鲁棒视频水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
视频水印处理技术潜在的应用领域非常广,如数字视频点播系统、DVD版权保护和卫星数字视频传输等等。但目前视频水印技术尚未得到充分的研究,还有很多技术问题没有得到很好的解决,这给研究工作带来了机遇和挑战。
     对许多视频水印算法来说,一旦失去了含水印视频序列空间上的同步关系,就很难提取水印信息。视频序列作为一系列静止图像的集合,会遭受一些特定种类的攻击(如帧平均、帧去除、帧插入、帧重组、帧速率转换等),另外在保证视频水印算法实时性的同时,如何抵抗几何失真问题,提出一个鲁棒的视频水印是一个急需要解决的重大难题;如果在压缩视频码流中嵌入水印,很显然应该与视频的压缩编码标准相结合,现有的标准视频编码格式层出不穷,和新兴的视频标准结合的视频水印技术的急需被引入;另外,视频水印算法在应用中经常有实时或接近实时的需求,实时的、鲁棒的、大容量的视频水印将是研究的重点。
     针对抗几何攻击的数字水印方面,基于特征的局部水印方法,利用ScaleSal检测出的显著区域来同步水印,提出了一种抗几何攻击的局部数字水印算法。此外,还提出了一种抗几何攻击的基于图像内容的水印方案。水印重复嵌入到了基于鲁棒特征点的多个圆形区域,这样就可以抗裁减攻击。每个圆形区域都进行一次PM和二维DFT变换,以此获得RST不变的幅度谱。采用EMW算法修改DFT幅度谱来嵌入每一个水印位。根据所提供的试验结果,可以说该方案在水印的视觉质量影响方面有非常优异的效果。它可以同时抵抗图像裁减和RST攻击。另外,其计算开销相对FMW而言减少较多,从而可以应用于视频水印应用中。
     在与新兴标准结合,提出与之相结合的视频水印的方面,提出一种基于AVS的数字水印算法(AVS-BW)。通过将两个区域间再嵌入一个水印比特位,实现了两个区域嵌入三个水印比特位,使得水印容量扩大了50%,并且提出了具有自适应性的级差截断索引,增强了水印的鲁棒性。还提出了在AVS中,无需要重新对视频编码,移除高频系数的方法。在文章的最后,给出算法在水印容量、视觉失真和鲁棒性等方面的实验结果。根据这些实验结果,可以得出改进算法在水印容量、视觉失真和鲁棒性三方面上都比DNW算法好。
     通过对数幅度调制方式,实现了一种具有低复杂性、高鲁棒性及安全性的水印算法。算法通过对系数的幅度值进行对数缩放,使得水印算法的鲁棒性由所有被选系数决定,而不是只受具有较大值的系数的影响,从而提高水印算法的鲁棒性和安全性。在水印容量方面,实现在512×512图像或视频帧中嵌入512个比特,基本能满足视频水印应用在水印容量方面的需求。实时性方面,水印嵌入用时为视频正常播放用时的1/6,水印检测用时为正常播放用时的1/12,完全满足视频水印的实时性需求。
Video Watermarking will be widely used in lots of application areas, such as Video On Demand(VOD), Digital Versatile Disk(DVD) copyright protection, Satellite Digital Video transmission and so on.But the technology of video watermarking hasn't been developed enough.There are still lots of problems to be solved which brings chances and challenges for study.
     As to many video watermarking algorithms, it's hard to extract watermark once lose the synchronized relations between frames of video. As a series of stationaries pictures set, video sequence may be faced with some specific attacks (such as Frame average, Frame removement, Frame inserting, Frame reconstruct and so on). Besides, to present an rubost realtime watermark algorithm with the ability to resist geometric attacks is the most important problem to be solved. If embeded in the compression video bit streams, the watermark should be compounded with the compression standard. However, the advanced video compression standard emerges one after another incessantly, and lots of new technologies were brought into the standard. An alogrithm based on these new standards needs to be proposed. Finally, large capacity video watermarking is also needed in lots of applications.
     Based on the invariant regions in the image, a localized image watermarking algorithm against geometrical attacks is proposed. Salient regions detected by Saliency detector are used to synchronize the watermark. How to use the salient regions to construct the invariant regions to attain the translation, scaling and rotation invariance and how to select the embedding regions out of the invariant regions are key problems to be resolved in our paper. The watermark is first geometrically transformed to match the shape of each embedding region and then imperceptibly embedded into corresponding embedding regions. The watermark detection process is blindly done based on the normalized correlation.
     Another geometrically robust watermarking scheme was proposed based on image local content, which could resist both image cropping and RST attacks and can be used in video because of the low computation quantity. It first extracts the robust feature points, and then partitions the image into multi circular area. Each area is transformed into PM sub-images, then 2-D DFT is performed and the magnitudes are used as the watermark-embedding domain. Finally the watermark is embedded by modifying the DFT magnitudes using energy modulation. Comparing with Fourier-Mellin transform-based watermarking, its computational cost is reduced as only one 2-D DFT is performed. Moreover, the method can overcome the interpolation problem by using PM in the spatial domain because images have a similar scale between neighboring pixels.
     Based on the Chinese video compression standard AVS, a new watermark algorithm named AVS-BW is proposed. By embedding an additional watermark bit between two regions and using three differential embedding cut-off indexes, the watermark capacity and robustness are successfully improved. And a new method is also proposed in this paper to remove the high frequency components in AVS video sequence.
     A real-time watermarking scheme with high robustness and security has been proposed based on modulating the log-scaling magnitudes of DCT coefficients, which is most suitable for JPEG images and MPEG streams. The watermark bit is encoded as the sign of the difference between the individual log-scaling magnitude of a group-region and the average one of all group-regions. The log-scaling magnitude can be modulated by modifying the low and middle frequency DCT coefficients imperceptibly. The robustness of scheme is not only dependent on those largest coefficients, but also on the other coefficients with the same proportion. It can embed 512 bits into an image with a size of 512×512, which can satisfy the payload requirement of most video watermarking applications. Moreover, the watermark embedding process only requires one-sixth of the time consumed during normal playing of video, and the watermark detection only requires one-twelfth of that, which can meet the real-time requirements of most video watermarking applications.
引文
[1] D. Kundur, Multiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals. 1999, Graduate Department of Electrical and Computer Engineering, University of Toronto: Canada: 1-11
    [2] Van Schyndel, R. G., Tirkel, A. Z., Osborne, C. F. A digital watermark. in Image Processing ICIP-94, 1994
    [3] Zhu, J. M. and F. Duan, Research on the method for SOFT TEMPEST based on digital watermark, in Istm/2003: 5th International Symposium on Test and Measurement, Vols 1-6, Conference Proceedings, T. D. Wen, Editor, 2003: 1985-1988
    [4] Li, F. M., et al., Researches on the platform of network manufacture products electronic trading based on-fair exchange protocol and digital watermark, in 2003 Ieee Intelligent Transportation Systems Proceedings, Vols. 1 & 2, 2003: 1715-1718
    [5] Chen, G. H., G. B. Horng, and T. H. Chen, A robust copyright_protection (Digital watermark) scheme based on neural network, in 7th World Multiconference on Systemics, Cybernetics and Informatics, Vol Xv, Proceedings - Communication, Control, Signal and Optics, Technologies and Applications, N. Callaos, et al., Editors, 2003: 345-349
    [6] Lubin, J., J. A. Bloom, and C. Hui, Robust, content-dependent, high-fidelity watermark for tracking in digital cinema, in Security and Watermarking of Multimedia Contents V, E. J. Delp and P. W. Wong, Editors, 2003: 536-545
    [7] Garcia, E. and J. L. Dugelay, Watermark recovery from 2D views of a 3D video object, in Security and Watermarking of Multimedia Contents V, E. J. Delp and P. W. Wong, Editors, 2003: 471-480
    [8] Wang, H., et al., Adaptive audio digital watermark algorithm based on M-sequence modulation, in 2004 7th International Conference on Signal Processing Proceedings, Vols 1-3, 2004: 2401-2404
    [9] Lv, J. M., J. Q. Luo, and X. H. Yuan, Digital watermark technique based onspeech signal, in 2004 3rd International Conference on Computational Electromagnetics and Its Applications, Proceedings, B. Q. Gao and X. W. Xu, Editors, 2004: 541-544
    [10] Thiemert, S., et al., A high-capacity block based video watermark, in Proceedings of the 30th Euromicro Conference, R. Steinmetz and A. Mauthe, Editors, 2004: 457-460
    [11] Kim, S. J., et al., A new digital video watermarking using the dual watermark images and 3D DWT, in Tencon 2004 - 2004 Ieee Region 10 Conference, Vols a-D, Proceedings - Analog and Digital Techniques in Electrical Engineering, 2004: A291-A294
    [12] Xiao, L., et al., Perceptual digital watermark of images using ridgelet transform, in Proceedings of the 2004 Internatinal Conference on Machine Learning and Cybernetics, Vols 1-7, 2004: 3937-3942
    [13] Huang, P. W., A. W. Peng, and P. L. Lin, VQ attack resilient and tamper proofing digital watermark for image authentication and recovery, in Cisst '04: Proceedings of the International Conference on Imaging Science, Systems, and Technology, H. R. Arabnia, Editor, 2004: 289-293
    [14] Profrock, D., et al., H. 264/AVC video authentication using skipped macroblocks for an erasable watermark, in Visual Communications and Image Processing 2005, Pts 1-4, S: Li, et al., Editors, 2005: 1480-1489
    [15] Feng, D. C., Z. X. Yang, and Y. H. He, An adaptive digital watermark algorithm based on fast wavelet transform, in Proceedings of the First International Symposium on Test Automation & Instrumentation, Vols 1 - 3, J. Qi and J: Cui, Editors, 2006: 31-35
    [16] Yin, H., Z. Q. Chen, and Z. Z. Yuan, Multimedia digital watermarking detection system based on watermark mobile agent, in Icicic 2006: First International Conference on Innovative Computing, Information and Control, Vol 3, Proceedings, J. S. Pan, P. Shi, and Y. Zhao, Editors, 2006: 475-478
    [17] Kang, I. K., et al., Real-time watermark embedding for high resolution video watermarking, in Advances in Information and Computer Security, Proceedings, H. Yoshiura, et al., Editors, 2006: 227-238
    [18] Then, P. H. H. and Y. C. Wang, Support Vector Machine as digital image watermark detector - art. no. 60641K, in Image Processing: Algorithms and Systems, Neural Networks, and Machine Learning, E. R. Dougherty, et al., Editors, 2006: K641-K641
    [19] Hauer, E., T. Bolke, and M. Steinebach, Framework for combined video frame synchronization and watermark detection - art. no. 65051F, in Security, Steganography, and Watermarking of Multimedia Contents Ix, E. J. Delp and P. W. Wong, Editors, 2007: F5051-F5051
    [20] LJ. Cox,M. L. Miller,J. Bloom, Digital watermarking. 2002, Morgan Kaufmann
    [21] J., Z., et al., An Improved Second Generation Digital Image Watermarking Scheme. Mathematics of Data/Image Coding,Compression,and Encryption VI,with Applications, 2004. 5208: 218-223
    [22] Chang, C. C., J. Y. Hsiao, and P. W. Lu, An image refining method using digital watermark via vector quantization, in 11th International Conference on Parallel and Distributed Systems Workshops, Vol Ii, Proceedings, J. Ma and L. T. Yang, Editors, 2005: 585-589
    [23] Zhang, W., et al., A novel digital watermark algorithm based on chaos, image iteration and wavelet transform, in Wavelet Analysis and Active Media Technology Vols 1-3, J: Li, et al., Editors, 2005: 119-127
    [24] Echizen, I., et al., Real-time video watermark embedding system using software on personal computer, in International Conference on Systems, Man and Cybernetics, Vol 1-4, Proceedings, 2005: 3369-3373
    [25] Ling, H., Z. Lu, and F. Zou, Turbo-based DNW Algorithm for Compressed Video in VLC Domain. Wuhan University Journal of Natural Sciences, 2005, 10(1): 297-302
    [26] Hauer, E. and M. Steinebach, Robust digital watermark solution for intercoded frames of MIPEG video data, in Security, Steganography, and Watermarking of Multimedia Contents Vii, E. J. Delp and P. W. Wong, Editors, 2005: 381-390
    [27] Wu, G. Z., Y. J. Wang, and W. H. Hsu, Robust watermark embedding/detection algorithm for H. 264 video. Journal of Electronic Imaging, 2005, 14(1)
    [28] Mandal, P., A. Thakral, and S. Verma, Watermark based digital rights management, in Itcc 2005: International Conference on Information Technology: Coding and Computing, Vol 1, H. Selvaraj and P. K. Srimani, Editors, 2005: 74-78
    [29] Yang, S. M., et al., A digital watermark based on blind signal separation algorithm, in 2006 8th International Conference on Signal Processing, Vols 1-4, B. Z. Yuan, Q. Q. Ruan, and X. F. Tang, Editors, 2006: 2542-2545
    [30]王炳锡,陈琦,邓峰森,数字水印技术.西安:西安电子科技大学出版社, 2003
    [31] Nishio, M., et al., Development of a digital watermark method suitable for medical images with error correction. Radiology, 2002, 225: 187-187
    [32] Li, Q. Y., et al., Digital watermark, in Wavelet Analysis and Its Applications, J: Li, et al., Editors, 2003: 992-997
    [33] Tung, C. L., et al., Architecture of digital watermark making and tampering detection system without the original image, in Proceedings of the First International Conference on Information and Management Sciences, K: Song, X. D. Zhao, and B. D. Liu, Editors, 2002: 21-32
    [34] Sung, K. S., et al., Digital watermark system based on improved security through pre-processing of watermarked data using information of image discrete frequency, in Fourth International Conference on Software Engineering Research, Management and Applications, Proceedings, D. K. Baik, et al., Editors, 2006: 276-280
    [35] Lin, Y. R., H. Y. Huang, and W. H. Hsu, An embedded watermark technique in video for copyright protection, in 18th International Conference on Pattern Recognition, Vol 4, Proceedings, Y. Y. Tang, et al., Editors, 2006: 795-798
    [36] Hauer, E. and S. Thiemert, Synchronization techniques to detect MPEG video frames for watermark retrieval, in Security, Steganography, and Watermarking of Multimedia Contents Vi, E. J. Delp and P. W. Wong, Editors, 2004: 315-324
    [37] Yang, F. Z., et al., A no-reference video quality assessment method based on digital watermark, in Pimrc 2003: 14th Ieee 2003 International Symposium on Personal, Indoor and Mobile Radio Communications Proceedings, Vols 1-3 2003, K. Gong and Z. H. Niu, Editors, 2003: 2707-2710
    [38] Cheng, H. and M. A. Isnardi, Spatial temporal and histogram video registration for digital watermark detection, in 2003 International Conference on Image Processing, Vol 2, Proceedings, 2003: 735-738
    [39] Pranata, S., Y. L. Guan, and H. C. Chua, BER formulation for the blind retrieval of MPEG video watermark, in Digital Watermarking, F. A: Petitcolas and H. J. Kim, Editors, 2002: 91-104
    [40] Jia, H. D. and Y. F. Pu, Application and numerical implementation of fractional calculus to digital watermark, in 2006 8th International Conference on Signal Processing, Vols 1-4, B. Z. Yuan, Q. Q. Ruan, and X. F. Tang, Editors, 2006: 1261-1264
    [41] Wang, H., et al., Anti-cropping synchronization audio digital watermark algorithm based on watermark sequence number, in 2006 8th International Conference on Signal Processing, Vols 1-4, B. Z. Yuan, Q. Q. Ruan, and X. F. Tang, Editors, 2006: 2571-2574
    [42] Kim, H. C. and E. J. Delp, Reliability engineering approach to digital watermark evaluation - art. no. 041107. Journal of Electronic Imaging, 2006, 15(4): 41107-41107
    [43] Yang, S. M., et al., A dual secure digital image watermark algorithm using wavelet fractaland chaotic sequence, in Dcabes 2006 Proceedings, Vols 1and 2, X. Wenbo, Editor, 2006: 369-372
    [44] Wei, P. C., et al., A novel blind digital watermark algorithm based on neural network and chaotic map, in Neural Information Processing, Pt 3, Proceedings, I. King, et al., Editors, 2006: 243-250
    [45] Onishi, J. and T. Ono, A study of detection method of printed image alteration using digital watermark, in Advances in Information and Computer Security, Proceedings, H. Yoshiura, et al., Editors, 2006: 212-226
    [46] Yin, D. H., et al., An adaptive algorithm for digital watermark fusion with high anti-compression capability, in Wavelet Active Media Technology and Information Processing, Vol 1 and 2, J: Li, et al., Editors, 2006: 194-199
    [47] Hou, X. Y., A blind algorithm of digital watermark in wavelet domain based on neural network, in Wavelet Active Media Technology and Information Processing,Vol 1 and 2, J: Li, et al., Editors, 2006: 565-570
    [48] Liu, X. Y. and X. Y. Wan, Wavelet based a new method of digital watermark, in Wavelet Active Media Technology and Information Processing, Vol 1 and 2, J: Li, et al., Editors, 2006: 789-794
    [49] Kim, H. C. and E. J. Delp, A reliability engineering approach to digital watermark evaluation - art. no. 60721N, in Security, Steganography, and Watermarking of Multimedia Contents Viii, E. J. Delp and P. W. Wong, Editors, 2006: N721-N721
    [50] Tang, X. H., Y. M. Niu, and Q. L. Li, A digital audio watermark embedding algorithm with WT and CCT, in Ieee 2005 International Symposium on Microwave, Antenna, Propagation and Emc Technologies for Wireless Communications Proceedings, Vols 1 and 2, L. C. Zhang and Y. H. Wen, Editors, 2005: 970-973
    [51] Kwok, S. H. M. and E. Y. Lam, Watermark implementation in digital photography, in Ispacs 2005: Proceedings of the 2005 International Symposium on Intelligent Signal Processing and Communication Systems, 2005: 329-332
    [52] Sepsirisuk, K., K. Atsuta, and S. Kondo, An adaptive digital watermark based on a wavelet tree structure using the human visual system, in International Symposium on Communications and Information Technolgies 2005, Vols 1 and 2, Proceedings, 2005: 1027-1030
    [53] Cai, Y., et al., An electronical seal system based on digital watermark technology, in Wavelet Analysis and Active Media Technology Vols 1-3, J: Li, et al., Editors, 2005: 873-878
    [54] Tsai, M. J. and C. Y. Yang, A collaborated computing system for load sharing with P2P environments: a study for the algorithm analysis in the digital watermark filter evaluation, in Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, Vols 1 and 2, W. Shen, et al., Editors, 2005: 761-766
    [55] Tian, Z., et al., Digital watermark: Technique, Application and Improvement as a copyright-protecting method for RS and cartographic data, in Oceans '04 Mts/Ieee Techno-Ocean '04, Vols 1- 2, Conference Proceedings, Vols. 1-4, 2004: 776-780
    [56] Masato, N., et al., Detection of image alternation and image ID by two digitalwatermark methods with error correction, in Cars 2003: Computer Assisted Radiology and Surgery, Proceedings, H. U. Lemke, et al., Editors, 2003: 1317-1317
    [57] Lee, H. W. and I. Y. Lee, Designated verification of digital watermark for network based image distribution, in Computational Science - Iccs 2003, Pt Iv, Proceedings, P. M. A. Sloot, et al., Editors, 2003: 1069-1078
    [58] Winne, D. A., et al., An investigation of an MPEG-4 embedded spatial digital watermark developed for tamper detection and characterization, in Icce: 2003 International Conference on Consumer Elecronics, Digest of Technical Papers, 2003: 64-65
    [59] Hiary, H. and K. Ng, Watermark: From paper texture to digital media, in First International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Proceedings, P. Nesi, K. Ng, and J. Delgado, Editors, 2005: 261-264
    [60] Wang, M. H., et al., A novel digital content protection scheme combining iris identity based digital signature and semi-fragile watermark, in 2006 10th International Conference on Communication Technology, Vols 1 and 2, Proceedings, H. B. Qiu, et al., Editors, 2006: 1226-1229
    [61] H. Ogawa,T. Nakamura,A. Tomioka, e. a., Digital Watermarking Technique for Motion Picture Based on Quantization. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2000. E83-A(1): 77-89
    [62] Winkler, S., E. D. Gelasca, and T. Ebrahimi, Toward perceptual metrics for video watermark evaluation, in Applications of Digital Image Processing Xxvi, A. G. Tescher, Editor, 2003: 371-378
    [63] F., J., K. M., and E. T, Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. ISO/IEC Doc. JTC1/SC29/WG11 MPEG97/M2281, 1997, 1(1): 21-28
    [64] Qiu, G., et al. A hybrid watermarking scheme for H. 264/AVC video. in Proceedings of the 17th International Conference on Pattern Recognition, Aug. 2004
    [65] Noorkami, M. and R. M. Mersereau. Compressed-domain video watermarking for H. 264. in Proceedings of International Conference on Image Processing(ICIP). Sep. 2005. Genoa, Italy
    [66] Noorkami, M. and R. M. Mersereau. Towards robust compressed-domain video watermarking for H. 264. in Security, Steganography, and Watermarking of Multimedia Contents 8. 2006: Proc. of SPIE-IS&T Electronic Imaging
    [67] Echizen, I., et al., PC-based real-time watermark embedding system with standard video interface, in 2006 Ieee International Conference on Systems, Man, and Cybernetics, Vols 1-6, Proceedings, 2006: 267-271
    [68]肖自美,图像信息理论与压缩编码技术.广州:中山大学出版社, 2000
    [69] Zhang, Z. Y., et al., Digital image watermark algorithm in the curvelet domain, in Iih-Msp: 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, W. C. Fang, et al., Editors, 2006: 105-108
    [70] O'Ruanaidh, J. J. K. and T. Pun., Scale and Translation Invariant Spread Spectrum Digital Image Watermarking. Signal Processing, 1998, 66(3): 303-317
    [71] O'Ruanaidh, J. J. K. and T. Pun. Scale and Translation Invariant Digital Image Watermarking. in International Conference on Image Processing. Oct. 26-29, 1997
    [72] Wu, M., et al. A Rotation, Scale and Translation Resilient Public Watermark. in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'99). March 15-19, 1999
    [73] Lin, C. Y., et al., Rotation, Scale, and Translation Resilient Watermarking for Images. IEEE transactions on Image Processing, May 2001, 10(5)
    [74] Zheng, D. and J. Y. Zhao. Apply Phase Information in RST Image Watermarking. in IEEE International Conference on Consumer Electronics(ICCE'2003), June 17-19, 2003
    [75] Sharma, G. and D. J. Coumou. Watermark Synchronization: Perspective and a New Paradigm. in Proc. 40th Annual Conference on Information Sciences and Systems. 22-24 March 2006. NJ
    [76] Bas, P., J. -M. Chassery, and B. Macq, Geometrically Invariant Watermarking Using Feature Points. IEEE Trans. Image Process, Sep. 2002, 11(9): 1014-1028
    [77] Tang, C. -W. and H. -M. Hang, A Feature-Based Robust Digital Image Watermarking Scheme. IEEE Transactions on Signal Processing, 2003, 51(4): 950-959
    [78] Mikolajczyk, K. and C. Schmid. An affine invariant interest point detector. in Proc. ECCV, 2002. LNCS
    [79] Kadir, T. and J. M. Brady, Scale,saliency and image description. Intl. J. of Computer Vision, 2001, 45(2): 83-105
    [80] Kadir, T., A. Zisserman, and M. Brady, An affine invariant salient region detector. ECCV, 2004: 404-416
    [81] Reeves, A., et al., Three-dimensional Shape Analysis Using Moments and Fourier Descriptors. IEEE Trans. Pattern Anal. Mach. Intell., Nov. 1988, 10(6): 937-943
    [82] Voloshynovskiy, S., et al., A Stochastic Approach to Content Adaptive Digital Image Watermarking. Proc. Int. Workshop on Information Hiding, 1999, 1768: 211-236
    [83] Hernandez, J. R. and F. Perez-Gonzalez, Statistical analysis of watermarking schemes for copyright protection of images. Proc. IEEE, 2001, 87(7): 1142-1143
    [84] Seo, J. S. and C. D. Yoo, Localized image watermarking based on feature points of scale-space representation. Pattern Recognit, 2004, 37: 1365-1375
    [85] LJ. Cox, M. L. M., J. Bloom, Digital watermarking, 2002, Morgan Kaufmann
    [86] H., C., A review of video registration methods for watermark detection in digital cinema applications. Proceeding of 2004 IEEE International Symposium on Circuits and Systems, 2004. 5: 704-707
    [87] S., P. and T. Pun, Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing, 2000, 9(6): 1123-1129
    [88] Y., X., S. Liao, and M. Pawlak. A multibit geometrically robust image watermark based on Zernike moments. in Proceedings of the 17th International Conference on Pattern Recognition(ICPR'2004), 2004
    [89] G. -R., F., L. -G. Jiang, and D. -J. W. e. al., Quickly tracing detection for spreadspectrum watermark based on effect estimation of the affine transform. Pattern Recognition, 2005, 38: 2530-2536
    [90] K., M. and C. Schmid. Indexing based on scale invariant interest points. in Proceedings of the IEEE International Conference on Computer Vision, 2001
    [91] Echizen, I., et al., Improved video watermark detection using statistically-adaptive accumulation, in Knowledge-Based Intelligent Information and Engineering Systems, Pt 4, Proceedings, R. Khosla, R. J. Howlett, and L. C. Jain, Editors, 2005: 300-308
    [92] Lu, C. S., J. R. Chen, and K. C. Fan, Resistance of content-dependent video watermarking to watermark-estimation attacks, in 2004 Ieee International Conference on Communications, Vols 1-7, 2004: 1386-1390
    [93] Mathai, N. J., A. Sheikholeslami, and D. Kundur, VLSI implementation of a real-time video watermark embedder and detector, in Proceedings of the 2003 Ieee International Symposium on Circuits and Systems, Vol Ii - Communications- Multimedia Systems & Applications, 2003: 772-775
    [94] Choi, Y. and K. Aizawa, Watermark detection based on error probability and its applications to video watermarking. Electronics and Communications in Japan Part Iii-Fundamental Electronic Science, 2004, 87(6): 66-76
    [95] Nguyen, P., et al., Registration methods for non blind watermark detection in digital cinema applications, in Security and Watermarking of Multimedia Contents V, E. J. Delp and P. W. Wong, Editors, 2003: 553-562
    [96] C, L. G., Real-time watermarking techniques for compressed video data. January 2000, Delft University of Technology: The Netherlands
    [97] C, L. G., S. I, and L. R. L, Watermarking digital image and video data. IEEE Signal Processing Magazine, 2000, 17(5): 20-46
    [98] C, L. G. and L. R. L, Optimal differential energy watermarking of DCT encoded images and video. IEEE Transtractions on Image Processing, 2001, 10(1): 148-158
    [99] I, S. and L. R. L. Extended differential energy watermarking(XDEW) alogrithm for low bit-rate video watermarking. in Proceeding of the Seventh Annual Conference of the Advanced School for Computing and Imaging, 2001
    [100] I, S. and L. R. L. Low bit-rate video watermarking using temporally extended differential energy watermarking(DEW) algorithm. in Proceeding of SPIE, Security and Watermarking of Multimedia Contents 3, 2001
    [101] Ling, H., Z. Lu, and F. Zou. New Real-time Watermarking Algorithm for Compressed Video in VLC Domain. in IEEE International Conference on Image Processing (ICIP'2004), 2004. Singapore
    [102] Ling, H., Z. Lu, and F. Zou. Improved differential energy watermarking (IDEW) algorithm for DCT encoded image and video. in 7th International Conference on Signal Processing Proceedings (ICSP'2004), 2004 Beijing, China
    [103] L, M. M., D. G. J, and C. I. J, Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans Image Process, 2004, 13(6): 792-807
    [104] C, L. G., L. R. L, and B. J, Real-time labeling of MPEG-2 compressed video. Visual Comm Image Represent, 1998, 9(4): 256-270
    [105] C-S, L., et al. Real-time MPEG2 video watermarking in the VLC domain. in Proceedings of 16th International Conference on Pattern Recognition. 2002. New York: IEEE Press
    [106] F, H. and G. B, Watermarking of uncompressed and compressed video. Signal Process, 1998. 66(3): 283-301
    [107]凌贺飞.基于Watson视觉感知模型的能量调制水印算法.软件学报, 2006, 17(5): 1124-1132

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700