[1] |
MEHDI F , SHERVIN S , MEHDI S ,et al. Tampering detection in compressed digital video using watermarking[J]. IEEE Transactions on Instrumentation and Measurement, 2014,63(5): 1057-1072.
|
[2] |
QUELUZ M P . Authentication of digital images and video:generic models and a new contribution[J]. Signal Processing:Image Communication, 2001,16(5): 461-475.
|
[3] |
DOERR G , DUGELAY J L . A guide tour of video watermarking[J]. Signal Processing:Image Communication, 2003,18(4): 263-282.
|
[4] |
ZHANG X P , WANG S Z , QIAN Z X ,et al. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011,20(2): 485-495.
|
[5] |
HE H J , CHEN F , TAI H M ,et al. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012,7(1): 185-196.
|
[6] |
PIPER A,SAFAVI-NAINI R . Scalable fragile watermarking for image authentication[J]. IET Information Security, 2013,7(4): 300-311.
|
[7] |
CHEN F , HE H J , TAI H M ,et al. Chaos-based self-embedding fragile watermarking with flexible watermark payload[J]. Multimedia Tools and Applications, 2014,72(1): 41-56.
|
[8] |
CHEN S , LEUNG H . Chaotic watermarking for video authentication in surveillance applications[J]. IEEE Transactions on Circuits and System for Video Technology, 2008,18(5): 704-709.
|
[9] |
SHI Y J , QI M , YI Y G ,et al. Object based dual watermarking for video authentication[J]. Optik, 2013,124: 3827-3834.
|
[10] |
MASOUMI M , AMISI S . Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks[J]. The International Arab Journal of Information Technology, 2012,11(2): 204-212.
|
[11] |
ISO/IEC 14496-10,ITU-T Rec.H.264.Advanced video coding[S]. 2003.
|
[12] |
HOROWITZ M , JOCH A , KOSSENTINI F ,et al. H.264/AVC baseline profile decoder complexity analysis[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(7): 704-716.
|
[13] |
HORNG S J , FARFOURA M E , FAN P Z ,et al. A low cost fragile watermarking scheme in H.264/AVC compressed domain[J]. Multimedia Tools and Applications, 2014,72(3): 2469-2495.
|
[14] |
KIM T , PARK K , HONG Y.Video watermarking technique for H . 264/AVC[J]. Optical Engineering, 2012,51(4):047402.
|
[15] |
LI Q , WANG R D , XU D W.Fragile video watermarking algorithm based on H . 264/AVC[J]. Materials Research Innovations, 2013,17: 94-100.
|
[16] |
XU D W , WANG R D.Watermarking in H . 264/AVC compressed domain using Exp-Golomb code words mapping[J]. Optical Engineering, 2011,50(9):097402.
|
[17] |
CHEN T Y , CHEN T H , LIN Y T ,et al. H.264 video authentication based on semi-fragile watermarking[A]. International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C]. 2008. 659-662.
|
[18] |
林志高, 孙锬锋, 蒋兴浩 . 基于 VLC 域的 H.264/AVC 视频流内容级认证水印算法[J]. 上海交通大学学报, 2011,45(10): 1531-1535. LIN Z G , SUN T F , JIANG X H.A content level watermarking scheme for H . 264/AVC video authentication in VLC domain[J]. Journal of Shanghai Jiaotong University, 2011,45(10): 1531-1535.
|
[19] |
王小静, 杨高波, 朱宁波 . 基于半脆弱水印的H.264/AVC视频流的内容级认证[J]. 通信学报, 2009,30(11): 71-78. WANG X J , YANG G B , ZHU N B.Content authentication of H . 264/AVC video stream based on semi-fragile watermarking[J]. Journal on Communications, 2009,30(11): 71-78.
|
[20] |
XU D W , WANG R D , WANG J C.A novel watermarking scheme for H . 264/AVC video authentication[J]. Signal Processing:Image Communication, 2011,26: 267-279.
|
[21] |
LIN C Y , CHANG S F . Semi-fragile watermarking for authentication JPEG visual content[A]. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents[C]. 2000. 140-151.
|
[22] |
LIN C Y , CHANG S F . Issues and solutions for authenticating MPEG video[A]. Proceedings of the SPIE Security and Watermarking of Multimedia Contents[C]. San Jose,CA, 1999. 54-65.
|
[23] |
KIM D W , CHOI Y G , KIM H S ,et al. The problems in digital water marking into intra-frames of H.264/AVC[J]. Image and Vision Computing, 2010,28: 1220-1228.
|
[24] |
SHAHID Z , CHAUMONT M , PUECH W.Considering the reconstruction loop for data hiding of intra-and inter-frames of H . 264/AVC[J]. Signal Image and Video Processing, 2013,7(1): 75-93.
|
[25] |
LIN E T , DELP E J . A review of fragile watermarkings[A]. Proceedings of the ACM Multimedia and Security Workshop[C]. Orlando, 1999. 25-29.
|
[26] |
FRIDRICH J . Methods for tamper detection in digital images[A]. Proceedings of the ACM Workshop on Multimedia and Security[C]. Orlando, 1999. 19-23.
|
[27] |
ZHANG J , HO A T S , QIU G ,et al. Robust video watermarking of H.264/AVC[J]. IEEE Transactions on Circuits and Systems-II:Express Briefs, 2007,54(2): 205-209.
|
[28] |
HU J Q , HUANG J W , HUANG D R ,et al. Image fragile watermarking based on fusion of multi-resolution tamper detection[J]. Electronics Letters, 2002,38(24): 1512-1513.
|
[29] |
王向阳, 陈利科 . 一种新的自适应半脆弱水印算法[J]. 自动化学报, 2007,33(4): 361-366. WANG X Y , CHEN L K . A novel adaptive semi-fragile watermarking scheme based on image content[J]. Acta Automatica Sinica, 2007,33(4): 361-366.
|
[30] |
段贵多, 赵希, 李建平 ,等. 一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究[J]. 电子学报, 2010,38(4): 842-847. DUAN G D , ZHAO X , LI J P ,et al. A novel semi-fragile digital watermarking algorithm for image content authentication,localization and recovery[J]. Acta Electronica Sinica, 2010,38(4): 842-847.
|