Citation: | LIU Li, PENG Daiyuan, LI Xiaoju. Adaptive Video Watermarking Scheme for Effective Resistance to Linear Collusion in Spatial Domain[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 456-460. |
MOBASSERI,B G.Exploring CDMA for watermarking of digital video[C]//In Proc.of the SPIE.Bellingham:Society of Photo-Optical Instrumentation Engineers,1999,3657:96-102.[2] HARTUNG F,GIROD B.Watermarking of uncompressed and compressed video[J].Signal Processing,1998,66(3):283-301.[3] 梁华庆,王磊,双凯,等.一种在原始视频帧中嵌入的鲁棒的数字水印[J].电子与信息学报,2003,25(9):1281-1284.LIANG Huaqing,WANG Lei,SHUANG Kai,et al.A robust video watermarking scheme of raw frames[J].Journal of Electronics and Information Technology,2003,25(9):1281-1284.[4] LU Zheming,GE Qingming,NIU Xiamu.Robust adaptive video watermarking in the spatial domain[C]//The 5th InterNational Symposium on Test and Measurement (ISTM'2003).Shenzhen:Chinese Society of Modern Technical Equipments,2003:1875-1880.[5] Darmstaedter V,Delaigle J F,Nicholson D,et al.A block based watermarking technique for MPEG2 signals:Optimization and validation on real digital TV distribution links[C]//In Proc.Euro.Conf.on Multimedia Applications,Services and Techniques.London:Springer-Verlag,1998:190-206.[6] GE Qingming,LU Zheming,NIU Xiamu.Oblivious video watermarking scheme with adaptive embedding mechanism[C]//The Second International Conference on Machine Learning and Cybernetics.Xi'an:Institute of Electrical and Electronics Engineers Inc,2003:2876-2881.[7] SU K,KUNDUR D,HATZINAKOS D.Statistical invisibility for collusion-resistant digital video watermarking[J].IEEE Trans.Multimedia,2005,7 (1):52-60.[8] 和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,9(33):l557-1561.HE Hongjie,ZHANG Jiashu,TIAN Lei.A fragile watermarking scheme with discrimination of tampers on image or watermark[J].Acta Electronics Sinica,2005,9(33):1557-1561.[9] VOLOSHYNOVESKIY S,BAUMGARTNER N.A stochastic approach to content adaptive digital image watermarking[C]//International Workshop on Information Hiding.Germany:Springer Verlag,1999:211-236.
|
[1] | WANG Min, HE Zhaoyi, ZHOU Wen, LIANG Xin. Influencing Factors of Asphalt Pavement Visibility on Rainy Days[J]. Journal of Southwest Jiaotong University, 2023, 58(6): 1286-1293. doi: 10.3969/j.issn.0258-2724.20211079 |
[2] | ZHU Ziwei, LI Muxiao, CHENG Gong, SHENG Xiaozhen. Functional Relationships between Sound Powers Radiated from Noise Sources of High-Speed Train and Its Speed[J]. Journal of Southwest Jiaotong University, 2020, 55(2): 290-298. doi: 10.3969/j.issn.0258-2724.20180023 |
[3] | WANG Bing, PENG Qiang. Video Error Concealment Algorithm Based on Visual Saliency[J]. Journal of Southwest Jiaotong University, 2018, 53(5): 886-892. doi: 10.3969/j.issn.0258-2724.2018.05.002 |
[4] | ZHANG Changli, MENG Ying, LI Pengchao, SUN Ting. Monitoring Video-Based Visibility Detection Method and System for Highways in China[J]. Journal of Southwest Jiaotong University, 2018, 53(1): 136-145. doi: 10.3969/j.issn.0258-2724.2018.01.017 |
[5] | CHEN Zhiwei, XU Youlin. Fatigue Reliability Analysis of Multi-loading Suspension Bridges Considering Nonlinear Accumulative Damage[J]. Journal of Southwest Jiaotong University, 2014, 27(2): 213-219. doi: 10.3969/j.issn.0258-2724.2014.02.005 |
[6] | QU Zhenshen, YU Mengmeng, JIANG Yonglin, WEN Fan, WANG Changhong. Vision-Based Detection of Moving Vehicles Using Wavelet Modulus History Images[J]. Journal of Southwest Jiaotong University, 2012, 25(3): 439-445. doi: 10.3969/j.issn.0258-2724.2012.03.014 |
[7] | LIU Li, WANG Yongqing. Security Analysis of Video Hashing[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022 |
[8] | SONG Wei, HOU Jianjun, LI Zhaohong. Fragile Watermarking Algorithm Based on Circular Structure[J]. Journal of Southwest Jiaotong University, 2009, 22(5): 672-676. |
[9] | WANG Hongxia. Overview of Content-Based Adaptive Audio Watermarking[J]. Journal of Southwest Jiaotong University, 2009, 22(3): 430-436,447. |
[10] | SONG Kang, ZHANG Tao, LIAO Junbi. Theoretical Analysis of Autocorrelation Function of Image as Sharpness Evaluation Function[J]. Journal of Southwest Jiaotong University, 2008, 21(5): 578-581,659. |
[11] | XU Huidong, XIE Jianhua. Period-Doubling Bifurcation of Single-Degree-of-Freedom Piecewise-Linearity System with Clearance[J]. Journal of Southwest Jiaotong University, 2008, 21(2): 227-231. |
[12] | FAN Mingquan, WANG Hongxia. Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark[J]. Journal of Southwest Jiaotong University, 2008, 21(6): 799-805. |
[13] | PENG Qiang, LI Hua. Background Extraction Method Based on Block Histogram Analysis for Video Images[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 48-53. |
[14] | PENG Qiang, ZHUChang-qian. Video Error Concealment Technique Based on Side Matching[J]. Journal of Southwest Jiaotong University, 2004, 17(1): 99-103. |
[15] | JIANG Zhi-ping, PENG Qiang, LI Yun-feng. Forward Tracking of Errors in Video Based on H.26L[J]. Journal of Southwest Jiaotong University, 2004, 17(2): 229-233. |
[16] | XUYue-liang, LI Zhi. Properties and Computation of Linear System Transfer MatrixH∞-norm[J]. Journal of Southwest Jiaotong University, 2004, 17(5): 684-687. |
[17] | ZHAIDong-hai, LILi. Non-linear Noise Canceller Based on Additive-Multiplicative Fuzzy Neural Network[J]. Journal of Southwest Jiaotong University, 2004, 17(1): 112-116. |
[18] | MA Miao, TIANHong-peng, HAO Chong-yang. A Multitype Watermark Scheme[J]. Journal of Southwest Jiaotong University, 2003, 16(2): 235-239. |
[19] | YANG Tian-wu, LIU Rong, PENG Qiang. Real-Time Video Technologies for MS-Windows[J]. Journal of Southwest Jiaotong University, 2002, 15(2): 172-176. |