Hướng phát triển

Một phần của tài liệu MÔ HÌNH CHỨNG THỰC BỀN VỮNG TRÊN VIDEO H.264/AVC DỰA TRÊN ĐẶC TRƯNG VÂN TAY (Trang 106 - 114)

Mô hình chứng thực được đề xuất dựa trên đặc trưng vân tay trong video H.264/AVC khá là hiệu quả. Tuy nhiên chương trình thực nghiệm, còn nhiều hạn chế. Do đó, tương lai sắp tới sẽ tiến hành cải tiến chương trình thực nghiệm: mua bản quyền phầm mềm Mediasuite.net, hoặc kiếm một thư viện mã nguồn mở nào đó hỗ trợ việc giải nén và nén H.264/AVC tốt hơn.

Tiến hành triển khai, thử nghiệm mô hình chứng thực trên các chuẩn video nén thông dụng khác như MPEG, DivX, ……

DANH MC CÔNG TRÌNH CA TÁC GI

1. Le T. H. Ngan, Nguyen. K. Hung, and Le H. Bac, “Literature Survey on Image Watermarking Tools, Watermark Attacks, and Benchmarking Tools”, The Second International Conferences on Advances in Multimedia, MMEDIA 2010, Greece, pp. 67-73, 2010.

2. Le T. H. Ngan, Nguyen. K. Hung, and Le H. Bac, “A Robust Biometric Watermark-Based Authentication Scheme”, The Fifth International Conferences on Digital Information Management, ICDIM 2010, Canada, 2010.

TÀI LIU THAM KHO

Tiếng Việt

[1] Nguyễn Kim Hưng, Luận văn Cử Nhân Tin Học, “Phương pháp ẩn vân tay vào ảnh”, Khoa Công Nghệ Thông Tin, Đại Học Khoa Học Tự

Nhiên, Tp. HCM, 2008.

[2] Nguyễn Xuân Huy, Trần Quốc Dũng, “An Image Watermarking Algorithm Using DCT Domain”, viện công nghệ thông tin, trung tâm khoa học tự nhiên và công nghệ quốc gia, 4/6/2002.

[3] Trần Nguyên Đại Hãn, Lê Nguyên Toàn, Luận văn Cử Nhân Tin Học, “Thiết kế và xây dựng H.264 Decoder trên nền tảng NXP TRIMEDIA”, Khoa Công Nghệ Thông Tin, Đại Học Khoa Học Tự Nhiên, Tp. HCM, 2008.

Tiếng Anh

[4] A. K. Jane, and U. Uludag, “Hiding Fingerprint Minutiae in Images”,

Proceeding of Third Workshop on Automatic Identification Advanced Technologies (AutoID), 2002.

[5] A. K. Jane, U. Uludag, and R. L. Hsu, “Hiding a Face in a Fingerprint Image”, Proceedings of the 16th International Conference on Pattern Recognition (ICPR’02), Vol. 3, pp. 30756, 2002.

[6] A. Piva, M. Barni, F. Bartolini, V. Cappellini, A. De Rosa, and M. Orlandi, “Improving DFT Watermarking robustness through optimum detection and synchronisation”, Proceeding Of ACM Workshop on Multimedia and Sercurity ’99, Orlando, Florida, Oct 1999.

[7] B. Gunsel, U. Uludag, and A. M. Tekalp, “Robust watermarking of fingerprint images,” Pattern Recognition, vol. 35, no. 12, pp. 2739–2747, Dec. 2002.

[8] C. M. Holt, and A. Stewart, “A parallel thinning algorithm with fine grain subtasking”, ParallelComputing, Vol. 10, pp. 329–334, 1989.

[9] D. Choia, H. Doa, H. Choib, and T. Kim, “A blind mpeg-2 video watermarking robust to camcorder recording,” Signal Processing, October 2009.

[10] D. E. Lane, “Video- in-Video Data Hiding”, 1999.

[11] D. Pröfrock, M. Schlauweg, and E. Müller, “A new uncompressed- domain video Watermarking approach robust to H.264/AVC compression,”

Proc. of the IASTED Int. Conf. on Signal Processing, Pattern Recognition, and Applications, pp. 99–104, 2006.

[12] D. Pröfrock, H. Richter, M. Schlauweg, and E. Müller, “H.264/AVC Video Authentication Using Skipped Macroblocks for an Erasable Watermark”, Proc. SPIE Visual Communications and Image Processing, Vol. 5960, pp. 1480-1489, 2005.

[13] D. Zou, and J. A. Bloom, “H.264/AVC Stream Replacement Technique for Video Watermarking”, IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008.

[14] D. Zou, and J. A. Bloom, "H.264/AVC Substitution Watermarking: A CAVLC Example", Media Forensics and Security XI; Edward J. Delp, Jana Dittmann, Nasir D. Memon, and Ping Wah Wong, Editors; Proceedings of SPIE, Vol. 7254, 2009.

[15] D. Wu, W. Kong, B. Yang, and X. Niu, “A fast SVD based video Watermarking algorithm compatible with MPEG2 Standard,” Soft Computing Vol. 13, Issue 4, pp. 375-382, 2009.

[16] F. Deguillaume, G. Csurka, J. O'Ruanaidh, and T. Pun, "Robust 3D DFT video Watermarking", proceeding of the SPIE, vol. 3657, pp. 113-124, 1999.

[17] F. Hartung and B. Girod, “Digital Watermarking of raw and compressed video,” Digital Compression Technologies and Systems for Video Communications, Vol. 2952, pp. 205-213, Sep 1996.

[18] F. Jordan, M. Kutter and T. Ebrahimi, “Proposal of Watermarking Technique for Hiding/Retrieving Data in Compressed and Decompressed Video,” Technical report M2281, ISO/IEC document, JTC1/SC29/WG11, 1997.

[19] F. W. M. Stentiford, “Some new heuristics for thinning binary handprinted characters for OCR,” Transactions on Systems, Man, and Cybernetics, Vol. 13, No. 1, pp. 81-84, 1983.

[20] Federal Bureau of Investigation (FBI) John Edgar Hoover, “The Science of Fingerprints: Classification and Uses”, U.S. Government Printing Office, Washington D.C, 2006. (adsbygoogle = window.adsbygoogle || []).push({});

[21] G.C. Langelaar, and R.L. Lagendijk, “Optimal differential energy Watermarking of DCT encoded images and videos,” IEEE Transaction Image Processing, Vol. 10, Issue 1, pp. 148 – 158, 2001.

[22] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, "Real-time labeling of MPEG-2 compressed video," journal of visual communication and image representation, Vol. 9, pp. 256-270, 1998.

[23] G. Qiu, P. Marziliano, A. Ho, D. He, and Q. Sun, “A hybrid Watermarking scheme for H.264/AVC video,” in Proceedings of the 17th International Conference on Pattern Recognition, ICPR, vol. 4, pp. 865–868, 2004.

[24] Iain E.G. Richardson, “H.264 and MPEG-4 video compression”, Wiley, 2003.

[25] J. J. Chae, “Robust Techniques for Hiding Data in Images and Video”, Ph.D. Dissertation, UCSB, June 1999.

[26] J. Sun and J. Liu, “A novel blind video Watermarking scheme based on independent dynamic component,” Multidimensional Systems and Signal Processing, Vol. 17, No. 1, pp. 59-74, Jan 2006.

[27] J. Zhang, A. Ho, G. Qiu, and P. Marziliano, “Robust video Watermarking of H.264/AVC,” in IEEE Transactions on Circuits and System-II: Express Briefs, vol. 54, no. 2, pp. 205–209, February 2007.

[28] J. Zhang, J. Li, and L. Zhang, “Video Watermark Technique in Motion Vector,” XIV Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'01), pp.179, 2001.

[29] H. X. Wang, Y. N. Li, Z. M. Lu and S. H. Sun, “Compressed Domain Video Watermarking in Motion Vector,” Knowledge-Based Intelligent Information and Engineering Systems, 2005.

[30] K. Ntalianis, A. Doulamis, N. Doulamis, and S. Kollias, “An Automatic Scheme for Stereoscopic Video Object-based Watermarking Using Qualified Significant Wavelet Trees,” IEEE International Conference οn Image Processing (ICIP), Vol. 3, pp. 501-504, NY USA, Sep 2002.

[31] L. Ghouti, and A. Bouridane, “Data Hiding in Fingerprint Images”,

European Signal Processing Conference (Eusipco), Warsaw, Poland, September 2006.

[32] L. Hong, Y. Wang, and A. K. Jain, “Fingerprint image enhancement: Algorithm and performance evaluation”, Transactions on PAMI, August 1998.

[33] L. S. Liu, R. H. Li, and Q. Gao, “A robust video Watermarking scheme based on DCT”, Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on Volume 8, pp. 5176 – 5180, Aug. 2005.

[34] Le T. H. Ngan, Nguyen. K. Hung, and Le H. Bac, “A Robust Biometric Watermark-Based Authentication Scheme”, The Fifth International Conferences on Digital Information Management, ICDIM 2010, Canada, 2010.

[35] LU Chun-Shien, CHEN Jan-Ru and FAN Kuo-Chin, “Real-time frame-dependent video Watermarking in VLC domain,” Signal processing, Vol. 20, No. 7, pp. 624-642, 2005.

[36] M. D. Swanson, B. Zhu, and A. H. Tewfik, "Multiresolution scene- based video Watermarking using perceptual models," IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 540-550, 1998.

[37] M. D. Swanson, B. Zhu, B. Chau, and A. H. Tewfik, “Object-based transparent video Watermarking,” Proceedings IEEE Workshop on Multimedia Signal Processing, New Jersey, USA, Jun 1997.

[38] M. Noorkami and R. M. Mersereau, “Compressed-domain video Watermarking for H.264,” in Proceedings of the International Conference on Image Processing, ICIP, vol. 2, pp. 890–893, September 2005.

[39] N. K. Ratha, J. H. Connell, and R. M. Bolle, “Secure data hiding in wavelet compressed fingerprint images,” in Proc. ACM Multimedia, pp. 127–130, Oct. 2000.

[40] N. Ratha, S. Chen, and A. K. Jain, “Adaptive flow orientation based feature extraction in fingerprint images”, Pattern Recognition, 1995.

[41] P. C. Su, and I. F. Chen, “A digital watermarking scheme for authenticating H.264/AVC Compressed Video”, 2008 ICS, Feb. 2009.

[42] P. W. Chan, M. R. Lyu, and R. T. Chin, “Copyright Protection on the Web: A Hybrid Digital Video Watermarking Scheme,” Proceedings of the 13th International World Wide Web Conference (WWW ‘04), New York, pp.354-355, May 2004.

[43] P. Wang, Z. Zheng, and J. YingA novel video Watermark technique in motion vectors,” International Conference onAudio, Language and Image Processing (ICALIP2008), pp. 1555 – 1559, Jul 2008.

[44] R. Thai, “Fingerprint Image Enhancement and Minutiae Extraction”, submitted by the Honours Programme of the School of Computer Science and Software engineering, The University of Western Australia, 2003.

[45] S. Jiande, and L. Ju, “A blind video Watermarking scheme based on ICA and shot segmentation,” Science in China Series F: Information Sciences, Vol. 49, No. 3, Jun 2006.

[46] Shahabuddin, S.; Iqbal, R.; Shirmohammadi, S.; Jiying Zhao; “Compressed-domain temporal adaptation-resilient watermarking for H.264 video authentication”, Multimedia and Expo, 2009. ICME 2009. IEEE International Conference, New York, August 2009.

[47] T. Polyák, G. Fehér, “Robust Block Selection for Watermarking Video Streams”, Proceedings of the World Congress on Engineering 2008 Vol I, WCE 2008, London, U.K, July 2 - 4, 2008.

[48] T. Y. Zhang, and C. Y. Suen, “A fast parallel algorithm for thinning digital patterns”, Communications of the ACM, Vol. 27, Issue 3, pp. 236 - 239, 1986.

[49] W. Kong, B. Yang, D. Wu, X Niu, “A svd based blind video Watermarking algorithm”, In Proceedings of IEEE international conference on innoveative computering, information and control, vol.1, pp. 265–268, 2006. (adsbygoogle = window.adsbygoogle || []).push({});

[50] X. Bian and Q. Zhu, “Video protection for MPEG-4 FGS with Watermarking,” Multimedia Tools and Applications, Vol.40, No.1, Oct 2008. [51] X. Wu, W. Zhu, Z. Xiong, and Y.-Q. Zhang, “Object-based multi-

resolution Watermarking of images and video,” Proceedings IEEE ISCAS, Geneva, May 2000.

[52] Y. Liu and J. Zhao, “A new video Watermarking algorithm based on 1D DFT and Radon transform, ” Signal Processing, Vol. 90, Issue 2, Feb 2010.

[53] Y. Wanga, Z. Lua, L. Fana and Y. Zheng, “Robust dual watermarking algorithm for AVS video,” Signal Processing: Image Communication, Vol. 24, Issue 4, pp. 333-344, Apr 2009.

[54] Z. Sun, J. Liu, J. Sun, X. Sun and J. Ling, “A motion location based video Watermarking scheme using ICA to extract dynamic frames,” Neural Computing & Applications, Vol. 18, No. 5, Jun 2009.

Một phần của tài liệu MÔ HÌNH CHỨNG THỰC BỀN VỮNG TRÊN VIDEO H.264/AVC DỰA TRÊN ĐẶC TRƯNG VÂN TAY (Trang 106 - 114)