Font Size: a A A

The Algorithm Study On Image Authentication And Video Watermarking

Posted on:2006-07-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:D P YeFull Text:PDF
GTID:1118360185491888Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology and multimedia processing technology, the multimedia content protection and copyright issue attract wide attention around the world. The encryption methods can give the solution for this problem to some extent. However, this can not radically prevent the pirates and tampers. After the multimedia data is decrypted, it is in the clear and no longer protected. The growth of another multimedia protecting technology which is known as digital watermarking can complement the security leaks of the traditional encryption protecting scheme.Digital watermarking techniques can be used for purposes such as label, authentication, control and dada hiding etc, by embedding a secret imperceptible signal directly into the data to be protected. During the development of watermarking techniques, multimedia authentication and copyright protection act as the two most important application drives. In this paper, the watermarking algorithms for image authentication and videos in different applications (medical or military image applications, video surveillance applications, Video-On-Demand applications) are studied, new or improved watermarking algorithms and schemes have good performances are expected to be presented.Some of the conclusions are listed as follows.Firstly, the image authentication watermarking techniques are studied and a multi-feature based invertible authentication watermarking for JPEG images is proposed. The content authentication features are extracted from several image domains, and then embedded into JPEG images as watermarks in a novel invertible way. Experimental results show that multi-feature extracting can reduce the probability of "miss alarm" in authentication scheme, and this new invertible watermarking algorithm can endure appropriate compressed processing.Secondly, a new two-fold authentication watermarking scheme based on video semantic content is proposed. Based on the image edge authentication techniques, a new local moving object authentication idea combined with MPEG-2 standard is presented, and a self-authentication and recovery video watermarking algorithm based on Group-of-Pictures is presented. Experimental results show that the scheme meet the requirement of video semantic authentication.Thirdly, two novel motion vector watermarking algorithms are proposed.1) A CDMA based motion vector watermarking is presented. The CDMA style watermarks are embedded into the large number of motion information of compressed video. Compared with traditional motion based video watermarking, this algorithm achieved good performance in resisting several classical video watermarking attacks.2) A novel lattice projection based motion vector watermarking algorithm is presented. A lattice structure is introduced into MPEG-2 block match principle and lattice based embedding method is illustrated. And a sub-optimal match idea is used for improving the video quality after watermarking. Experimental results show that the robustness is better...
Keywords/Search Tags:encryption, digital watermarking, multimedia authentication, video, image
PDF Full Text Request
Related items