[1] Hernandez A C, Hernandez M C, Vazquez M G. Transcoding resilient video watermarking schemebased on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97: 40-54.
[2] Xu D W, Wang R D, Wang J C. A novel watermarking scheme for H.264/AVC video authentication[J]. Signal Processing: Image Communication, 2011, 26: 267-279.
[3] Tian L H, Zheng N N, Xue J R. Authentication and copyright protection watermarkingscheme for H.264 based on visual saliency and secret sharing [J]. Multimed Tools Appl, 2015, 74: 2991-3011.
[4] Wei H R, Kou Z Y. Research and application of digital watermarkfor video copyright protection[J]. International Conference on Computational Intelligence and Security, 2009, 246-250.
[5] Li Q, Wang R D, Xu D W. Fragile video watermarking algorithm based on H.264/AVC [J]. Materials Research Innovations, 2013, 17(s1): 94-100.
[6] Chen H Y, Zhu Y S. A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique [J]. Multimedia Tool & Applications, 2012, 71(3): 991-1012.
[7] Liu Z, Li Q, Guan S, Peng X Y. A robust watermarking algorithm based on differential energy and QIM for uncompressed video [C]//15th international Conference, Intelligent Information Hiding and Multimedia Signal Processing, 2009: 382-385.
[8] Fallahpour M, Shirmohammadi S, Semsarzadeh M. Tampering detection in compressed digital video using watermarking [J]. IEEE Transactions on Instrumentation and Measurement, 2014, 63(5): 1057-1072.
[9] Crandall R. Some notes on steganography. steganography mailing list [Online]. http://os.inf.tu-dresden.de/westfeld/crandall.pdf.
[10] Morelos-Zaragoza R H. The art of error correcting coding [M]. [s.l.]: Wiley, 2006.
[11] Zhang W, Wang S, Zhang X. Improving embedding efficiencyof covering codes for applications in steganography [J]. IEEE Communications Letters, 2007, 11(8): 680-682.
[12] 张立和,杨成,孔祥维. 基于运动矢量统计的同步视频水印算法[J]. 光电子·激光,2007, 2: 236-240. Zhang L H, Yang C, Kong X W. Video watermarking synchronization based on motion vector statistic [J]. Journal of Optoe lectronics·Laser, 2007, 18(2): 236-240. (in Chinese)
[13] 曾骁,陈真勇,范围,陈辉,熊璋. 用于内容认证的半脆弱可逆视频水印算法[J]. 中国图象图形学 报,2010, 15(8): 1189-1195. Zeng X, Chen Z Y, Fan W, Chen H, Xiong Z. Invertible semi-fragile video watermarking algorithm used for content authentication [J]. Journal of Image and Graphic, 2010, 15(8): 1189-1195. (in Chinese)
[14] Cedillo-Hernandez A, Cedillo-Hernandez M, Garcia-Vazquez M, Nakano-Miyatake M, Perez-Meana H. Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97(7): 40-54.
[15] Lee M J, Im D H, Lee H Y, Kim K S, Lee H K. Real-time video watermarking system on the compressed domain for high definition video contents: practical issues [J]. Digital Signal Processing, 2012(22): 190-198.
[16] Preda R., Vizireanu D N. Robust wavelet-based video watermarking scheme for copyright protection using the human visual system [J]. Journal of Electronic Imaging, 2012(20): 013022-1-013022-8.
[17] Ling H, Wang L, Zou F. Robust video watermarking based on affine invariant regions in the compressed domain [J]. Signal Processing, 2011, 91(8): 1863-1875.
[18] Achanta R, Shaji A. Smith K, Lucchi A, Fua P, Süstrunk S. SLIC superpixels compared to state-of-the-art superpixel methods [J]. IEEE Pattern Analysis and Machine Intelligence 2012, 34(11): 2274-2282.
[19] Chang C C, Kieu T D, Chou Y C. A high payload steganographic scheme based on (7,4) Hamming code for digital images [C]//Internatimal Symposium on Electronic Commerce and Security, 2008: 16-21. |