Journal on Communications ›› 2015, Vol. 36 ›› Issue (10): 110-118.doi: 10.11959/j.issn.1000-436x.2015180
• academic paper • Previous Articles Next Articles
Wei-wei ZHANG1,Chen ZHAO2,De-tian HUANG1,Pei ZHANG3,Yi-xian YANG3
Online:
2015-10-25
Published:
2015-10-27
Supported by:
Wei-wei ZHANG,Chen ZHAO,De-tian HUANG,Pei ZHANG,Yi-xian YANG. Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy[J]. Journal on Communications, 2015, 36(10): 110-118.
"
测试序列 | QP=26 | QP=28 | QP=30 | |||||
文献[ | 本文算法 | 文献[ | 本文算法 | 文献[ | 本文算法 | |||
Foreman | 0.895 2 | 0.963 0 | 0.912 2 | 0.982 5 | 0.867 5 | 0.981 3 | ||
Mobile | 0.956 3 | 0.986 5 | 0.949 8 | 0.987 6 | 0.943 1 | 0.988 3 | ||
Coastguard | 0.887 9 | 0.968 3 | 0.907 2 | 0.966 3 | 0.873 8 | 0.968 5 | ||
Hall | 0.875 6 | 0.967 7 | 0.889 3 | 0.987 2 | 0.867 2 | 0.982 7 | ||
Flower | 0.814 5 | 0.979 8 | 0.853 2 | 0.983 2 | 0.813 2 | 0.982 1 |
"
测试序列 | QP=26 | 高斯噪声(方差0.000 5) | 椒盐噪声(密度0.01) | 高斯低通滤波(5×5) | |||||||
文献[ | 本文 | 文献[ | 本文 | 文献[ | 本文 | 文献[ | 本文 | ||||
Foreman | 0.847 2 | 0.910 9 | 0.841 4 | 0.784 2 | 0.766 7 | 0.832 5 | 0.849 5 | 0.873 1 | |||
Mobile | 0.888 9 | 0.926 6 | 0.800 0 | 0.821 7 | 0.838 4 | 0.871 4 | 0.868 7 | 0.935 0 | |||
Coastguard | 0.913 6 | 0.938 8 | 0.829 0 | 0.813 0 | 0.800 8 | 0.852 8 | 0.891 4 | 0.911 8 | |||
Hall | 0.792 7 | 0.850 3 | 0.763 1 | 0.723 7 | 0.705 8 | 0.840 1 | 0.743 4 | 0.851 1 | |||
Flower | 0.780 6 | 0.847 8 | 0.740 2 | 0.756 8 | 0.761 4 | 0.840 2 | 0.803 5 | 0.850 9 |
[1] | MEHDI F , SHERVIN S , MEHDI S ,et al. Tampering detection in compressed digital video using watermarking[J]. IEEE Transactions on Instrumentation and Measurement, 2014,63(5): 1057-1072. |
[2] | QUELUZ M P . Authentication of digital images and video:generic models and a new contribution[J]. Signal Processing:Image Communication, 2001,16(5): 461-475. |
[3] | DOERR G , DUGELAY J L . A guide tour of video watermarking[J]. Signal Processing:Image Communication, 2003,18(4): 263-282. |
[4] | ZHANG X P , WANG S Z , QIAN Z X ,et al. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011,20(2): 485-495. |
[5] | HE H J , CHEN F , TAI H M ,et al. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012,7(1): 185-196. |
[6] | PIPER A,SAFAVI-NAINI R . Scalable fragile watermarking for image authentication[J]. IET Information Security, 2013,7(4): 300-311. |
[7] | CHEN F , HE H J , TAI H M ,et al. Chaos-based self-embedding fragile watermarking with flexible watermark payload[J]. Multimedia Tools and Applications, 2014,72(1): 41-56. |
[8] | CHEN S , LEUNG H . Chaotic watermarking for video authentication in surveillance applications[J]. IEEE Transactions on Circuits and System for Video Technology, 2008,18(5): 704-709. |
[9] | SHI Y J , QI M , YI Y G ,et al. Object based dual watermarking for video authentication[J]. Optik, 2013,124: 3827-3834. |
[10] | MASOUMI M , AMISI S . Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks[J]. The International Arab Journal of Information Technology, 2012,11(2): 204-212. |
[11] | ISO/IEC 14496-10,ITU-T Rec.H.264.Advanced video coding[S]. 2003. |
[12] | HOROWITZ M , JOCH A , KOSSENTINI F ,et al. H.264/AVC baseline profile decoder complexity analysis[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(7): 704-716. |
[13] | HORNG S J , FARFOURA M E , FAN P Z ,et al. A low cost fragile watermarking scheme in H.264/AVC compressed domain[J]. Multimedia Tools and Applications, 2014,72(3): 2469-2495. |
[14] | KIM T , PARK K , HONG Y.Video watermarking technique for H . 264/AVC[J]. Optical Engineering, 2012,51(4):047402. |
[15] | LI Q , WANG R D , XU D W.Fragile video watermarking algorithm based on H . 264/AVC[J]. Materials Research Innovations, 2013,17: 94-100. |
[16] | XU D W , WANG R D.Watermarking in H . 264/AVC compressed domain using Exp-Golomb code words mapping[J]. Optical Engineering, 2011,50(9):097402. |
[17] | CHEN T Y , CHEN T H , LIN Y T ,et al. H.264 video authentication based on semi-fragile watermarking[A]. International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C]. 2008. 659-662. |
[18] | 林志高, 孙锬锋, 蒋兴浩 . 基于 VLC 域的 H.264/AVC 视频流内容级认证水印算法[J]. 上海交通大学学报, 2011,45(10): 1531-1535. LIN Z G , SUN T F , JIANG X H.A content level watermarking scheme for H . 264/AVC video authentication in VLC domain[J]. Journal of Shanghai Jiaotong University, 2011,45(10): 1531-1535. |
[19] | 王小静, 杨高波, 朱宁波 . 基于半脆弱水印的H.264/AVC视频流的内容级认证[J]. 通信学报, 2009,30(11): 71-78. WANG X J , YANG G B , ZHU N B.Content authentication of H . 264/AVC video stream based on semi-fragile watermarking[J]. Journal on Communications, 2009,30(11): 71-78. |
[20] | XU D W , WANG R D , WANG J C.A novel watermarking scheme for H . 264/AVC video authentication[J]. Signal Processing:Image Communication, 2011,26: 267-279. |
[21] | LIN C Y , CHANG S F . Semi-fragile watermarking for authentication JPEG visual content[A]. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents[C]. 2000. 140-151. |
[22] | LIN C Y , CHANG S F . Issues and solutions for authenticating MPEG video[A]. Proceedings of the SPIE Security and Watermarking of Multimedia Contents[C]. San Jose,CA, 1999. 54-65. |
[23] | KIM D W , CHOI Y G , KIM H S ,et al. The problems in digital water marking into intra-frames of H.264/AVC[J]. Image and Vision Computing, 2010,28: 1220-1228. |
[24] | SHAHID Z , CHAUMONT M , PUECH W.Considering the reconstruction loop for data hiding of intra-and inter-frames of H . 264/AVC[J]. Signal Image and Video Processing, 2013,7(1): 75-93. |
[25] | LIN E T , DELP E J . A review of fragile watermarkings[A]. Proceedings of the ACM Multimedia and Security Workshop[C]. Orlando, 1999. 25-29. |
[26] | FRIDRICH J . Methods for tamper detection in digital images[A]. Proceedings of the ACM Workshop on Multimedia and Security[C]. Orlando, 1999. 19-23. |
[27] | ZHANG J , HO A T S , QIU G ,et al. Robust video watermarking of H.264/AVC[J]. IEEE Transactions on Circuits and Systems-II:Express Briefs, 2007,54(2): 205-209. |
[28] | HU J Q , HUANG J W , HUANG D R ,et al. Image fragile watermarking based on fusion of multi-resolution tamper detection[J]. Electronics Letters, 2002,38(24): 1512-1513. |
[29] | 王向阳, 陈利科 . 一种新的自适应半脆弱水印算法[J]. 自动化学报, 2007,33(4): 361-366. WANG X Y , CHEN L K . A novel adaptive semi-fragile watermarking scheme based on image content[J]. Acta Automatica Sinica, 2007,33(4): 361-366. |
[30] | 段贵多, 赵希, 李建平 ,等. 一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究[J]. 电子学报, 2010,38(4): 842-847. DUAN G D , ZHAO X , LI J P ,et al. A novel semi-fragile digital watermarking algorithm for image content authentication,localization and recovery[J]. Acta Electronica Sinica, 2010,38(4): 842-847. |
[1] | Jinyin CHEN, Haiyang XIONG, Haonan MA, Yayu ZHENG. CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack [J]. Journal on Communications, 2023, 44(4): 154-166. |
[2] | Yiteng WU, Wei LIU, Hongtao YU. Label flipping adversarial attack on graph neural network [J]. Journal on Communications, 2021, 42(9): 65-74. |
[3] | Leqing ZHU,Yu GUO,Lingqiang MO,Daxing ZHANG. DGANS:robustness image steganography model based on double GAN [J]. Journal on Communications, 2020, 41(1): 125-133. |
[4] | Xingming ZHANG,Zeyu GU,Shuai WEI,Jianliang SHEN. Markov game modeling of mimic defense and defense strategy determination [J]. Journal on Communications, 2018, 39(10): 143-154. |
[5] | Qun ZHANG,Le-quan MIN. Robustness design of templates for logic OR operation CNN in gray-scale images [J]. Journal on Communications, 2014, 35(5): 88-94. |
[6] | . Robustness design of templates for logic OR operation CNN in gray-scale images [J]. Journal on Communications, 2014, 35(5): 12-94. |
[7] | . Packet-loss robust scalable authentication algorithm for compressed image streaming [J]. Journal on Communications, 2014, 35(4): 20-181. |
[8] | Xiao-wei YI,Heng-tai MA,Gang ZHENG,Chang-wen ZHENG. Packet-loss robust scalable authentication algorithm for compressed image streaming [J]. Journal on Communications, 2014, 35(4): 174-181. |
[9] | . Low frequency steganography algorithm for H.264/AVC [J]. Journal on Communications, 2013, 34(Z2): 10-50. |
[10] | Guang-lu HUA,Zhi-tang LI,Bing FENG. Low frequency steganography algorithm for H.264/AVC [J]. Journal on Communications, 2013, 34(Z2): 47-50. |
[11] | Jian-gao LUO,Guo-qiang HAN,Yan WO,Xiang-yang LI. Lossless image authentication algorithm based on adaptive combinations of image basic blocks [J]. Journal on Communications, 2012, 33(6): 64-72. |
[12] | Guang-hui YANG,Jian-ping WU,You-jian ZHAO,Shu-tao SUN. Robustness measurement for scalable switch fabric [J]. Journal on Communications, 2012, 33(5): 1-11. |
[13] | Wei-wei ZHANG,Ru ZHANG,Jian-yi LIU,Xin-xin NIU,Yi-xian YANG. Robust video watermarking algorithm for H.264/AVC based on texture feature [J]. Journal on Communications, 2012, 33(3): 82-89. |
[14] | Tian-yu YE. Self-embedding robust digital watermarking algorithm with perfectly blind detection [J]. Journal on Communications, 2012, 33(10): 7-15. |
[15] | Ming-sheng CHEN,Guang-ming LIANG,Ji-xiang SUN,Dong-hua LIU,Jian ZHAO. Moving objects detection method based on H.264 compressed video with complex background [J]. Journal on Communications, 2011, 32(3): 91-97. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|