J4 ›› 2013, Vol. 40 ›› Issue (4): 6-13.doi: 10.3969/j.issn.1001-2400.2013.04.002

• 研究论文 • 上一篇    下一篇



  1. (1. 西安电子科技大学 电子工程学院,陕西 西安  710071;
    2. 西安电子科技大学 通信工程学院,陕西 西安  710071)
  • 收稿日期:2012-03-15 出版日期:2013-08-20 发布日期:2013-10-10
  • 通讯作者: 同鸣
  • 作者简介:同鸣(1963-),女,教授,博士,E-mail: mtong@xidian.edu.cn.
  • 基金资助:


Multiple watermarking framework of video content oriented AVS

TONG Ming1;WU Yangcheng1;ZHANG Jianlong1;LUAN Yingzi2   

  1. (1. School of Electronic Engineering, Xidian Univ., Xi'an  710071, China;
    2. School of Telecommunication Engineering, Xidian Univ., Xi'an  710071, China)
  • Received:2012-03-15 Online:2013-08-20 Published:2013-10-10
  • Contact: TONG Ming


提出了一种稀疏约束的非负矩阵分解方法,利用该方法提取视频运动分量,利用离散余弦变换(DCT)变换的交流(AC)能量系数提取视频纹理特征,采用两种特征分量的线性组合自适应控制水印的嵌入位置和强度; 根据视频I帧宏块能量生成动态鲁棒水印和两类脆弱水印,分别用于检测攻击位置和恢复攻击位置; 将鲁棒和脆弱水印分别嵌入在I帧亮度子块的DCT中频和高频最大系数上.实验表明,文中的鲁棒水印对常规攻击和视频特有攻击都表现出强的鲁棒性,两类脆弱水印混合检测机制,对篡改敏感、定位准确,时域同步攻击下能够精确恢复出受攻击的视频帧位置; 文中提取水印不需要完全解码,可满足实时检测需求.

关键词: 数字水印, 版权保护, 内容认证, 视频恢复, 数字音视频编解码标准


Firstly, a non-negative matrix factorization with sparseness constraints on the parts (NMFSCP) method is proposed, which is used to extract the video movement component. The AC energy coefficients of DCT transformation are used as the texture feature simultaneously. Then the linear combination of two video features above is used to adjust the location and strength of the watermark adaptively. Secondly, one dynamic robust watermark and two fragile watermarks are generated according to the energy of the I-frame macro-block, which are used to detect and restore the attack position respectively. Finally, the robust watermark and two fragile watermarks are embedded into the medium and high frequency DCT coefficients which are the biggest of the luminance blocks in the I-frame respectively. Simulation results show that the embedded robust watermark is robust not only to general attacks but also to video special attacks, and that the mixture recovery detection mechanism based on two types of fragile watermarking is sensitive to tamper, has good accuracy of tamper localization and can recover the video frame location under the time-resynchronization attacks. The video stream need not be decoded completely for watermark extraction in this paper, so it meets the needs of real-time detection.

Key words: watermarking, copyright protection, content authentication, video recovery, audio video coding standard


  • TP391