Xiaohong Li, Keke Hu, Guofu Zhang, Jianguo Jiang, Zhaopin Su
{"title":"基于秘密图像共享的自适应视频水印","authors":"Xiaohong Li, Keke Hu, Guofu Zhang, Jianguo Jiang, Zhaopin Su","doi":"10.1109/ISCID.2012.241","DOIUrl":null,"url":null,"abstract":"Secret image sharing is introduced into the scheme of watermark generation in this paper, secret image sharing can reduce the amount of information bits substantially that embedded into video cover while guaranteeing the watermarking authentication. Base on this scheme a blind video watermarking algorithm for copyright protection is proposed, the value of the selected coefficient is modified adaptively according to the energy value of neighboring coefficients and the binary watermark bits. Experimental data show that the proposed algorithm improves the watermarking robustness against some common signal processing attacks liking salt-pepper noise and re-compression while maintaining the high video quality.","PeriodicalId":246432,"journal":{"name":"2012 Fifth International Symposium on Computational Intelligence and Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Adaptive Video Watermarking Based on Secret Image Sharing\",\"authors\":\"Xiaohong Li, Keke Hu, Guofu Zhang, Jianguo Jiang, Zhaopin Su\",\"doi\":\"10.1109/ISCID.2012.241\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret image sharing is introduced into the scheme of watermark generation in this paper, secret image sharing can reduce the amount of information bits substantially that embedded into video cover while guaranteeing the watermarking authentication. Base on this scheme a blind video watermarking algorithm for copyright protection is proposed, the value of the selected coefficient is modified adaptively according to the energy value of neighboring coefficients and the binary watermark bits. Experimental data show that the proposed algorithm improves the watermarking robustness against some common signal processing attacks liking salt-pepper noise and re-compression while maintaining the high video quality.\",\"PeriodicalId\":246432,\"journal\":{\"name\":\"2012 Fifth International Symposium on Computational Intelligence and Design\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fifth International Symposium on Computational Intelligence and Design\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCID.2012.241\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fifth International Symposium on Computational Intelligence and Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCID.2012.241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Adaptive Video Watermarking Based on Secret Image Sharing
Secret image sharing is introduced into the scheme of watermark generation in this paper, secret image sharing can reduce the amount of information bits substantially that embedded into video cover while guaranteeing the watermarking authentication. Base on this scheme a blind video watermarking algorithm for copyright protection is proposed, the value of the selected coefficient is modified adaptively according to the energy value of neighboring coefficients and the binary watermark bits. Experimental data show that the proposed algorithm improves the watermarking robustness against some common signal processing attacks liking salt-pepper noise and re-compression while maintaining the high video quality.