首页 | 本学科首页   官方微博 | 高级检索  
     

基于代价策略的H.264/AVC半脆弱水印算法
引用本文:张维纬,赵 宸,黄德天,张 沛,杨义先.基于代价策略的H.264/AVC半脆弱水印算法[J].通信学报,2015,36(10):110-118.
作者姓名:张维纬  赵 宸  黄德天  张 沛  杨义先
基金项目:The Research Foundation of Huaqiao University;The Science and Technology Development Founda-tion of Quanzhou City;The Natural Science Foundation of Fujian Province;The Special Foundation of Fujian Provincial Department of Science and Technology
摘    要:


Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy
Wei-wei ZHANG,Chen ZHAO,De-tian HUANG,Pei ZHANG,Yi-xian YANG.Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy[J].Journal on Communications,2015,36(10):110-118.
Authors:Wei-wei ZHANG  Chen ZHAO  De-tian HUANG  Pei ZHANG  Yi-xian YANG
Affiliation:1. College of Engineering,Huaqiao University,Quanzhou 362021,China;2. National Computer Network and Information Security Management Center,Beijing 100031,China;3. Information Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,China
Abstract:In order to solve some existing problems on detecting malicious tampering by video watermarking based on H.264/AVC video compression standard,a semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy was proposed.To further improve the robustness of the feature codes in semi-fragile video watermarking algorithm,a new generation algorithm for feature codes by eliminating the correlation of them was proposed.In order to meet the requirement that the semi-fragile watermarks should be uniformly embedded into the video frames to locate the tampered region accurately,a minimal cost function was introduced to select a DCT coefficient in the 4 × 4 block residual to embed watermark which had minimal impact on the video quality and bit rates.Experimental results show that the proposed algorithm can significantly reduce impact on video quality and bit rate because of embedding the watermarking by adopting the minimum cost function and it is sensitive to malicious manipulations.The retrieved feature code and watermarking can detect and locate malicious manipulations.
Keywords:semi-fragile watermarking  cost strategy  H  264/AVC  tamper localization  robustness  
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号