2015
DOI: 10.1007/s11042-014-2422-3
|View full text |Cite
|
Sign up to set email alerts
|

Object based watermarking for H.264/AVC video resistant to rst attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…On the other hand, Lei et al (2010) firstly performed SVD on each block of the video frame, followed by DCT, so it is basically embedding the watermark in the DCT domain too. Meanwhile, lesser studied are the types of schemes that embed watermarks into the motion vectors, e.g., Stuetz et al (2014) and Gaj et al (2016). All of these scheme proposals are commonly supported by experimental results showing robustness to image processing attacks, nevertheless, they did not make claims about resilience to transcoding.…”
Section: Discussion On Related Schemesmentioning
confidence: 99%
“…On the other hand, Lei et al (2010) firstly performed SVD on each block of the video frame, followed by DCT, so it is basically embedding the watermark in the DCT domain too. Meanwhile, lesser studied are the types of schemes that embed watermarks into the motion vectors, e.g., Stuetz et al (2014) and Gaj et al (2016). All of these scheme proposals are commonly supported by experimental results showing robustness to image processing attacks, nevertheless, they did not make claims about resilience to transcoding.…”
Section: Discussion On Related Schemesmentioning
confidence: 99%
“…where & denotes a bitwise AND operation. According to (12) to (15), the prediction value P 3,3 is obtained as an interpolation of R 3,0 and R 4,0 . P 3,2 and P 3,4 on the same line as P 3,3 are obtained by interpolation with the same reference pixels and will be very close to P 3,3 .…”
Section: A Proposed Watermark Embedding Methodsmentioning
confidence: 99%
“…In the field of AVC watermarking, Mansouri et al [14] proposed a low-complexity robust watermarking algorithm based on the number of nonzero (NNZ) transform coefficients, defining a priority matrix to adjust the impact of watermark on bit rate and video quality. Gaj et al [15] used a detection method for motion coherent regions in the compressed domain to embed the watermark into the motion objects of each shot of the video, resisting geometric attacks such as rotation and scaling. Chen et al [16] proposed a robust watermarking algorithm based on just noticeable difference (JND).…”
Section: Related Workmentioning
confidence: 99%
“…Compared to the MPEG standard, H.264 adopts some different technologies, like prediction technology, so many conventional video watermarking algorithms are no longer applicable. Most robust video watermarking algorithms based on H.264/AVC choose to embed watermarks into DCT coefficients [82][83][84][85][86]. For the VOD service, He et al [82] proposed a real-time double watermarking algorithm.…”
Section: Mpeg-based Watermarking Algorithmsmentioning
confidence: 99%
“…Buhari et al [84] proposed a watermarking algorithm for spatial scalable video coding based on HVS, which embedded watermark information into high texture blocks of video streams. Gaj et al [85] expanded the existing motion coherence region detection algorithm in the compression domain to detect moving objects in video shots, and embedded watermark information into them to resist geometric attacks. To achieve higher video visual quality and slight bit rate increase, Fallahpour et al [86] embedded watermark information in the last nonzero level of quantized DCT (QDCT) blocks.…”
Section: Mpeg-based Watermarking Algorithmsmentioning
confidence: 99%