A novel watermarking scheme for H.264/AVC video authentication
暂无分享,去创建一个
[1] Bijan G. Mobasseri,et al. Authentication of H.264 streams by direct watermarking of CAVLC blocks , 2007, Electronic Imaging.
[2] Wang,et al. Study on ontology-based semantic retrieval model , 2009 .
[3] Russell M. Mersereau,et al. Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase , 2008, IEEE Transactions on Information Forensics and Security.
[4] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[5] Yuan-Gen Wang,et al. Robust dual watermarking algorithm for AVS video , 2009, Signal Process. Image Commun..
[6] Yulin Wang,et al. Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain , 2006, IEEE Transactions on Image Processing.
[7] Henry Leung,et al. Chaotic Watermarking for Video Authentication in Surveillance Applications , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Qibin Sun,et al. A hybrid watermarking scheme for H.264/AVC video , 2004, ICPR 2004.
[9] Jeffrey A. Bloom,et al. H.264/AVC stream replacement technique for video watermarking , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[10] Tien-Ying Kuo,et al. Fragile Video Watermarking Technique by Motion Field Embedding with Rate-Distortion Minimization , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[11] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[12] Jing Zhang,et al. Robust Video Watermarking of H.264/AVC , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.
[13] Sunil R. Das,et al. An adaptive compressed MPEG-2 video watermarking scheme , 2005, IEEE Transactions on Instrumentation and Measurement.
[14] T. Wiegand,et al. Text Description of Joint Model Reference Encoding Methods and Decoding Concealment Methods , 2004 .
[15] Hong Heather Yu,et al. Classification of video tampering methods and countermeasures using digital watermarking , 2001, SPIE ITCom.
[16] Shih-Fu Chang,et al. Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.
[17] Qi Tian,et al. A Secure and Robust Authentication Scheme for Video Transcoding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Deepa Kundur,et al. Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.
[19] Anthony T. S. Ho,et al. An efficient authentication method for H.264/AVC , 2005 .
[20] Russell M. Mersereau,et al. A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Trans. Inf. Forensics Secur..
[21] Jean-Luc Dugelay,et al. A guide tour of video watermarking , 2003, Signal Process. Image Commun..
[22] Mohan S. Kankanhalli,et al. A scalable signature scheme for video authentication , 2006, Multimedia Tools and Applications.
[23] Xiao Zeng,et al. A Novel Reversible Semi-Fragile Watermarking Algorithm of MPEG-4 Video for Content Authentication , 2008, 2008 Second International Symposium on Intelligent Information Technology Application.
[24] Tiago Rosa Maria Paula Queluz. Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.
[25] Yuewei Dai,et al. Feature-based watermarking scheme for MPEG-I/II video authentication , 2004, IS&T/SPIE Electronic Imaging.
[26] Dima Pröfrock,et al. H.264/AVC video authentication using skipped macroblocks for an erasable watermark , 2005, Visual Communications and Image Processing.
[27] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[28] Ji-Sang Yoo,et al. The problems in digital watermarking into intra-frames of H.264/AVC , 2010, Image Vis. Comput..
[29] Athanassios N. Skodras,et al. Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams , 2009, Journal of Real-Time Image Processing.
[30] Chun-Chieh Chen,et al. Towards Effective Content Authentication for Digital Videos by Employing Feature Extraction and Quantization , 2009, IEEE Transactions on Circuits and Systems for Video Technology.