [102]Su PC, Li ML, Chen IF. A content-adaptive digital watermarking scheme in H.264/AVC compressed videos. IIH-MSP'08, Washington DC, USA,2008:849-852.
    [103]Shahid Z, Chaumont M, Puech W. Condering the reconstruction loop for data hiding of intra-and inter-frames of H.264/AVC. Signal, Image and Video Processing.7(1), 2013:75-93.
    [104]Vleeschouwer C D, Delaigle J F, Macq B. Invisibility and application functionalities in perceptual watermarking—an overview. Proceedings of IEEE,2002,90(1):64-77.
    [105]Barton JM. Method and apparatus for embedding authentication information within digital data. US. Patent.1997.
    [106]Honsinger CW, Jones P, Rabbani M, et al. Lossless recovery of an original image containing embedded data. US Patent:6278791,2001.
    [107]Fridrich J, Goljan M, Du R. Invertible authentication watermark for JPEG images. Proceedings of International Conference on Information Technology:Coding and Computing.2001:223-227.
    [108]Fridrich J. Lossless data embedding-new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing.2002:185-196.
    [109]Zhang X P, Wang S Z, Qian Z X, et al. Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Processing.2010,90(12):3026-3036.
    [110]Chen H, Chen Z Y, Zeng X, et al. A novel reversible semi-fragile watermarking algorithm of MPEG-4 video for content authentication. Proceedings of the Second International Symposium on Intelligent Information Technology Application, Shanghai,2008,3:37-41.
    [111]Wang N N, Men C G. Reversible fragile watermarking for 2-D vector map authentication with localization. Computer-Aided Design.2012,44(4):320-330.
    [112]Wang J T, Yang Y W, Chang Y T, et al. A high verification capacity reversible fragile watermarking scheme for 3D models. International Journal of Innovative Computing, Information and Control.2011,7(1):365-378.
    [113]Zhang J, Ho A T S. An efficient authentication method for H.264/AVC.2nd European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology, London,2005:157-164.
    [114]Wang C C, Hsu Y C. Fragile watermarking scheme for H.264 video authentication. Optical Engineering,49(2),2010:027003.
    [115]Xu D W, Wang R D. Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping. Optical Engineering,50(9),2011:097402.
    [116]王美华,裴庆祺,范科峰.基于脆弱水印的H.264视频完整性认证方案.西安电子科技大学学报,34(5),2007:823-827.
    [117]Profrock D, Richter H, Schlauweg M, et al. H.264/AVC video authentication using skipped macroblocks for an erasable watermark. Proceeding of SPIE Visual Communications and Image Processing. Beijing, China,2005:1480-1489.
    [118]Chung K L, Huang Y H, Chang P C, et al. Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. IEEE Transactions on Circuits and System for Video Technology,20(11),2010:1643-1647.
    [119]Lie W N, Lin T C, Tsai D C, et al. Error resilient coding based on reversible data embedding technique for H.264/AVC video. Proceedings of IEEE International Conference on Multimedia & Expo, ICME 2005, Amsterdam,2005:1174-1177.
    [120]Lin S D, Meng H C, Su Y L, A novel error resilience using reversible data embedding in H.264/AVC. International Conference on Information, Communications and Signal Processing, Singapore,2007:1-5.
    [121]Fridrich J, Goljan M, Du R. Invertible authentication watermark for JPEG images. IEEE International Conference on Information Technology:Coding and Computing (ITCC), Las Vegas,2001:223-227.
    [122]Huo W J, Zhu Y S. A reversible watermarking algorithm with error-drift elimination in H.264/AVC stream. Proceedings of International Conference on Consumer Electronics, Communications and Networks, Xianning,2011,4:2893-2896.
    [123]Lin Y C, Li J H. Reversible watermarking for H.264/AVC videos. International Scientific Research and Experimental Development. VII. International University Conference 2011, Paris,2011,78:828-831.
    [124]Liu Y X, Li Z T, Ma X J. Reversible data hiding scheme based on H.264/AVC without distortion drift. Journal of Software,2012,7(5):1059-1065.
    [125]刘红梅,黄继武,肖自美.一种小波变换域的自适应视频水印算法.电子学报,29(12),2001:1656-1660.
    [126]王小静,杨高波,朱宁波.基于半脆弱水印的H.264/AVC视频流的内容级认证.通信学报.30(11),2009:71-78.
    [127]Xu DW, Wang RD, Wang JC. A novel watermarking scheme for H.264/AVC video authentication. Signal Processing:Image Communication.26,2011:267-279.
    [128]Lin CY, Chang SF. Issues and solutions for authenticating MPEG video. Proceedings of the SPIE Security and Watermarking of Multimedia Contents.3657, San Jose CA.1999:54-65.
    [129]Dai YW, Thiemert S, Steinebach M. Feature-based watermarking scheme for MPEG-Ⅰ Ⅱ video authentication. Proceedings of the SPIE Security, Steganography, and Watermarking of Multimedia Contents.5036, California, USA,2004:325-335.
    [130]Lin ET, Delp EJ. A review of fragile watermarkings. Proceedings of the ACM Multimedia and Security Workshop. Orlando:ACM Press.1999:25-29.
    [131]Fridrich J, Methods for tamper detection in digital images. Proceedings of the ACM Workshop on Multimedia and Security. Orlando:ACM Press.1999:19-23.
    [132]王小静,杨高波,朱宁波.基于半脆弱水印的H.264/AVC视频流的内容级认证.通信学报.30(11),2009:71-78.
    [133]Hu JQ, Huang JW, Huang DR, et al. Image fragile watermarking based on fusion of multi-resolution tamper detection. Electronics Letters,38(24),2002:1512-1513.
    [134]王向阳,陈利科.一种新的自适应半脆弱水印算法.自动化学报,33(4),2007:361-366.
    [135]段贵多,赵希,李建平等.一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究.电子学报,38(4),2010:842-847.
    [136]Ma XJ, Li ZT, Tu H, et al. A Data Hiding Algorithm for H.264/AVC Video streams without intra-frame distortion drift. IEEE Transactions on Circuits and System for Video Technology.20(4),2010:1320-1330.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700