[1] |
张江, 赵黎, 杨士强 . 视频水印技术综述[J]. 计算机应用, 2005,25(4): 850-852. ZHANG J , ZHAO L , YANG S Q . Survey of video watermarking[J]. Computer Applications, 2005,25(4): 850-852.
|
[2] |
毕厚杰 . 新一代视频压缩编码标准—H.264/AVC[M]. 北京: 人民邮电出版社, 2006. BI H J.A New Generation of Video Compression Coding Standard—H . 264/AVC[M]. Beijing: People's Posts and Telecommunications PressPress, 2006.
|
[3] |
DOERR G , DUGELAY J . A guide tour of video watermarking[J]. Signal Processing:Image Communication, 2003,18(4): 263-282.
|
[4] |
LANGELAAR G C , SETYAWAN I , LAGENDIJK R L . Watermarking digital image and video data[J]. IEEE Signal Processing Magazine, 2000,17(5): 20-46.
|
[5] |
欧阳合, 韩军 . H264和MPE-4视频压缩:新一代多媒体的视频编码技术[M]. 长沙: 国防科技大学出版社, 2006. OUYANG H , HAN J . H264 and MPE-4 Video Compression:A new Generation of Multimedia Video Coding Technology[M]. Changsha: National University of Defense Technology PressPress, 2006.
|
[6] |
马晓静 . H.264/AVC视频信息隐藏方法研究[D]. 武汉:华中科技大学, 2010. MA X J.The Research on Video Data Hiding Algorithms Based on H . 264/AVC[D]. Wuhan:Huazhong University of Science and Technology, 2010.
|
[7] |
MA X J , LI Z T , TU H ,et al. A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift[J]. IEEE Transaction on Circuits and Systems for Video Technology, 2010,20(10): 1320-1330.
|
[8] |
罗准 . H.264 视频隐写算法研究及其在嵌入式平台的实现[D]. 长沙:湖南大学, 2009. LUO Z.Research on the Algorithm of H . 264 Video Steganography and Its Realization in the Embedded Platform[D]. Changsha:Hunan University, 2009.
|
[9] |
CELIK M U , SHARMA G , TEKALP A M ,et al. Reversible data hiding[A]. International Conference on Image Processing[C]. 2002. 157-160
|
[10] |
张维纬, 张茹, 刘建毅 ,等. 基于纹理特征的H.264/AVC顽健视频水印算法[J]. 通信学报, 2012,33(3): 82-89. ZHANG W W , ZHANG R , LIU J Y ,et al. H.264/AVC robust video watermarking algorithm based on texture feature[J]. Journal on Communication, 2012,33(3): 82-89.
|
[11] |
王小静 . 基于 H.264/AVC 的压缩域视频水印技术研究[D]. 湖南大学, 2009. WANG X J.Research on Domain Video Watermarking Compression Based on H . 264/AVC[D]. Hunan University, 2009.
|
[12] |
WESTFELD A . F5-A steganographic algorithm:high capacity despite better steganalysis[A]. Proc of the 4th International Workshop,Volume 2137 of Lecture Notes in Computer Science[C]. New York,Berlin,Heidellberg: Springer-Verlag, 2001. 289-302.
|