• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lou Oujun, Wang Xianghai, Wang Zhengxuan. Research on Quantization-Based Robust Video Watermarking Technique Against Geometrical Attacks[J]. Journal of Computer Research and Development, 2007, 44(7): 1211-1218.
Citation: Lou Oujun, Wang Xianghai, Wang Zhengxuan. Research on Quantization-Based Robust Video Watermarking Technique Against Geometrical Attacks[J]. Journal of Computer Research and Development, 2007, 44(7): 1211-1218.

Research on Quantization-Based Robust Video Watermarking Technique Against Geometrical Attacks

More Information
  • Published Date: July 14, 2007
  • The watermarking technique robust to both signal processing attacks and geometrical attacks is one of the hotspots and difficulties in the digital watermarking research. Proposed in this paper is a video watermarking scheme efficiently robust to many kinds of signal processing attacks and rotation, scaling and translation (RST) attacks. In the embedding scheme, a geometrical invariable is proposed, which is based on the invariability of statistical feature in the circular image area. Using this invariability, the geometrical distortion is first retrieved. And then a significant watermarking and synchronization information is adaptively embedded into the discrete cosine transform (DCT) domain according to the characteristics of DCT coefficients. Moreover, in the algorithm a novel embedding method is adopted, which can embed multi-bit information in a selected position. In the extraction scheme, the embedded watermarking is located by the synchronization information and the geometrical distortion is retrieved making use of circular feature area if geometrical attacks are encountered, and finally the watermarking is obliviously extracted in the DCT domain. The experimental results show the proposed scheme can achieve good transparency and better resistance against RST attacks and excellent robustness to common attacks such as MPEG compression, frame loss, etc.
  • Related Articles

    [1]Yang Wei, He Jie, Wan Yadong, Wang Qin, Li Chong. Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT[J]. Journal of Computer Research and Development, 2017, 54(9): 2032-2043. DOI: 10.7544/issn1000-1239.2017.20160636
    [2]Zhang Jun, He Yanxiang, Shen Fanfan, Jiang Nan, Li Qing’an. Two-Stage Synchronization Based Thread Block Compaction Scheduling Method of GPGPU[J]. Journal of Computer Research and Development, 2016, 53(6): 1173-1185. DOI: 10.7544/issn1000-1239.2016.20150114
    [3]Huang Jianbin, Bai Yang, Kang Jianmei, Zhong Xiang, Zhang Xin, Sun Heli. A Network Community Detection Method Based on Dynamic Model of Synchronization[J]. Journal of Computer Research and Development, 2012, 49(10): 2198-2207.
    [4]Zhang Lu, Luo Junzhou, Yang Ming, He Gaofeng. Synchronization in Inter-Packet Delay Based Flow Correlation Techniques[J]. Journal of Computer Research and Development, 2011, 48(9): 1643-1651.
    [5]Jin Gang, Wang Lei, Wang Zhiying, and Dai Kui. Research and Implementation of an Optimizing Design Method of De-Synchronized Circuit[J]. Journal of Computer Research and Development, 2009, 46(2): 329-337.
    [6]Xu Chaonong, Xu Yongjun, Li Xiaowei. New Time Synchronization Techniques for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 138-145.
    [7]Xiao Lin, Cheng Lijuan, and Wang Fubao. A Low Cost Time Synchronization Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 126-130.
    [8]Xiong Tinggang, Ma Zhong, Yuan Youguang. Research on Synchronization Technology of Fault-Tolerant Computer System Based on Operating System Calls[J]. Journal of Computer Research and Development, 2006, 43(11): 1985-1992.
    [9]Zhang Yong, Fang Binxing, Ye Jianwei, Tian Zhihong, and Bao Xiuguo. Enhanced Survivability of Time Synchronization Network[J]. Journal of Computer Research and Development, 2006, 43(9): 1550-1556.
    [10]Zhong Hairong, Liu Xiaojian, and Jin Shiyao. Migrating Entities and Their Time Synchronization Issue in Large-Scale Federated Simulation (Part Two): Time Synchronization for Migrating Entities[J]. Journal of Computer Research and Development, 2005, 42(4): 716-720.

Catalog

    Article views (696) PDF downloads (551) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return