期刊文献+

基于云水印的视频内容认证技术 被引量:2

Video Content Authentication Technique Based on Cloud Watermark
下载PDF
导出
摘要 数字视频内容的认证技术越来越成为研究的热点。基于云水印及镜头分割技术,提出了一种新颖的视频内容认证方案。论文就不变特征提取、云水印生成、嵌入和提取、视频的认证与篡改检测等技术进行了研究并进行了实现。通过实验分析和验证,该方案可对实时的视频进行认证而不影响视频本身的视觉效果。 Digital video content authentication technique becomes a hot point. A novel video content authentication scheme, based on cloud watermark and shot segmentation, is proposed. The related technique on the Invariant Feature extraction, the generation of the cloud watermark, the embedding and the extraction of cloud watermark, the authentication and the tamper detection on video were studied and implemented . With some experiments and the corresponding analysis and the verifying for the results, the scheme can be applied into the real time video and may not affected the visual efficient.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第1期26-30,共5页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 广东省自然科学基金资助项目(05109511) 广东省科技计划资助项目(2006B37430001)
关键词 视频内容认证 云水印 镜头分割 特征提取 video authentication cloud watermark shot segmentation feature detection
  • 相关文献

参考文献10

  • 1PENG Yinyu, HEATHER Hong. A semi-fragile watermarking system for MPEG video authentication [ J ]. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing, 2002,4 ( 5 ) : 3461 - 3464.
  • 2CROSS Daniel, MOBASSERI Bijan. Watermarking for self-authentication of compressed video [ C ]. IEEE International Conference on Image Processing Rochester, New York, 2002,3(9) :913 -916.
  • 3SUN Q, HE D, TIAN Q A. Secure and robust authentication scheme for video transcoding [ J ]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(10) :1232 - 1244.
  • 4李德毅,刘常昱,杜鹢,韩旭.不确定性人工智能[J].软件学报,2004,15(11):1583-1594. 被引量:403
  • 5YANG B, GU F, NIU X. Block mean value based image perceptual hashing [ C ]. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006 : 167 - 172.
  • 6SWAMINATHAN A, MAO Y, WU M. Robust and secure image hashing[ J ]. IEEE Transactions on Information Forensics and Security, 2006,1 (2) :215 -230.
  • 7李国辉.基于内容的多媒体信息检索模型和方法研究[D].长沙:国防科学技术大学,2001:10-30.
  • 8MOBASSERI B G, EVANS A T. Content- dependent video authentication by self - watermarking in color space[ C ]. SPIE Security and Watermarking of Multimedia Contents Ⅲ, San Jose, 2001,4314( 1 ) :21 -26.
  • 9ROOVER C D, VLEESCHOUWER C D, LEFEBVRE F, et al. Robust video hashing based on radial projections of key frames [ J ]. IEEE Transactions on Signal Processing, 2005,53 ( 10 ) :4020 - 4037.
  • 10LINE T, DELP E J. Temporal synchronization in video watermarking [ J ]. IEEE Transactions on Signal Processing, 2004,52(10) :3007 -3022.

二级参考文献5

共引文献402

同被引文献36

  • 1张桂东,茅耀斌,王执铨.一种基于运动矢量的视频水印方案[J].中山大学学报(自然科学版),2004,43(A02):117-119. 被引量:9
  • 2付炜,邢广忠.置换DCT域中频系数的盲水印嵌入算法研究[J].计算机应用研究,2007,24(3):160-162. 被引量:4
  • 3秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 4CANDES E J, WAKIN M B. An introduction to compressive sampling [ J ]. IEEE Signal Processing Magazine, 2008, 25 (2) : 21 - 30.
  • 5VALENZISE G, TAGLIASACCHI M, TUBARO S. A compressive-sensing based watermarking scheme for sparse image tampering identification [ C ] J/Image Processing (ICIP), 2009 16th IEEE International Conference, 2009 : 1265 - 1268.
  • 6TAGLIASACCHI M, VALENZISE G, TUBARO S Hash-based identification of sparse image tampering [ J] IEEE Transactions on Image Processing, 2009, 18 (11) 2491 - 2504.
  • 7RICHARD B, MARK D, RONALD D. A simple proof of the restricted isometry property for random matrices [ J ]. Constructive Approximation, 2009, 3 (28) : 253 - 263.
  • 8CANDES E J. The restricted isometry property and its implications for compressed sensing [ J ]. Applied & Computational Mathematics, 2008, 346 ( 1 ) : 589 -592.
  • 9WOJTASZCZYK P. Stability and instance optimality for Gaussian measurements in compressed sensing [ J ]. Foundations of Computational Mathematics, 2010, 10 (1): 1-13.
  • 10ZHANG G S, JIAO S H, XU X L, WANG L. Compressed sensing and reconstruction with bernoulli matrices [C]. Information and Automation (ICIA), 2010 IEEE International Conference, 2010:455 -460.

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部