期刊文献+

基于DCT和DFT视频盲水印算法的研究与实现 被引量:3

Research and Implementation on Blind Video Watermarking Algorithms Based on DCT and DFT
下载PDF
导出
摘要 为了统计不同算法的透明性和鲁棒性,比较不同算法的优缺点,针对基于DCT和DFT的视频盲水印算法进行了研究。研究并实现了3种基于DCT的视频水印算法和1种基于DFT的视频水印算法。通过实验,统计它们的透明性和鲁棒性。结果表明,DCT算法的透明性优于DFT算法;DFT算法抗几何攻击的鲁棒性优于DCT算法,DCT算法抗编码攻击的鲁棒性优于DFT算法。 Video watermark is an emerging technology for copyright protection and authentication of digital video, this paper has researched and realized blind video watermarking algorithms based on DCT and DFT, Studied and implemented three kinds of DCT-based video watermark algorithms and one DFT-based video watermark algorithm, and counted transparency and robustness of algorithms. Experiments show that the transparency of DCT algorithms is superior to the DFT algorithm; and the robustness of the DFT algorithm against ge- ometrical attacks is better than DCT algorithms, the robustness of DCT algorithms against coding attacks is better than the DFT algorithm.
作者 丁海洋
出处 《北京印刷学院学报》 2012年第4期32-35,共4页 Journal of Beijing Institute of Graphic Communication
基金 北京市教委科技计划面上项目(KM201210015006) 北京市教委科技计划面上项目(KM201110015007) 北京市教委科技计划面上项目(KM201210015007) 北京市教委科技计划重点项目(KZ201210015015) 北京市属高校人才强教资助项目(PHR201108349) 北京印刷学院校内重点项目(E-a-2012-27)
关键词 视频水印 DCT DFT video watermark DCT DFT
  • 相关文献

参考文献10

二级参考文献58

  • 1杜耀刚,蔡安妮,孙景鳌.一种高效的DCT域图像下采样方法[J].中国图象图形学报(A辑),2005,10(4):511-515. 被引量:8
  • 2DOERR G, DUGELAY J. Collusion issue in video watermarking[A]. Security Steganography and Watermarking of Multimedia Contents Ⅶ[C]. San Jose, California, USA, 2005. 685-696. 被引量:1
  • 3BONEH D, SHAW J. Collusion-secure fingerprinting for digital data[J]. IEEE Trans Inform Theory, 1998, 44(5): 1897-1905. 被引量:1
  • 4STEINEBACH M, ZMUDZINSKI S. Countermeasure for collusion attacks against digital watermarking[A]. Security Steganography and Watermarking of Multimedia Contents Ⅷ[C]. San Jose, California, USA, 2006. 60720D- 1-60720D-9. 被引量:1
  • 5SWAMINATHAN A, HE S, WU M. Exploring QIM based anti- collusion fingerprinting for multimedia[A]. Security Steganography and Watermarking of Multimedia Contents Ⅷ[C]. San Jose, California, USA, 2006. 60721T-1-60721T-12. 被引量:1
  • 6COTRINA-NAVAU J, FERNANDEZ M, SORIANO M. A family of collusion 2-secure codes[A]. The 7th International Workshop on Information Hiding (IH2005)[C]. Barcelona, 2005.387-397. 被引量:1
  • 7VINOD P, BORA P K. Motion-compensated inter-flame collusion attack on video watermarking and a countermeasure[J]./LEE Proceedings-Information Security, 2006, 153(2): 61-73. 被引量:1
  • 8ERGUN F, KILIAN J, KUMAR R. A note on the limits of collusion resistant watermarks[A]. Advances in Cryptology-Eurocrypt 1999[C]. Prague, Czech Republic.1999. 140-149. 被引量:1
  • 9DOERR G, DUGELAY J. Countermeasures for collusion attacks exploiting host signal redundancy[A]. Int Workshop on Digital Watermarking(IWDW 2005)[C]. Siena, Italy, 2005.216-230. 被引量:1
  • 10SU K, KUNDUR D, HATZINAKOS D. A content- dependent spatially localized video watermarked for resistance to collusion and interpolation attacks[A]. Proc IEEE Int Conf on Image Processing(IClP2001)[C]. Thessaloniki, Greece, 2001. 818-821. 被引量:1

共引文献40

同被引文献31

  • 1郑融,金聪,魏文芬,李蓓.一种基于混沌加密的DCT域数字图像水印算法[J].计算机应用,2005,25(10):2365-2366. 被引量:12
  • 2杜耀刚,蔡安妮,孙景鳌.DCT域下采样视频水印技术[J].电子学报,2005,33(12):2219-2221. 被引量:7
  • 3鲍政,张建伟,夏德深.基于混沌加密的DCT域灰度级盲水印算法[J].计算机工程,2006,32(7):157-159. 被引量:6
  • 4陈宇,曲芳,胡建斌,陈钟.基于DWT-DCT和Zernike矩的灰度级鲁棒性水印算法[J].计算机研究与发展,2009,46(增刊):93-99. 被引量:2
  • 5T. JAYAMALAR, V. RADHA. Survey on Digital Video Watermarking Techniques and Attacks on Watermarks[J]. Inter- national Journal of Engineering Science and Technology, 2010,2(12) : 6963-6967. 被引量:1
  • 6Eugene T. Lin, Edward J. Delp. A review of data hiding in digital images [ C ]//Society for Imaging Science and Technology : Image Processing, Image Quality, Image Capture, Systems Conference. Final Program and Proceedings: IS and T's 52nd Annual Conference. Savannah, GA, United states: Society for Imaging Science and Technology, 1999:274-278 . 被引量:1
  • 7He Dajun, Sun Qibin, Tian Qi. AN OBJECT BASED WATER- MARKING SOLUTION FOR MPEG4 VIDEO AUTHENTICATION[ C ]//IEEE International Conference on A- coustics, Speech and Signal Processing-Proceedings. 2003 IEEE International Conference on Accoustics, Speech, and Signal Pro- cessing. Hong kong: Institute of Electrical and Electronics Engineers Inc, 2003:537-540. 被引量:1
  • 8Shelby Pereira, Joseph J. K. ORuanaidh, Frederic Deguillaume. Template Based Recovery of Fourier-Based Watermarks Using Log-polar and Log-log Maps [ C ]//International Conference on Multimedia Computing and Systems-Proceedings. Proceedings of the 1999 6th International Conference on Multimedia Computing and Systems. Florence, Italy: IEEE, Los Alamitos, CA, United States, 1999:870-874. 被引量:1
  • 9Gerrit C. Langelaar,Reginald L. Lagendijk. Optimal Differential Energy Watermarking of DCT Encoded Images and Video [ J ]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (1) :148-158. 被引量:1
  • 10Zhang Lijing. A Study on Video Watermark Based-on Discrete Wavelet Transform and Genetic Algorithm [ C ]//Proceedings of the I st International Workshop on Education Technology and Computer Science. 1st International Workshop on Education Technology and Computer Science. 2009. Wuhan,Hubei,China: Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane -P. O. Box 1331, Piscataway, NJ 08855-1331, United States, 2009:374-377. 被引量:1

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部