Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

H.264_advanced video coding (AVC)-video-stream-integrity-based fragile watermark authentication method

A fragile watermark and integrity technology, applied in the field of communication, can solve problems such as greater impact on code rate, small watermark capacity, small code rate changes, etc., achieve simple embedding and extraction process, ensure correct extraction, and enhance security.

Inactive Publication Date: 2012-02-29
RES INST OF SUN YAT SEN UNIV & SHENZHEN
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the high-efficiency compression performance of H.264 makes it very sensitive to small changes in the coded bit stream, which makes it very difficult and challenging to implement watermarking based on the H.264 code stream domain
In the existing technology, the watermark is embedded by modifying the video stream of the intra-frame 16×16 encoding mode. This scheme has good imperceptibility and small bit rate changes. However, in the actual encoding process, this type of macroblock is relatively rare. , the watermark capacity is relatively small
At present, through statistical analysis of video sequences, the CAVLC (Context-Adaptive Variable Length Coding) code space is divided into two groups: commonly used code space and unused code space, and then according to the bits to be embedded and the code space The mapping relation embedded in the watermark, this scheme also has good imperceptibility, and the embedding capacity is relatively large, but the mapping regulation must be established by statistical analysis of the video sequence, and it has a great impact on the bit rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • H.264_advanced video coding (AVC)-video-stream-integrity-based fragile watermark authentication method
  • H.264_advanced video coding (AVC)-video-stream-integrity-based fragile watermark authentication method
  • H.264_advanced video coding (AVC)-video-stream-integrity-based fragile watermark authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] The present invention proposes a method for authenticating fragile watermarks based on H.264_AVC video stream integrity, including: adopting adaptive variable length coding and exponential Columbus to embed watermark information by replacing corresponding codewords in H.264_AVC compressed bit streams; analyzing H.264 slice-level compressed bit stream, generate feature code according to key decoding; analyze macro block level bit stream to extract watermark; p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an H.264_advanced video coding (AVC)-video-stream-integrity-based fragile watermark authentication method, which comprises the following steps of: replacing a corresponding codeword by adopting adaptive variable length coding and exponential Golomb coding in an H.264_AVC compressed bit stream to embed watermark information; resolving the H.264 slice-level compressed bit stream, and performing decoding to generate a feature code according to a key; resolving a macro block-level bit stream and extracting watermark; and performing integrity authentication on a video frame according to the decrypted feature code and the extracted watermark. By the method, the watermark is embedded and extracted based on the compressed bit stream, so the method is low in computational complexity and relatively more practical; after the watermark is embedded, the length of the codeword is unchanged, and video distortion is relatively lower; and the rapid extraction of the watermark can be realized, and the requirements of real-time video processing can be met.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for authenticating a fragile watermark based on the integrity of an H.264_AVC video stream. Background technique [0002] With the rapid development of multimedia network technology, the exchange of digital multimedia information, especially video information, has reached an unprecedented level. However, video information is extremely vulnerable to various unintentional or intentional tampering attacks during transmission, which makes people doubt the integrity of video information and the authenticity of content. If tampering involves important content such as national security and court evidence, it may cause serious consequences. Therefore, how to effectively protect the authenticity and integrity of video information content in the network environment has become a research hotspot in the field of multimedia information security in recent years. As a secure co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N7/26H04N7/46H04N7/50H04N19/184H04N19/467
Inventor 罗笑南刘海亮杨艾琳陈湘萍苏航
Owner RES INST OF SUN YAT SEN UNIV & SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products