WO2007025476A1 - Multimedia communication transport protection method - Google Patents

Multimedia communication transport protection method Download PDF

Info

Publication number
WO2007025476A1
WO2007025476A1 PCT/CN2006/002232 CN2006002232W WO2007025476A1 WO 2007025476 A1 WO2007025476 A1 WO 2007025476A1 CN 2006002232 W CN2006002232 W CN 2006002232W WO 2007025476 A1 WO2007025476 A1 WO 2007025476A1
Authority
WO
WIPO (PCT)
Prior art keywords
block
data
key data
current block
backup
Prior art date
Application number
PCT/CN2006/002232
Other languages
French (fr)
Chinese (zh)
Inventor
Zhong Luo
Fuzheng Yang
Shuai Wan
Yilin Chang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2007025476A1 publication Critical patent/WO2007025476A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/85Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression
    • H04N19/89Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression involving methods or arrangements for detection of transmission errors at the decoder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking

Definitions

  • the present invention relates to a multimedia communication method, and more particularly to a transmission protection method for multimedia communication. Background technique
  • Multimedia communication is widely used in communications, computers, radio and television, etc., bringing a series of applications such as conference TV, videophone, digital TV, media storage, etc., which has led to the emergence of many video coding standards.
  • International Telecommunication Union Telecommunication Standardization Sector (“ITU-T”) and International Standardization Organization (“ISO”), International Electrotechnical Commission (“IEC”)
  • ISO International Standardization Organization
  • IEC International Electrotechnical Commission
  • MPEG Moving Picture Expert Group
  • ITU-T standards include H.261, H.263, 1-1.263+, H.263++, H.264 and other video compression coding standards, mainly used in real-time video communication, such as conference television; MPEG series standard MPEG -3, MPEG-4, mainly used in video storage, broadcast TV, Internet or streaming media on the wireless network.
  • the two organizations have also developed a number of standards.
  • the I- 1.262 standard is equivalent to the MPEG-2 video coding standard, and the latest I- 1.264 standard is included in Part 10 of MPEG-4.
  • H.261 is developed by ITU-T for two-way audio and video services (video telephony, video conferencing) on the Integrated Services Digital Network (ISDN) at a rate of 64 kb/s. .
  • Each frame of H.261 is divided into an image frame layer, a Group of Block ("GOB”) layer, a Macro Block (“MB”) layer, and a Block (Block) layer.
  • H.261 is the earliest motion image compression standard, which specifies the various parts of video coding, including motion compensated interframe prediction, discrete cosine transform (“DCT”) transform, quantization, entropy coding, and A portion of rate control that is adapted to a fixed rate channel.
  • DCT discrete cosine transform
  • H.263 based on H.261 was the earliest ITU-T standard for low bit rate video coding, and the second editions ( ⁇ 2 6 3 + ) and ⁇ .263++ that appeared later added many options to It has a wider range of applicability.
  • the motion vector mode of I- 1.263 allows motion vectors to point to areas outside the image. When a certain transport When the reference macroblock pointed to by the motion vector is located outside the coded image, it is replaced by the image pixel value of its edge to obtain a large coding gain.
  • the advanced prediction mode allows four 8x8 luma blocks in a macroblock to correspond to one motion vector, thereby improving the prediction accuracy; the motion vectors of the two chroma blocks take the average of the four luma block motion vectors.
  • overlapping block motion compensation is used, and the compensation value of each pixel of the 8 8 luminance block is obtained by weighted averaging of 3 prediction values. Using this mode can produce significant coding gains, especially with overlapping block motion compensation, which reduces blockiness and improves subjective quality.
  • H.261 and I- 1.263 are widely used in video communication, and there are many mature products.
  • I- 1.263 adds several options, provides a more flexible coding method, greatly improves compression efficiency, and is more suitable for network transmission.
  • the introduction of the H.264 standard is an important advancement in the video coding standard.
  • MPEG-4 and H.263 it has obvious advantages, especially in coding efficiency. Make it available in many new areas.
  • the algorithm complexity of H.264 is more than four times that of the existing coding compression standard, with the rapid development of integrated circuit technology, the application of H.264 will become a reality.
  • QoS Quality of Service
  • the network especially the Internet or other QoS-guaranteed IP or packet-switched networks, wireless networks, often cause packet loss or packet loss for various reasons, part of the compressed video data will be lost, and the receiver will not be correct.
  • Decoding because there may be correlations between portions of the compressed video stream, so the lost data not only affects the correct decoding of the information it contains, but also the correct decoding of other information that depends on it. Therefore, the necessary error masking must be performed to ensure correct decoding.
  • the error concealment is: for missing information, approximate replacement with information that has been correctly received and correctly decoded, or extrapolate the missing information.
  • Digital media and the Internet have brought great convenience to people's lives.
  • Digital media is easy to access, copy, transfer and edit, but it also brings about violations of digital media copyright and tampering with digital media content.
  • the popularity of the network has made the exchange and transmission of digital media a relatively simple process, and the sharing of information has reached a new level, but at the same time, the chances of information being exposed and the possibility of being attacked are greatly increased. This gave birth to being the earliest used Digital watermarking technology for digital media copyright protection.
  • the digital watermarking technology embeds a series of meaningful or meaningless information in the original media data, so that the watermark information embedded in the original media data always coexists with the original media data, thereby protecting the original media data copyright and content integrity.
  • digital watermarking technology has important applications in many other places.
  • Figure 1 shows the block diagram of the digital watermark.
  • the main media in the figure is generally original or compressed multimedia data such as video and audio, and the data to be hidden is relative to. Only less data.
  • the general mathematical model for watermark embedding and extraction is: Set, represent the original data and the data after embedding the watermark, 6 .
  • the watermark embedded data will be processed to produce a certain distortion, so the watermark detected from the processed data may be different to the original watermark to some extent.
  • Watermark detection technology is generally implemented by classical signal detection technology. As a signal detection technology, it is studied how to determine whether there is a target signal in the noise, such as whether the radar echo signal contains a reflection signal from the target, and if so, How to use the statistical principle to extract the optimal signal. To determine whether there is a signal in the noise, use the Statistic Hypothesis Test/Validation. In the watermark detection, two hypotheses are given first. And according to the result of the test, it is known which ⁇ _ is set to know whether there is a watermark.
  • the UnEqual Protection (UEP) measure refers to a variety of active anti-drop and error-resistance measures for key data in the code stream, such as Forward Error Code (Forward Error Code, The cartridge is called "FEC”, Erasure Codes, etc., and is protected from ordinary data;
  • UDP UnEqual Protection
  • Data Partition refers to the use of a separate stream for key data.
  • the time domain masking method uses the information of adjacent frames on the time axis to estimate the missing data.
  • the method of calculation may be: simply adopting the data of the same position of the adjacent frame instead of the missing data; considering the motion prediction factor, the motion prediction is performed according to the adjacent frame data. In addition to this there are more complicated masking strategies, but the amount of calculation is very large;
  • the spatial domain masking method is to use the spatial adjacent area of the lost data area to perform error concealment.
  • the same method is as follows: simply replace the neighborhood; based on the data fusion, there are multiple spatial neighboring regions to estimate the missing data, such as spatial interpolation; algebraic inversion method, the packet loss process is modeled by a linear model, the input is The data before the packet loss, the output is the correctly received data, using algebraic inversion methods, such as the least squares method, inverting the input from the output, using the inversion result instead of the erroneous data, this method is computationally intensive;
  • the space-time joint masking method is a combination of spatial and temporal error concealment. For example, depending on the characteristics of the lost data and the situation of adjacent time data and spatial data, it is better to use some strategy to determine whether to cover up with spatial domain or time domain, and then implement this better masking strategy, or fuse spatial data and time. Data, together for cover up.
  • error detection and positioning are the premise that the error is correctly covered.
  • the existing error detection method utilizes the characteristics of the video signal to perform error detection; or performs syntax check on the video code stream, such as the occurrence of a variable length code (Variable Length Codes, "VLC") code word, motion vector Beyond the image
  • VLC Variable Length Codes
  • the surrounding or recovered DCT coefficient is out of range, etc., and is considered to be an error caused by a bit error.
  • the method of error detection based on video signal characteristics is based on the assumption that "the video signal is stationary", but this assumption is usually not established in practical systems, so false detection errors often occur; the syntax check method of the code stream is The error location cannot be accurately defined. Therefore, the accuracy of error location using these methods is relatively low, typically 5 - 15%. Therefore, the premise of error concealment is accurate error detection, which means that error detection is the primary task of error concealment (especially wireless channel).
  • the main object of the present invention is to provide a transmission protection method for multimedia communication, which improves the quality of multimedia communication services without increasing the burden on the communication system or the network.
  • the present invention provides a transmission protection method for multimedia communication, including Includes the following steps:
  • A uses the digital watermark at the origin to protect the key data backup
  • the step A includes the following sub-steps:
  • Performing block processing on the multimedia data performing backup encoding on the key data of the current block; embedding the backup code of the key data of the current block into the non-critical data encoding of the protection block corresponding to the current block by digital watermarking;
  • the protection block is different from but corresponding to the current block.
  • step B comprises the following sub-steps:
  • the current block is correct according to the following first criterion: if the key data backup of the current block is consistent with the key data transmitted by itself, or the key data backup of the protected block corresponding to the current block and the protected block itself If the key data transmitted is consistent, the current block is correct.
  • the current block is determined to be erroneous according to the following second criterion: If the key data of the current block is backed up and itself The key data of the transmission is inconsistent and the protection block corresponding to the current block is correct, or the key data backup of the protected block corresponding to the current block is inconsistent with the key data transmitted by the protected block itself and the protected block is correct, the current block error.
  • the multimedia communication is transmitted by using a motion compensation coding method
  • the step B further includes the following sub-steps:
  • the current block is erroneous according to the following third criterion: If the reference code block of the current block is erroneous, the current block is erroneous.
  • the step C includes a sub-step.
  • the key data backup of the current block is used as its key data for decoding.
  • the step C includes a sub-step, and when the current block is wrong, if the corresponding protection block is incorrect, the average value of the key data of the one or more data blocks adjacent to the current block is used. Decode as the key data of the current block.
  • one of the average values is one of:
  • the transmission method of the multimedia communication is H.261, H.263, H.263+, 1-1.263++, H.264, Moving Picture Experts Group Standard 1, Moving Picture Experts Group Standard 2. Any one of part 2 and part 10 of the Moving Picture Experts Group Standard 4.
  • the key data includes:
  • the motion vector of the macroblock, the video sequence structure parameter, the structure parameter of the image frame, the block group structure parameter, the image enhancement information, or the supplemental enhancement information is a motion vector of the macroblock, the video sequence structure parameter, the structure parameter of the image frame, the block group structure parameter, the image enhancement information, or the supplemental enhancement information.
  • the non-critical data is any two coefficients between 7 and 12 in the discrete cosine transform AC coefficient of the color image luminance component signal or the gray signal of the gray image.
  • the backup encoding method of the motion vector includes the following steps: encoding a horizontal component and a vertical component of the motion vector by 4 bits, respectively; wherein the 4-bit encoding corresponds to the horizontal component or The discrete value of any of the 16 reciprocal components of the longitudinal component.
  • the first criterion and the second criterion of the step B determine whether the key data backup is consistent with the key data according to the following fourth criterion:
  • the motion vector backup and the motion vector Consistent If the value of the 8-bit representation of the horizontal component and the vertical component of the motion vector backup code is consistent with the value of the motion vector transmitted by the corresponding data block itself, the motion vector backup and the motion vector Consistent.
  • the multimedia data is an image frame sequence
  • Each of the image frames is divided into at least two data block groups
  • Each of the data block components is at least two of the data blocks;
  • Each of the data blocks includes at least four luminance component signal blocks;
  • a protection block corresponding to each of the data blocks is a data block in the subsequent one of the data block groups that satisfies a preset-correspondence relationship
  • the protected block corresponding to each of the data blocks is a data block in the previous one of the data block groups that satisfies the preset-correspondence relationship;
  • the reference data block corresponding to each of the data blocks is the previous data block in the same data block group.
  • a 'protection block corresponding to each of the data blocks is a data block of the same position in the next one of the data block groups;
  • the protected block corresponding to the data block is the data block of the same position in the previous one of the data block groups.
  • the 8-bit backup code of the motion vector is respectively inserted into the four brightness components or gray levels of the corresponding protection block.
  • the code of the discrete cosine transform AC coefficient of the signal block the code of any two coefficients of the sequence number 7 to 12 may be, for example, two coefficients of 8 and 9.
  • the rules for inserting the motion vector backup encoded bits into the corresponding encoding of the discrete cosine transform coefficients are as follows:
  • the code of the discrete cosine transform is changed to an even or odd code of the value closest to the value before encoding according to the motion vector back-coded bits.
  • step C when the current block is wrong, if the corresponding protection block is correct, the motion vector of the current block is used to back up the position of the reference block of the current block in the previous image frame. And replace the current block with the reference block.
  • step C when the current block is wrong, if the corresponding protection block is wrong, the motion vector of the current image frame adjacent to the current block and the correct one or more data blocks is used.
  • the average is used to reverse the position of the reference block of the current block in the previous image frame and replace the current block with the reference block.
  • the macroblocks in the same position in the front and rear macroblock groups are cyclically backed up each other; 'The motion vector is encoded and then embedded into the relatively unimportant DCT transform coefficients to implement digital watermarking, while ensuring that the video data is as unaffected as possible;
  • the original key data is directly replaced, otherwise the original key data is approximated by the average value of the key data of the adjacent macroblocks in the same frame.
  • the difference in this technical solution brings about a more obvious beneficial effect, that is, the use of the well-designed digital watermarking technology to protect the backup of critical data can not increase the communication system or network burden, and does not affect the transmission quality.
  • the key data protection can be realized conveniently and efficiently, and the combination of error detection and error concealing is realized based on this, thereby greatly improving the quality of multimedia communication services, thereby improving video communication products, such as videophones and third generation mobile terminals.
  • Market competition such as video conferencing and Internet TV.
  • Figure 1 is a schematic diagram of the principle of digital watermarking technology
  • FIG. 2 is a schematic diagram of a transmission system of multimedia communication according to a first embodiment of the present invention
  • FIG. 3 is a flowchart of a transmission protection method for multimedia communication according to first and second embodiments of the present invention
  • FIG. 4 is a schematic diagram of a H.263 video data blocking scheme according to a first embodiment of the present invention
  • FIG. 5 is a schematic diagram of video quality comparison of experimental results according to a third embodiment of the present invention
  • FIG. 6 is a third embodiment according to the present invention.
  • the key idea of the invention is to use digital watermark to embed some watermark data in multimedia data to protect the key data of multimedia communication, such as the protection of motion vector data in many motion prediction coding standards.
  • the key data is embedded in the multimedia data as the watermark in the multimedia compression encoding process at the transmitting end, and becomes the protection redundancy backup of the key data.
  • the key data is backed up in the form of watermark data.
  • the receiver can obtain the important media data and its backup by extracting the watermark data, so as to achieve the purpose of key data protection. When the key data is lost, the backup can be used to recover.
  • the invention is based on the protection of key data by digital watermarking, and the effective error detection method is to detect the error vector by comparing the motion vector extracted from the watermark with the motion vector obtained by video decoding, thereby greatly improving the accuracy of error detection. And using the motion vector extracted from the watermark to mask the error block, the video recovery quality is improved.
  • error concealment can be achieved by replacing critical data with key data backups. , is achieved by a simple alternative to the spatial domain.
  • the present invention is basically implemented in three steps: First, the digital data is used to embed the key data backup at the transmitting end, and the digital watermark can be extracted at the receiving end to obtain the protected key data; secondly, according to the backup of the key data and the transmission of the key data. The comparison of key data, the method of judging whether the relevant multimedia data has a bit error, in order to efficiently detect the occurrence of the error condition; finally, the error occurrence of the errored data is realized.
  • Fig. 2 is a block diagram showing a communication system of a first embodiment of the present invention.
  • the motion vectors obtained in the motion prediction are sent to the VLC module and the watermark embedding module, respectively.
  • the motion vector sent to the VLC module is coded in the normal way and combined into the output code stream (ie, the normal protocol processing flow); and the motion vector sent to the watermark embedding module is processed and superimposed on the quantized DCT coefficient. , then by VLC encoding, compounded to the output stream.
  • Embodiments of the present invention embed key data, ie, motion vectors, into DCT coefficients of a compressed image
  • error detection and masking are performed according to the extracted digital watermark.
  • other non-critical data can also be used as a carrier to embed a watermark backup of key data, thereby achieving the object of the invention without affecting the essence and scope of the present invention.
  • the digital watermark is embedded in the DCT coefficients of the transform domain because the high frequency components in the DCT coefficients have less influence on human vision, so such unimportant data encoding is more suitable for embedding the watermark.
  • the quality of the original video transmission can be protected.
  • digital watermarking technology can be divided into spatial domain digital watermarking technology and transform domain digital watermarking technology.
  • the digital watermarking technique in the spatial domain embeds watermark information directly in the spatial domain of the media, such as embedding information directly in the image pixels.
  • the digital watermarking technique of the transform domain first transforms the media, such as discrete Fourier transform, discrete cosine transform or discrete wavelet transform, and then embeds the watermark information in the transform domain.
  • the transform domain watermarking technique has many advantages over the spatial domain watermarking. For example, the additional image energy caused by the watermark addition can be evenly distributed to the various parts of the embedded image, so that the visible influence of the watermark addition is reduced to a minimum.
  • embodiments of the present invention employ a method of embedding a watermark in a transform domain.
  • Fig. 3 shows the overall flow of the transmission protection method of video communication in the first embodiment of the present invention.
  • step 301 the multimedia data is processed into blocks, and the key data of the current block is back-coded.
  • the processing of video data is performed in blocks.
  • the video stream is divided into image frame sequences, each image frame is divided into multiple GOBs, each GOB corresponds to one row of MB, and each MB contains four 8 ⁇ 8 luminance component signals B1... B4 and 2 color difference components.
  • Figure 4 shows this blocking scheme.
  • Each MB is indicated by two numbers, the first subscript is the line number, which is the GOB number, and the second subscript is the column number, which is the serial number in the GOB.
  • the backup code of the key data is specifically used for the coding before embedding the watermark, and the coding mode can be distinguished from the normal coding mode.
  • the backup coding of the motion vector (MV) is implemented by a quantization method.
  • the motion vector is divided into a horizontal (X) component and a vertical (Y) component, respectively representing the horizontal and vertical displacement of the current macroblock relative to its previous frame reference macroblock. the amount.
  • the two components are respectively encoded by 4 bits, and the 4-bit code can represent 16 code words, corresponding to the following 16 kinds of values representing the horizontal component or the vertical component: less than -3, -3, -2, 5, -2, -1.5, -1, -0.5, 0, 0.5, 1, 1.5, 2, 2.5, 3, 3.5, greater than 3.5.
  • the case where both ends exceed a certain quantization range is represented by one codeword, and such quantization method has good performance and coding efficiency.
  • the values of the individual components of the MV are mainly concentrated near zero, the components of the motion vector obtained by testing a large number of actual video sequences are mainly concentrated in the interval [-2, 2].
  • the value of the component of the motion vector is uniformly quantized in the interval of [-3, 3.5], and each end of the interval is represented by a codeword. . This greatly reduces the amount of MV coding, reduces the amount of data, improves the feasibility of watermark embedding, and also ensures less loss of key data coding.
  • the MV of the previous row can be completely recovered by embedding the correct MV, ⁇ v ⁇ > 3.5, although the damaged MV cannot be recovered.
  • the range of the impact of the error can be determined to achieve the purpose of error detection.
  • the fixed MV (4bit) encoding is used for the embedded MV, so as to facilitate the subsequent error detection.
  • the encoding result corresponding to each component is 0000 to 1111, which can sequentially correspond to the 16 kinds of values described above.
  • Table 1 This table corresponds to a special case, but as a special case, the value can be taken according to the situation in the specific application.
  • step 302 the backup code of the key data of the current block is embedded into the non-critical data code of the protection block corresponding to the current block by digital watermarking.
  • the protection block is different from but corresponding to the current block, that is to say, each data block has another data block as its protection block, and it is itself a protection block of another data block.
  • each layer in the code stream has a corresponding The start code
  • the start code of the GOB plays a synchronous role in the transmission.
  • the motion vector of MB1,m of the previous line MB for example, GOBI
  • the motion vector of MB1,m of the previous line MB can be selected to be protected in the MB2,m of the next line of GOB2, that is, the MB of the corresponding position of the next line of the current MB is its protection block, and the current MB is the same.
  • a row corresponds to the protection block of position MB.
  • the MB corresponding to the position of the previous row is the protected block of the current MB, and if it is the last row, it is protected by the first row.
  • effective backup can be realized. For example, when there is no error in GOB2, even if the data in GOBI is wrong, the key data of GOBI can be restored, which is used for effective error concealment.
  • the content of the data watermark is the key data, that is, the motion vector, and the carrier of the digital watermark is not given.
  • key data that is, the motion vector
  • the carrier of the digital watermark is not given.
  • H.263 is taken as an example, and relatively unimportant data coding is used as a carrier of the watermark to ensure that the transmission quality of the video stream itself is not impaired.
  • the DCT coefficient of the high frequency is selected as the carrier of the watermark in the first embodiment of the present invention for a reason.
  • the direct and low frequency components of the human eye to the video that is, the DC (Direct Current, "DC") coefficient and the low frequency alternating current (AC) coefficient in the DCT coefficient
  • DC Direct Current, "DC”
  • AC alternating current
  • the inter-frame coding mode used in video coding makes the DCT coefficients of the frame difference signals relatively small, especially the high-frequency component coefficients are almost zero.
  • the present invention chooses to embed motion vector information in transform coefficients of luminance signal numbers 8 and 9, namely AC8 and AC9. Experiments show that selecting these two coefficients as the watermark carrier has the best video quality improvement effect.
  • 8-bit information is exactly embedded in the AC8 and AC9 coefficients of the four luminance signals corresponding to the protection block, and a total of 8 coefficients, that is, a watermark with one bit hidden on each AC8 or AC9 quantized coefficient. information.
  • the specific rules for inserting the bit information of the MV backup code into the coding of the corresponding DCT coefficient are as follows: The bit coded according to the MV backup is 0 or 1, and the code of the DCT is changed to the even or odd code closest to the value before the encoding. If it is, it does not need to change.
  • LEVEL LEVEL + ALEVEL.
  • the correspondence between the embedded information 6 and M £ £ is required as follows Even or odd.
  • the EL should be as small as possible, that is, the DCT coefficients before the quantization corresponding to LEVEL and MLEVEL should be as close as possible. Therefore, in the first implementation of the present invention, the specific embedding algorithm is expressed as:
  • VLC encoding is performed using ⁇ 3 ⁇ 4 as the quantized value of iC, / -8 , 9 , at the time of encoding.
  • the digital watermark is extracted at the receiving end to obtain key data backup, and the multimedia data error is detected by the digital data.
  • step 303 the digital watermark is extracted from all the protected blocks to obtain a key data backup of the corresponding protected block.
  • the method of extracting digital watermark is simple. It only needs to judge according to the quantized value of AC8 and AC9 of video decoding, and judge the value of corresponding watermark bit according to its parity, which is expressed by the following formula:
  • step 304 the error condition is further detected based on the comparison of the recovered key data backup and the key data transmitted by the normal channel itself.
  • the current block is correct according to the following first criterion: if the key data backup of the current block is consistent with the key data transmitted by itself, or the key data backup of the protected block corresponding to the current block is transmitted by the protected block itself. The key data is consistent, then the current block is correct.
  • the current block determines whether the current block is erroneous according to the following second criterion: if the key data backup of the current block is inconsistent with the key data transmitted by itself and the protection corresponding to the current block If the block is correct, or the key data backup of the protected block corresponding to the current block is inconsistent with the key data transmitted by the protected block itself and the protected block is correct, the current block is incorrect.
  • the second criterion determine whether the current block is wrong according to the following third criterion: If the current block is referenced If the encoding block is wrong, the current block is wrong. This is because for each data block, its encoding is based on its reference block, so the current block cannot be decoded with reference to the block error.
  • the first criterion the first In the second criterion, it is judged whether the key data backup is consistent with the key data according to the following fourth criterion: if the motion vector backup code has a total of 8 bits of the horizontal component and the vertical component, and the motion vector of the corresponding data block itself is transmitted. If the value is consistent, the motion vector backup is consistent with the motion vector.
  • each MB is checked one by one, and the motion vector obtained from the VLC decoding and the motion vector extracted from the embedded watermark are compared to detect whether there is a bit error.
  • the MV protected for it is backed up as MV, which is itself protected by ML, and the protected MV is backed up as MV.
  • the MV transmitted by the protected block itself is ⁇ and the reference MB corresponding to each MB For the previous MB in the same GOB, that is, the reference MB is -,.
  • the priority order is set from the highest to the lowest, and the first criterion, the second criterion, the third criterion, and the fourth criterion.
  • the conclusions after the high-priority criteria are judged, the low-priority criteria must not be overturned. For example, if the first criterion determines that the current block is correct, then the current block is no longer determined in the third criterion.
  • the fourth criterion whether the MV components are equal according to the code words of the backup encoding is determined, which is equal to whether the MV values are equal or not.
  • the MV range exceeds the uniform quantization range [-3, 3.5], this is itself a small probability event. If ⁇ , , , and ⁇ nie are also out of range, they can be enlarged. They are considered to be equal in probability.
  • step 305 it is determined whether the current block is erroneous. If yes, the process proceeds to step 306; otherwise, the process ends.
  • step 306 it is judged whether the corresponding protection block of the current block is correct. If it is correct, the process proceeds to step 307; otherwise, the process proceeds to step 308.
  • step 307 that is, in the case of the current block error, the corresponding protection block is correct, since the key data backup is correct, it can be used to restore the original key data. Therefore, when the current block is wrong, if the corresponding protection block is correct, the key data backup of the current block is used as its key data for decoding.
  • the position of the reference block in the previous image frame of the current block is reversed with the motion vector backup of the current block, and the current block is replaced with the reference block.
  • the protection block that is, MV:, m is correct
  • MV:,, m is used to mask the error of MB,,,,,,. That is, using MV as the motion vector, and then from MK, "to push back ,”, in the previous frame, refer to the position of the macroblock, and set the reference macroblock to furnace, criz, , superscript ref denotes reference frame , then replace the data with fine re/ ,,,,,, , ,.,”.
  • step 308 that is, in the case of the current block error, and the corresponding protection block is also wrong, the average value of the key data of one or more data blocks adjacent to the current block and the correct block is used as the key data of the current block for decoding. .
  • the reference block of the current block in the previous image frame is reversed with the average of the motion vectors of the one or more data blocks adjacent to the current block in the current image frame. Position, and replace the current block with the reference block.
  • H.263 Take H.263 as an example, in the vicinity of 8 macroblocks (up, down, left, right, top left, top right, bottom left, bottom right), for those macroblocks with correct data ( The number may be less than 8).
  • the new vector is used as the motion vector of MB,,.,,, and then K, ,,,,,RIC to reverse M, possiblyrefer to the position of the macroblock in the previous frame, and set the reference macroblock to MB, mecanic And then use ⁇ think data to replace,, ,,,,.
  • the third embodiment of the present invention applies the video transmission protection method to the ⁇ .263 video transmission based on the first embodiment, and performs experiments using the international standard image sequences "Foreman” and "Claire". The effectiveness of the present invention is well demonstrated.
  • the left and right figures shown in Fig. 5 are the comparison of the restored images obtained by the 16th frame image of the Foreman sequence in the case of the general error concealing method and the method of the present invention, respectively. It can be seen that with the method of the present invention, the subjective quality of the restored image is significantly improved.
  • the two graphs given in Figure 6 are the average peak signal-to-noise ratios of the recovered video at the decoder end in the Foreman and Claire experiments at different bit error rates, using both the general error masking method and the method of the present invention.
  • Peak Signal Noise Rate referred to as "PSNR”.
  • PSNR Peak Signal Noise Rate
  • the digital watermarking method of the present invention is not employed, but the method of separately transmitting the motion vector is used for error concealment, the increased code traffic is as high as 8.8% - 35.2%. In comparison, the performance of the method of the present invention is superior to the general error masking algorithm.
  • H.263 is taken as an example, but the transmission protection method can be directly applied to other standards, such as H.261, 1-1.263, 1-1.263+, H.263++, H.264, MPEG-1, MPEG-. 2, MPEG-4, and other block-based DCT (Block-based DCT, "B-DCT”) standard or non-standard multimedia transmission technology, can be used in any of these feasible technologies to achieve the purpose of the invention without affecting Its essence and scope.
  • motion vectors are used as key data for protection and error concealment, and when the method is also applicable to protection of video key data other than motion vectors,
  • video sequence structure parameters image frame structure parameters, block group (GOB) structure parameters, PEI information, Supplemental Enhancement Information (SEI), etc.
  • SEI Supplemental Enhancement Information

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

An transport protection method for multimedia video or still image communication in multimedia communication field, can improve quality of multimedia communication service with the precondition of no burden increase of communication systems or network. Wherein, the key data information is concealed in encoded key-not data information in the compressed images by using digital watermark technique; and the normally transmitted key data is detected right or not through the key data protection backup protected by digital watermarks, therefore, error in transport can be detected; the blocks at the same position in the fore-and-aft block groups are performed reciprocal backup circularly; the motion vector is performed encode, then is embedded into the DCT transform coefficients correspondingly unimportant with form of digital watermark, at the same time, it must ensure the video data not to be influenced as possible; when happened error, if the key data backup is right, it will be used to displace the original key data directly, if not, the average value of the neighbor block key data in the same frame will be used to displace the original key data approximatively.

Description

多媒体通信的传输保护方法  Transmission protection method for multimedia communication
技术领域 Technical field
本发明涉及多媒体通信方法, 特别涉及多媒体通信的传输保护方法。 背景技术  The present invention relates to a multimedia communication method, and more particularly to a transmission protection method for multimedia communication. Background technique
多媒体通信尤其是数字视频技术广泛应用于通信、 计算机、 广播电视 等领域, 带来了会议电视、可视电话及数字电视、媒体存储等一系列应用, 促使了许多视频编码标准的产生。 国际电信联盟电信标准部(International Telecommunication Union Telecommunication Standardization Sector, 简称 "ITU-T" )与国际标准化组织 ( International Standardization Organization, 简称 "ISO" )、 国际电工委员会 ( International Electrotechnical Commission, 简称 "IEC" ) 的运动图像专家组 (Moving Picture Expert Group , 简称 "MPEG" )是制定视频编码标准的两大組织。 ITU- T的标准包括 H.261、 H.263、 1-1.263+、 H.263++, H.264等视频压缩编码标准, 主要应用于实时 视频通信领域, 如会议电视; MPEG 系列标准 MPEG-3、 MPEG-4, 主要 应用于视频存储、 广播电视、 因特网或无线网上的流媒体等。 两个组织也 共同制定了一些标准, I- 1.262标准等同于 MPEG-2的视频编码标准 , 而最 新的 I- 1.264标准则被纳入 MPEG-4的第 10部分。  Multimedia communication, especially digital video technology, is widely used in communications, computers, radio and television, etc., bringing a series of applications such as conference TV, videophone, digital TV, media storage, etc., which has led to the emergence of many video coding standards. International Telecommunication Union Telecommunication Standardization Sector ("ITU-T") and International Standardization Organization ("ISO"), International Electrotechnical Commission ("IEC") The Moving Picture Expert Group ("MPEG") is the two organizations that develop video coding standards. ITU-T standards include H.261, H.263, 1-1.263+, H.263++, H.264 and other video compression coding standards, mainly used in real-time video communication, such as conference television; MPEG series standard MPEG -3, MPEG-4, mainly used in video storage, broadcast TV, Internet or streaming media on the wireless network. The two organizations have also developed a number of standards. The I- 1.262 standard is equivalent to the MPEG-2 video coding standard, and the latest I- 1.264 standard is included in Part 10 of MPEG-4.
H.261 是 ITU-T 为在综合业务数字网 (Integrated Services Digital Network, 简称 "ISDN" )上开展双向声像业务(可视电话、 视频会议) 而制定的, 速率为 64kb/s的整数倍。 H.261的每帧图像分成图像帧层、 宏 块组(Group of Block, 简称 "GOB" )层、宏块( Macro Block, 简称 "MB" ) 层、 块(Block )层来处理。 H.261是最早的运动图像压缩标准, 它详细制 定了视频编码的各个部分, 包括运动补偿的帧间预测、 离散余弦变换 ( Digital Cosine Transform, 简称 "DCT" ) 变换、 量化、 熵编码, 以及与 固定速率的信道相适配的速率控制等部分。 基于 H.261发展的 H.263是 最早用于低码率视频编码的 ITU-T标准, 随后出现的第二版(Η·263+ )及 Η.263++增加了许多选项, 使其具有更广泛的适用性。 H.261 is developed by ITU-T for two-way audio and video services (video telephony, video conferencing) on the Integrated Services Digital Network (ISDN) at a rate of 64 kb/s. . Each frame of H.261 is divided into an image frame layer, a Group of Block ("GOB") layer, a Macro Block ("MB") layer, and a Block (Block) layer. H.261 is the earliest motion image compression standard, which specifies the various parts of video coding, including motion compensated interframe prediction, discrete cosine transform ("DCT") transform, quantization, entropy coding, and A portion of rate control that is adapted to a fixed rate channel. H.263 based on H.261 was the earliest ITU-T standard for low bit rate video coding, and the second editions (Η· 2 6 3 + ) and Η.263++ that appeared later added many options to It has a wider range of applicability.
I- 1.263的运动向量模式允许运动向量指向图像以外的区域。 当某一运 动向量所指的参考宏块位于编码图像之外时, 就用其边缘的图像象素值来 代替, 取得很大的编码增益。 先进的预测模式允许一个宏块中 4个 8x8亮 度块各对应一个运动向量, 从而提高了预测精度; 两个色度块的运动向量 则取这 4个亮度块运动向量的平均值。 补偿时, 使用重叠的块运动补偿, 8 8亮度块的每个象素的补偿值由 3个预测值加权平均得到。 使用该模式 可以产生显著的编码增益,特别是采用重叠的块运动补偿,会减少块效应, 提高主观质量。 The motion vector mode of I- 1.263 allows motion vectors to point to areas outside the image. When a certain transport When the reference macroblock pointed to by the motion vector is located outside the coded image, it is replaced by the image pixel value of its edge to obtain a large coding gain. The advanced prediction mode allows four 8x8 luma blocks in a macroblock to correspond to one motion vector, thereby improving the prediction accuracy; the motion vectors of the two chroma blocks take the average of the four luma block motion vectors. In the case of compensation, overlapping block motion compensation is used, and the compensation value of each pixel of the 8 8 luminance block is obtained by weighted averaging of 3 prediction values. Using this mode can produce significant coding gains, especially with overlapping block motion compensation, which reduces blockiness and improves subjective quality.
目前, H.261与 I- 1.263在视频通信中广泛应用, 成熟的产品已经很多。 I- 1.263与 H.261相比, 增加了若干选项, 提供了更灵活的编码方式, 压缩 效率大大提高, 更适应网络传输。 H.264标准的推出, 是视频编码标准的 一次重要进步, 它与现有的 MPEG-2、 MPEG- 4及 H.263相比, 具有明显 的优越性, 特别是在编码效率上的提高, 使之能用于许多新的领域。 尽管 H.264的算法复杂度是现有编码压缩标准的 4倍以上, 随着集成电路技术 的快速发展, H.264的应用将成为现实。  At present, H.261 and I- 1.263 are widely used in video communication, and there are many mature products. Compared with H.261, I- 1.263 adds several options, provides a more flexible coding method, greatly improves compression efficiency, and is more suitable for network transmission. The introduction of the H.264 standard is an important advancement in the video coding standard. Compared with the existing MPEG-2, MPEG-4 and H.263, it has obvious advantages, especially in coding efficiency. Make it available in many new areas. Although the algorithm complexity of H.264 is more than four times that of the existing coding compression standard, with the rapid development of integrated circuit technology, the application of H.264 will become a reality.
在视频通信中, 关键数据保护和错误掩盖 (Error Concealment )是非 常重要的一种保证端到端服务质量(Quality of Service, 简称 "QoS" ) 的 方法。 因为网络, 尤其是互联网或其它 QoS不保证的 IP或者分组交换网 絡, 无线网络, 会经常因为各种原因发生丢包或者叫做分组丢失, 那么压 缩视频数据的一部分将丟失, 在接收端就不能正确解码, 因为压缩视频码 流各部分之间可能存在相关性, 因此丢失的数据不但影响其所包含部分信 息的正确解码, 而且还影响依赖于它的其它信息的正确解码。 因此必须进 行必要的错误掩盖, 才能保证正确解码。错误掩盖就是:对于丢失的信息, 用前面已经正确接收并正确解码的信息来近似替代, 或者外推 ( extrapolate ) 出丢失的信息。  In video communications, critical data protection and Error Concealment are a very important method of guaranteeing end-to-end Quality of Service (QoS). Because the network, especially the Internet or other QoS-guaranteed IP or packet-switched networks, wireless networks, often cause packet loss or packet loss for various reasons, part of the compressed video data will be lost, and the receiver will not be correct. Decoding, because there may be correlations between portions of the compressed video stream, so the lost data not only affects the correct decoding of the information it contains, but also the correct decoding of other information that depends on it. Therefore, the necessary error masking must be performed to ensure correct decoding. The error concealment is: for missing information, approximate replacement with information that has been correctly received and correctly decoded, or extrapolate the missing information.
数字媒体和互联网络为人们的生活带来了极大的方便,数字化的媒体 便于访问、 复制、 传输和编辑, 但同时也带来了对数字媒体版权的侵犯和 对数字媒体内容的篡改等问题。 网络的普及使数字媒体的交换和传输变成 了一个相对简单的过程, 信息的共享也达到了一个新的层次, 但同时使信 息被暴露的机会和受到攻击的可能性大大增加。 这就催生了作为最早用于 进行数字媒体版权保护的数字水印技术。 Digital media and the Internet have brought great convenience to people's lives. Digital media is easy to access, copy, transfer and edit, but it also brings about violations of digital media copyright and tampering with digital media content. . The popularity of the network has made the exchange and transmission of digital media a relatively simple process, and the sharing of information has reached a new level, but at the same time, the chances of information being exposed and the possibility of being attacked are greatly increased. This gave birth to being the earliest used Digital watermarking technology for digital media copyright protection.
数字水印技术通过在原始媒体数据中嵌入一系列有意义或无意义的 信息, 使嵌入在原始媒体数据的水印信息始终与原始媒体数据共存, 达到 保护原始媒体数据版权和内容完整的目的。 随着技术发展, 除了版权保护 外, 数字水印技术在许多其他地方都有重要用途。  The digital watermarking technology embeds a series of meaningful or meaningless information in the original media data, so that the watermark information embedded in the original media data always coexists with the original media data, thereby protecting the original media data copyright and content integrity. With the development of technology, in addition to copyright protection, digital watermarking technology has important applications in many other places.
图 1给出了数字水印原理框图。 图中主媒体 一般是视频、 音频等原 始的或压缩后的多媒体数据, 待隐藏的数据 相对于。只有较少的数据。 嵌有水印的媒体/ ,与/。的差别是水印的嵌入产生的失真, 一般要求这种失 真是不易为人类感知的。 A经过一定的处理得到媒体 如数据压縮、 噪 声污染以及对水印有意的攻击等, 这些处理可以统一看成噪声。 因此从 2 提取出的水印 A相对于原始水印6。可能会有一些失真, 如果 2与 A相同, 从 提取出的水印 A也应与原始水印 6。相同。 Figure 1 shows the block diagram of the digital watermark. The main media in the figure is generally original or compressed multimedia data such as video and audio, and the data to be hidden is relative to. Only less data. Watermarked media / , and /. The difference is the distortion produced by the embedding of the watermark, which is generally required to be difficult for human perception. After a certain process, A obtains media such as data compression, noise pollution, and intentional attack on the watermark. These processes can be regarded as noise uniformly. Therefore, the watermark A extracted from 2 is relative to the original watermark 6 . There may be some distortion, if 2 is the same as A, the extracted watermark A should also be the same as the original watermark 6 . the same.
水印嵌入和提取的一般数学模型为: 设 、 分别表示原始数据和嵌 入水印后的数据, 6。为原始水印, 则水印的嵌入过程可以表示为 /, = /。 + /(/。, ) ,其中/ (。, )表示水印的嵌入算法。水印检测过程可以表示为: 若假设 H。: = /3— /。 = N成立, 则无水印; 若假设 : = /3 -I0 = b0 + N 成立, 则有水印, 其中, w为噪声, 例如由数据压缩、 噪声污染以及对水 印有意的攻击等引起。 嵌有水印的数据经过处理后会产生一定的失真, 因 而从经过处理后的数据中检测到的水印可能会在一定程度上与原始水印 有所差别。 The general mathematical model for watermark embedding and extraction is: Set, represent the original data and the data after embedding the watermark, 6 . For the original watermark, the embedding process of the watermark can be expressed as /, = /. + /(/., ) , where / (., ) represents the embedding algorithm of the watermark. The watermark detection process can be expressed as: If H is assumed. : = / 3 — /. If N is true, there is no watermark; if it is assumed that = / 3 -I 0 = b 0 + N is true, there is a watermark, where w is noise, such as caused by data compression, noise pollution, and intentional attack on the watermark. The watermark embedded data will be processed to produce a certain distortion, so the watermark detected from the processed data may be different to the original watermark to some extent.
水印的检测技术一般采用经典的信号检测 (Signal Detection )技术实 现, 作为信号检测技术是研究如何判断噪声中是否存在目标信号, 比如雷 达回波信号中是否包含来自目标的反射信号等, 如果存在, 如何利用统计 原理进行最优信号提取等。 判断噪声中是否存在信号, 采用统计假设检验 的方法 ( Statistic Hypothesis Test/Validation )。 在水印检测中, 首先给出两 个假设 "。和 根据检验的结果知道哪个^ _设成立,从而知道是否存在水 印。  Watermark detection technology is generally implemented by classical signal detection technology. As a signal detection technology, it is studied how to determine whether there is a target signal in the noise, such as whether the radar echo signal contains a reflection signal from the target, and if so, How to use the statistical principle to extract the optimal signal. To determine whether there is a signal in the noise, use the Statistic Hypothesis Test/Validation. In the watermark detection, two hypotheses are given first. And according to the result of the test, it is known which ^_ is set to know whether there is a watermark.
从视频关键数据保护技术来说, 目前存在多种方法, 大致分为以下几 类: 非等重保护(UnEqual Protection, 筒称 "UEP" )措施是指对于码流中 的关键数据, 在采取多种主动抗丢包和抗误码措施, 比如前向纠错编码 ( Forward Error Code, 筒称 "FEC" ), 纠删码 ( Erasure Codes )等, 进行 区别于普通数据的保护; From the video key data protection technology, there are currently many methods, which are roughly divided into the following categories: The UnEqual Protection (UEP) measure refers to a variety of active anti-drop and error-resistance measures for key data in the code stream, such as Forward Error Code (Forward Error Code, The cartridge is called "FEC", Erasure Codes, etc., and is protected from ordinary data;
利用通信协议中的自定义区段, 对于关键信息进行备份, 这种方法因 具体协议不同而不同, 比如针对 H.263/H.263+国际标准, 就可以利用其中 图像增强信息 (Picture Enhancement Information, 简称 "ΡΕΓ )域进行关 键数据备份;  Using the custom section in the communication protocol to back up key information, this method varies depending on the specific protocol. For example, for H.263/H.263+ international standards, you can use the image enhancement information (Picture Enhancement Information). , referred to as the "ΡΕΓ" domain for critical data backup;
数据分割 (Data Partition )是指对于关键数据利用单独的码流进行传 送。  Data Partition refers to the use of a separate stream for key data.
而从错误掩盖技术来说, 目前也有很多种, 大致分为以下几类: 时间域掩盖方法就是采用时间轴上相邻的帧的信息来推算丢失数据。 推算的方法可以是: 简单采用相邻帧相同位置的数据代替丟失数据; 考虑 运动预测因素, 才艮据相邻帧数据进行运动预测。 除此还有更加复杂的掩盖 策略, 但是计算量非常大;  From the error concealment technology, there are currently many kinds, which are roughly divided into the following categories: The time domain masking method uses the information of adjacent frames on the time axis to estimate the missing data. The method of calculation may be: simply adopting the data of the same position of the adjacent frame instead of the missing data; considering the motion prediction factor, the motion prediction is performed according to the adjacent frame data. In addition to this there are more complicated masking strategies, but the amount of calculation is very large;
空间域掩盖方法就是利用丢失数据区域的空间相邻区域来进行错误 掩盖。 同样的方法还有: 简单用邻域替代; 基于数据融合的有多个空间相 邻区域推算丢失数据, 比如空间插值; 代数反演法, 把丢包过程用一个线 性模型建模, 其输入是丢包前数据, 输出是正确接收到的数据, 利用代数 反演的方法, 比如最小二乘法, 从输出来反演输入, 用反演结果来替代错 误数据, 这种方法计算量大;  The spatial domain masking method is to use the spatial adjacent area of the lost data area to perform error concealment. The same method is as follows: simply replace the neighborhood; based on the data fusion, there are multiple spatial neighboring regions to estimate the missing data, such as spatial interpolation; algebraic inversion method, the packet loss process is modeled by a linear model, the input is The data before the packet loss, the output is the correctly received data, using algebraic inversion methods, such as the least squares method, inverting the input from the output, using the inversion result instead of the erroneous data, this method is computationally intensive;
时空联合掩盖方法则是联合使用空间域和时间域的误码掩盖。 比如, 根据丢失数据的特点和相邻时间数据和空间数据的情况, 采用某种策略确 定用空间域掩盖还是时间域掩盖更好, 然后实施这种更好的掩盖策略, 或 者融合空间数据和时间数据, 共同进行掩盖。  The space-time joint masking method is a combination of spatial and temporal error concealment. For example, depending on the characteristics of the lost data and the situation of adjacent time data and spatial data, it is better to use some strategy to determine whether to cover up with spatial domain or time domain, and then implement this better masking strategy, or fuse spatial data and time. Data, together for cover up.
事实上, 错误掩盖相关的前提是误码检测和定位, 准确的误码检测及 定位是误码被正确掩盖的前提。现有的误码检测方法是利用视频信号的特 征, 进行误码检测; 或对视频码流进行语法检查, 如出现非法可变长度编 码 (Variable Length Codes, 简称 "VLC" )码字, 运动向量超出了图像范 围或恢复的 DCT 系数超出范围等等, 都认为是由误码引起的错误。 根据 视频信号特征进行误码检测的方法是基于 "视频信号是平稳的"这一假设, 但这种假设在实际系统中通常是不成立的, 因而常常出现虚检错误; 码流 的语法检查方法则无法准确限定出错位置。 因此使用这些方法进行误码定 位的准确率比较低, 一般为 5 - 15%。 因此, 错误掩盖的前提是准确的误 码检测, 也就是说误码检测是 (尤其是无线信道)错误掩盖的首要工作。 In fact, the relevant premise of error concealment is error detection and positioning. Accurate error detection and positioning are the premise that the error is correctly covered. The existing error detection method utilizes the characteristics of the video signal to perform error detection; or performs syntax check on the video code stream, such as the occurrence of a variable length code (Variable Length Codes, "VLC") code word, motion vector Beyond the image The surrounding or recovered DCT coefficient is out of range, etc., and is considered to be an error caused by a bit error. The method of error detection based on video signal characteristics is based on the assumption that "the video signal is stationary", but this assumption is usually not established in practical systems, so false detection errors often occur; the syntax check method of the code stream is The error location cannot be accurately defined. Therefore, the accuracy of error location using these methods is relatively low, typically 5 - 15%. Therefore, the premise of error concealment is accurate error detection, which means that error detection is the primary task of error concealment (especially wireless channel).
另外, 目前还没有同时将关键数据保护和错误掩盖有效结合起来的方 法。  In addition, there is currently no way to effectively combine key data protection with error concealment.
在实际应用中, 上述方案存在以下问题: 在关键数据保护方面, 采用 UEP来保护关键数据, 需要增加额外开销, 增加码流量。 一般来说, 丟包 发生往往是因为网络发生拥塞,带宽变窄引起的,如果为了保护关键数据, 反而去增大流量, 这是这种方法的一个逻辑矛盾, 因此也使得使用效果不 佳。 另外, 利用通信协议中的自定义区段方法虽然有其巧妙之处, 但是依 赖具体协议, 缺乏一般性。 而数据分割方法则太复杂, 难以实用。 直接从 前帧的关键数据替换或者外推当前帧数据, 只适合某些关键数据, 缺乏通 用性。  In practical applications, the above solutions have the following problems: In terms of critical data protection, UEP is used to protect critical data, which requires additional overhead and increased code traffic. Generally speaking, packet loss occurs because the network is congested and the bandwidth is narrowed. If the traffic is to be protected, the traffic is increased. This is a logical contradiction of this method, and therefore the use effect is not good. In addition, although the custom section method in the communication protocol has its ingenuity, it lacks generality depending on the specific protocol. The data segmentation method is too complicated to be practical. Replacing or extrapolating the current frame data directly from the key data of the previous frame is only suitable for some key data and lacks versatility.
而其他的错误掩盖方法只能暂时掩盖误码导致的失真, 而且简单的方 法产生的效果不好, 复杂的方法计算量大, 对于终端的处理能力要求高, 另外更严重的问题是现有的误码检测方法准确率太低, 直接限制了错误掩 盖的效果。  Other error concealment methods can only temporarily mask the distortion caused by bit errors, and the simple method produces poor results. The complicated method has a large amount of calculation, and the processing capability of the terminal is high. In addition, the more serious problem is the existing one. The accuracy of the error detection method is too low, which directly limits the effect of error concealment.
造成这种情况的主要原因在于, 单独的关键数据保护方法要么需要额 外的开销而无法解决根本的网络拥塞问题,要么太复杂难以实现或者没有 通用性;单独的误码掩盖方法对视频质量提高效果不够好,耗费处理资源, 同时也没有准确率高的误码检测机制作为前提。  The main reason for this situation is that the separate key data protection methods either require additional overhead and cannot solve the fundamental network congestion problem, or are too complicated to implement or have no versatility; the individual error concealment method improves the video quality. It is not good enough, it consumes resources, and there is no error detection mechanism with high accuracy.
发明内容 Summary of the invention
有鉴于此, 本发明的主要目的在于提供一种多媒体通信的传输保护方 法, 使得在不增加通信系统或网络负担的前提下, 提高多媒体通信服务质 量。  In view of this, the main object of the present invention is to provide a transmission protection method for multimedia communication, which improves the quality of multimedia communication services without increasing the burden on the communication system or the network.
为实现上述目的, 本发明提供了一种多媒体通信的传输保护方法 , 包 含以下步骤: To achieve the above object, the present invention provides a transmission protection method for multimedia communication, including Includes the following steps:
A在发端用数字水印对关键数据做备份保护;  A uses the digital watermark at the origin to protect the key data backup;
B 在收端提取数字水印得到关键数据备份, 由其检测多媒体数据误 码;  B extracts the digital watermark at the receiving end to obtain key data backup, which detects the error of the multimedia data;
C对发生误码的多媒体数据进行错误掩盖。  C confuses the errored multimedia data.
其中, 所述步骤 A包含以下子步骤:  The step A includes the following sub-steps:
将多媒体数据分块处理 , 对当前块的所述关键数据进行备份编码; 用数字水印将所述当前块的关键数据的备份编码嵌入到所述当前块 对应的保护块的非关键数据编码中;  Performing block processing on the multimedia data, performing backup encoding on the key data of the current block; embedding the backup code of the key data of the current block into the non-critical data encoding of the protection block corresponding to the current block by digital watermarking;
其中, 所述保护块不同于但对应于所述当前块。  The protection block is different from but corresponding to the current block.
此外在所述方法中, 所述步驟 B包含以下子步骤:  Further in the method, the step B comprises the following sub-steps:
从所有所述保护块中提取数字水印得到其所对应的被保护块的关键 数据备份;  Extracting a digital watermark from all of the protection blocks to obtain a key data backup of the corresponding protected block;
首先, 才艮据以下第一准则判断当前块是否正确: 如果当前块的关键数 据备份与本身所传输的关键数据一致, 或者当前块所对应的被保护块的关 键数据备份与该被保护块本身所传输的关键数据一致, 则当前块正确; 其次, 对于没有被所述第一准则判断为正确的数据块, 根据以下第二 准则判断当前块是否错误: 如果当前块的关键数据备份与本身所传输的关 键数据不一致并且当前块所对应的保护块正确, 或者当前块所对应的被保 护块的关键数据备份与该被保护块本身所传输的关键数据不一致且该被 保护块正确, 则当前块错误。  First, it is judged whether the current block is correct according to the following first criterion: if the key data backup of the current block is consistent with the key data transmitted by itself, or the key data backup of the protected block corresponding to the current block and the protected block itself If the key data transmitted is consistent, the current block is correct. Secondly, for the data block that is not determined to be correct by the first criterion, the current block is determined to be erroneous according to the following second criterion: If the key data of the current block is backed up and itself The key data of the transmission is inconsistent and the protection block corresponding to the current block is correct, or the key data backup of the protected block corresponding to the current block is inconsistent with the key data transmitted by the protected block itself and the protected block is correct, the current block error.
此外在所述方法中, 所述多媒体通信用运动补偿编码方法传输, 所述 步驟 B还包含以下子步骤:  In addition, in the method, the multimedia communication is transmitted by using a motion compensation coding method, and the step B further includes the following sub-steps:
对于没有被所述第一准则、 第二准则判断为正确或错误的数据块, 根 据以下第三准则判断当前块是否错误: 如果当前块的参考编码块错误, 则 当前块错误。  For a data block that is not determined to be correct or erroneous by the first criterion and the second criterion, it is determined whether the current block is erroneous according to the following third criterion: If the reference code block of the current block is erroneous, the current block is erroneous.
此外在所述方法中, 所述步骤 C包含子步骤, 当前块错误时, 如果其 所对应的保护块正确, 则用当前块的关键数据备份作为其关键数据进行解 码。 此外在所述方法中, 所迷步骤 C包含子步骤, 当前块错误时, 如果其 所对应的保护块错误, 则用与当前块邻近且正确的一个或多个数据块的关 键数据的平均值作为当前块的关键数据进行解码。 In addition, in the method, the step C includes a sub-step. When the current block is faulty, if the corresponding protection block is correct, the key data backup of the current block is used as its key data for decoding. In addition, in the method, the step C includes a sub-step, and when the current block is wrong, if the corresponding protection block is incorrect, the average value of the key data of the one or more data blocks adjacent to the current block is used. Decode as the key data of the current block.
此外在所述方法中, 所述平均值以下之一:  Further in the method, one of the average values is one of:
算术平均值、加权平均值、 几何平均值、调和平均值、或中值平均值, 或者是上述任何一种平均值在去掉被平均数组的最大值和最小值后的平 均结果, 即去掉被平均数组的最大值和最小值后的算术平均值、 加权平均 值、 几何平均值、 调和平均值及中值平均值  Arithmetic mean, weighted average, geometric mean, harmonic mean, or median mean, or the average of any of the above averages after removing the maximum and minimum values of the average array, ie, removed by average Arithmetic mean, weighted average, geometric mean, harmonic mean, and median mean after the maximum and minimum values of the array
此外在所述方法中, 所述多媒体通信的传输方法为 H.261、 H.263、 H.263+、 1-1.263++、 H.264、 运动图像专家组标准 1、 运动图像专家组标准 2、 运动图像专家组标准 4的部分 2和部分 10中的任意一种。  In addition, in the method, the transmission method of the multimedia communication is H.261, H.263, H.263+, 1-1.263++, H.264, Moving Picture Experts Group Standard 1, Moving Picture Experts Group Standard 2. Any one of part 2 and part 10 of the Moving Picture Experts Group Standard 4.
此外在所述方法中, 所述关键数据为包含:  In addition, in the method, the key data includes:
宏块的运动向量、 视频序列结构参数、 图象帧的结构参数、 块组结构 参数、 图像增强信息、 或补充增强信息。  The motion vector of the macroblock, the video sequence structure parameter, the structure parameter of the image frame, the block group structure parameter, the image enhancement information, or the supplemental enhancement information.
此外在所述方法中, 所述非关键数据为彩色图象亮度分量信号或者灰 度图象的灰度信号的离散余弦变换交流系数中的序号为 7到 12的之间的 任意两个系数, 例如 8和 9两个系数。  In addition, in the method, the non-critical data is any two coefficients between 7 and 12 in the discrete cosine transform AC coefficient of the color image luminance component signal or the gray signal of the gray image. For example, two coefficients of 8 and 9.
此外在所述方法中, 所述运动向量的备份编码方法包含以下步骤: 分别以 4比特对所述运动向量的横向分量、 纵向分量编码; 其中, 所述 4 比特编码对应表示所述横向分量或纵向分量的任意 16 种互易的离散取值情况。  In addition, in the method, the backup encoding method of the motion vector includes the following steps: encoding a horizontal component and a vertical component of the motion vector by 4 bits, respectively; wherein the 4-bit encoding corresponds to the horizontal component or The discrete value of any of the 16 reciprocal components of the longitudinal component.
此外在所述方法中, 所述步骤 B的所述第一准则、 第二准则中, 根据 以下第四准则判断所述关键数据备份与所述关键数据是否一致:  In addition, in the method, the first criterion and the second criterion of the step B determine whether the key data backup is consistent with the key data according to the following fourth criterion:
如果所述运动向量备份编码中其横向分量和纵向分量共 8比特表示的 取值情况与对应数据块本身传输的所述运动向量的取值情况符合, 则所述 运动向量备份与所述运动向量一致。  If the value of the 8-bit representation of the horizontal component and the vertical component of the motion vector backup code is consistent with the value of the motion vector transmitted by the corresponding data block itself, the motion vector backup and the motion vector Consistent.
此外在所述方法中, 所述多媒体数据为图像帧序列;  In addition, in the method, the multimedia data is an image frame sequence;
每个所述图像帧分为至少两个数据块组;  Each of the image frames is divided into at least two data block groups;
每个所述数据块组分为至少两个所述数据块; 每个所述数据块至少包含 4个亮度分量信号块; Each of the data block components is at least two of the data blocks; Each of the data blocks includes at least four luminance component signal blocks;
每个所述数据块所对应的保护块为其后一个所述数据块組中满足预 设——对应关系的数据块;  a protection block corresponding to each of the data blocks is a data block in the subsequent one of the data block groups that satisfies a preset-correspondence relationship;
每个所述数据块所对应的被保护块为其前一个所述数据块组中满足 所述预设——对应关系的数据块;  The protected block corresponding to each of the data blocks is a data block in the previous one of the data block groups that satisfies the preset-correspondence relationship;
每个所述数据块所对应的参考数据块为同一数据块组中前一个数据 块。  The reference data block corresponding to each of the data blocks is the previous data block in the same data block group.
此外在所述方法中, 在所述预设——对应关系中, 每个所述数据块所 对应的'保护块为其后一个所述数据块组中相同位置的数据块; 每个所述数 据块所对应的被保护块为其前一个所述数据块组中相同位置的数据块。  Further, in the method, in the preset-correspondence relationship, a 'protection block corresponding to each of the data blocks is a data block of the same position in the next one of the data block groups; The protected block corresponding to the data block is the data block of the same position in the previous one of the data block groups.
此外在所述方法中,所述步骤 A中进行所述关键数据备份的数字水印 嵌入时, 将所述运动向量的 8比特备份编码分别插入到对应保护块的 4个 所述亮度分量或者灰度信号块的离散余弦变换交流系数中所述序号为 7到 12的任意两个系数的编码中, 例如可以是 8和 9两个系数。  In addition, in the method, when the digital watermark of the key data backup is performed in the step A, the 8-bit backup code of the motion vector is respectively inserted into the four brightness components or gray levels of the corresponding protection block. In the code of the discrete cosine transform AC coefficient of the signal block, the code of any two coefficients of the sequence number 7 to 12 may be, for example, two coefficients of 8 and 9.
此外在所述方法中, 将所述运动向量备份编码的比特插入到对应的所 述离散余弦变换系数的编码中的规则如下:  Further in the method, the rules for inserting the motion vector backup encoded bits into the corresponding encoding of the discrete cosine transform coefficients are as follows:
按照所述运动向量备份编码的比特, 将所述离散余弦变换的编码变为 与其编码前的值最接近的值的偶数或奇数编码。  The code of the discrete cosine transform is changed to an even or odd code of the value closest to the value before encoding according to the motion vector back-coded bits.
此外在所述方法中, 所述步驟 C中, 当前块错误时, 如果其所对应的 保护块正确, 则用当前块的运动向量备份反推当前块在前一图像帧中的参 考块的位置, 并用该参考块代替当前块。  In addition, in the method, in the step C, when the current block is wrong, if the corresponding protection block is correct, the motion vector of the current block is used to back up the position of the reference block of the current block in the previous image frame. And replace the current block with the reference block.
此外在所述方法中, 所述步骤 C中, 当前块错误时, 如果其所对应的 保护块错误, 则用当前图像帧中与当前块邻近且正确的一个或多个数据块 的运动向量的平均值来反推当前块在前一图像帧中的参考块的位置, 并用 该参考块代替当前块。  In addition, in the method, in the step C, when the current block is wrong, if the corresponding protection block is wrong, the motion vector of the current image frame adjacent to the current block and the correct one or more data blocks is used. The average is used to reverse the position of the reference block of the current block in the previous image frame and replace the current block with the reference block.
通过比较可以发现, 本发明的技术方案与现有技术的主要区别在于, 采用数字水印技术在压缩图像的非关键数据编码中隐藏关键数据信息, 以 在不增加通信负担的前提下有效地保护多媒体通信的关键数据, 以提高多 媒体通信服务质量; 通过数字水印保护下的关键数据保护备份来检测正常传输的关键数 据是否正确, 由此来检测传输误码; By comparison, it can be found that the main difference between the technical solution of the present invention and the prior art is that digital watermarking technology is used to hide key data information in non-critical data encoding of compressed images, so as to effectively protect multimedia without increasing communication burden. Key data of communication to improve the quality of multimedia communication services; The key data protection backup under the digital watermark protection is used to detect whether the key data transmitted normally is correct, thereby detecting the transmission error code;
用前后宏块组中相同位置的宏块进行循环相互备份; ' 对运动向量进行编码, 然后嵌入到相对不重要的 DCT变换系数中, 以实现数字水印, 同时保证视频数据尽量不受影响;  The macroblocks in the same position in the front and rear macroblock groups are cyclically backed up each other; 'The motion vector is encoded and then embedded into the relatively unimportant DCT transform coefficients to implement digital watermarking, while ensuring that the video data is as unaffected as possible;
在误码发生时, 如果关键数据备份正确, 则直接替代原关键数据, 否 则用同一帧内相邻宏块的关键数据的平均值近似替代原关键数据。  When the error occurs, if the critical data backup is correct, the original key data is directly replaced, otherwise the original key data is approximated by the average value of the key data of the adjacent macroblocks in the same frame.
这种技术方案上的区别, 带来了较为明显的有益效果, 即用经过巧妙 设计的数字水印技术对关键数据做保护备份, 可以在不增加通信系统或网 络负担、且不影响传输质量的前提下, 方便、 高效地实现关键数据的保护, 基于此实现误码检测和错误掩盖的结合,从而大大提高多媒体通信服务质 量, 由此提高视频通信类产品, 如可视电话、 第三代移动终端、视频会议、 网络电视等的市场竟争力。  The difference in this technical solution brings about a more obvious beneficial effect, that is, the use of the well-designed digital watermarking technology to protect the backup of critical data can not increase the communication system or network burden, and does not affect the transmission quality. The key data protection can be realized conveniently and efficiently, and the combination of error detection and error concealing is realized based on this, thereby greatly improving the quality of multimedia communication services, thereby improving video communication products, such as videophones and third generation mobile terminals. Market competition such as video conferencing and Internet TV.
附图说明 DRAWINGS
图 1是数字水印技术原理示意图;  Figure 1 is a schematic diagram of the principle of digital watermarking technology;
图 2是根据本发明的第一实施例的多媒体通信的传输系统示意图; 图 3是根据本发明的第一和第二实施例的多媒体通信的传输保护方法 流程图;  2 is a schematic diagram of a transmission system of multimedia communication according to a first embodiment of the present invention; FIG. 3 is a flowchart of a transmission protection method for multimedia communication according to first and second embodiments of the present invention;
图 4是根据本发明的第一实施例的 H.263视频数据分块方案示意图; 图 5是根据本发明的第三实施例的实验结果视频质量对比示意图; 图 6是根据本发明的第三实施例的实验结果 PSNR对比示意图。  4 is a schematic diagram of a H.263 video data blocking scheme according to a first embodiment of the present invention; FIG. 5 is a schematic diagram of video quality comparison of experimental results according to a third embodiment of the present invention; FIG. 6 is a third embodiment according to the present invention. A schematic comparison of the PSNR of the experimental results of the examples.
具体实施方式 为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对本 发明作进一步地详细描述。 DETAILED DESCRIPTION OF THE INVENTION In order to make the objects, technical solutions and advantages of the present invention more comprehensible, the present invention will be further described in detail with reference to the accompanying drawings.
发明的关键思路是利用数字水印在多媒体数据中嵌入一些水印数据, 来保护多媒体通信的关键数据, 比如诸多运动预测编码标准中的运动向量 ( Motion Vector )数据的保护。 关键数据作为水印在发送端多媒体压缩编 码过程中嵌入到多媒体数据中, 成为了关键数据的保护冗余备份, 除了在 多媒体码流本身中传输外, 关键数据还以水印数据的形式进行了备份, 然 后随码流同时发送, 接收端收到后, 可以通过提取水印数据, 得到这些重 要的媒体数据及其备份, 从而达到关键数据保护的目的, 在关键数据丢失 时, 可以利用备份来恢复。 The key idea of the invention is to use digital watermark to embed some watermark data in multimedia data to protect the key data of multimedia communication, such as the protection of motion vector data in many motion prediction coding standards. The key data is embedded in the multimedia data as the watermark in the multimedia compression encoding process at the transmitting end, and becomes the protection redundancy backup of the key data. In addition to the transmission in the multimedia code stream itself, the key data is backed up in the form of watermark data. Of course After the code stream is sent at the same time, after receiving the data, the receiver can obtain the important media data and its backup by extracting the watermark data, so as to achieve the purpose of key data protection. When the key data is lost, the backup can be used to recover.
通过对于数字水印的利用,在不增加通信负担也不降低多媒体通信质 量的前提下, 实现了对关键数据的保护。 本发明基于数字水印对关键数据 的保护, 提出的有效的误码检测方法, 即通过比较从水印提取的运动向量 与视频解码得到的运动向量进行误码检测, 大大提高了误码检测的准确 性, 并且利用从水印提取的运动向量对错误块进行错误掩盖, 很好地改善 了视频恢复质量。  Through the use of digital watermarks, the protection of key data is realized without increasing the communication burden or reducing the quality of multimedia communication. The invention is based on the protection of key data by digital watermarking, and the effective error detection method is to detect the error vector by comparing the motion vector extracted from the watermark with the motion vector obtained by video decoding, thereby greatly improving the accuracy of error detection. And using the motion vector extracted from the watermark to mask the error block, the video recovery quality is improved.
利用关键数据备份进行误码检测, 可以精确检测误码的发生, 最后本 发明通过错误掩盖来提高多媒体通信服务质量,错误掩盖可以通过用关键 数据备份代替关键数据来实现, 如果关键数据备份也出错, 则通过空间域 的简单替代实现。  The use of critical data backup for error detection can accurately detect the occurrence of bit errors. Finally, the present invention improves the quality of multimedia communication services through error concealment. Error concealment can be achieved by replacing critical data with key data backups. , is achieved by a simple alternative to the spatial domain.
由此可见, 本发明基本上由三步实现: 首先在发送端利用数字水印嵌 入关键数据备份, 并能在接收端提取数字水印, 获取所保护关键数据; 其 次根据关键数据的备份和本身传输的关键数据对比, 判断相关多媒体数据 是否发生误码的方法, 以高效检测误码情况的发生; 最后对发生误码的数 据实现错误掩盖。  It can be seen that the present invention is basically implemented in three steps: First, the digital data is used to embed the key data backup at the transmitting end, and the digital watermark can be extracted at the receiving end to obtain the protected key data; secondly, according to the backup of the key data and the transmission of the key data. The comparison of key data, the method of judging whether the relevant multimedia data has a bit error, in order to efficiently detect the occurrence of the error condition; finally, the error occurrence of the errored data is realized.
下面以基于块-运动补偿的视频压缩算法系列标准为例 ,特别是 H.263 标准, 来详细说明本发明的实施方案, 同样对于其他已有标准, 比如前述 的 1-1.261、 H.263、 1-1.263+、 H.263++, H.264、 MPEG-K MPEG-2, MPEG-4 的 part2 & partlO等, 或者将来会有的采用同样机理的标准, 则类似的可 以扩展实现。  The following is an example of a block-motion compensation based video compression algorithm series standard, in particular the H.263 standard, to describe the embodiment of the present invention in detail, as well as other existing standards, such as the aforementioned 1-1.261, H.263, 1-1.263+, H.263++, H.264, MPEG-K MPEG-2, MPEG-4 part2 & partlO, etc., or future standards using the same mechanism, can be extended similarly.
图 2示出了本发明的第一实施例的通信系统框图。在编码器执行编码 过程中, 运动预测中获得的运动向量, 分别送到 VLC模块和水印嵌入模 块。 送到 VLC模块的运动向量按正常的方法编码, 并复合到输出码流 (即 正常的协议处理流程); 而送到水印嵌入模块的运动向量, 经过处理后, 叠加到量化后的 DCT系数上, 然后通过 VLC编码, 复合到输出码流。  Fig. 2 is a block diagram showing a communication system of a first embodiment of the present invention. During the encoding process performed by the encoder, the motion vectors obtained in the motion prediction are sent to the VLC module and the watermark embedding module, respectively. The motion vector sent to the VLC module is coded in the normal way and combined into the output code stream (ie, the normal protocol processing flow); and the motion vector sent to the watermark embedding module is processed and superimposed on the quantized DCT coefficient. , then by VLC encoding, compounded to the output stream.
本发明的实施例将关键数据即运动向量嵌入到压缩图像的 DCT 系数 中, 在解码端根据提取的数字水印来进行误码检测和掩盖。 熟悉本领域的 技术人员可以理解, 其他非关键数据也可以作为载体来嵌入关键数据的水 印备份, 照样实现发明目的而不影响本发明的实质和范围。 而本发明的第 一实施例中将数字水印嵌入到变换域的 DCT系数中, 是由于 DCT系数中 的高频分量对人视觉的影响较少, 因此这样的不重要的数据编码比较适合 嵌入水印, 从而能够保护原视频传输的质量。 Embodiments of the present invention embed key data, ie, motion vectors, into DCT coefficients of a compressed image In the decoding end, error detection and masking are performed according to the extracted digital watermark. It will be understood by those skilled in the art that other non-critical data can also be used as a carrier to embed a watermark backup of key data, thereby achieving the object of the invention without affecting the essence and scope of the present invention. In the first embodiment of the present invention, the digital watermark is embedded in the DCT coefficients of the transform domain because the high frequency components in the DCT coefficients have less influence on human vision, so such unimportant data encoding is more suitable for embedding the watermark. Thus, the quality of the original video transmission can be protected.
事实上, 按照水印信号嵌入的方式, 可以将数字水印技术分为空间域 的数字水印技术和变换域的数字水印技术。 空间域的数字水印技术是直接 在媒体的空间域嵌入水印信息, 如直接在图像像素中嵌入信息。 变换域的 数字水印技术是先将媒体作种变换, 如离散傅立叶变换、 离散余弦变换或 离散小波变换等, 然后再在变换域中嵌入水印信息。 变换域水印技术相对 于空间域水印有很多好处, 比如可以把水印加入引起的额外图像能量均匀 分布到被嵌入图像的各个部分,使得水印加入后的可见影响降低到最低限 度。 因此本发明的实施例采用了在变换域嵌入水印的方法。  In fact, according to the way of watermark signal embedding, digital watermarking technology can be divided into spatial domain digital watermarking technology and transform domain digital watermarking technology. The digital watermarking technique in the spatial domain embeds watermark information directly in the spatial domain of the media, such as embedding information directly in the image pixels. The digital watermarking technique of the transform domain first transforms the media, such as discrete Fourier transform, discrete cosine transform or discrete wavelet transform, and then embeds the watermark information in the transform domain. The transform domain watermarking technique has many advantages over the spatial domain watermarking. For example, the additional image energy caused by the watermark addition can be evenly distributed to the various parts of the embedded image, so that the visible influence of the watermark addition is reduced to a minimum. Thus embodiments of the present invention employ a method of embedding a watermark in a transform domain.
图 3 示出了本发明的第一实施例中视频通信的传输保护方法的总流 程。  Fig. 3 shows the overall flow of the transmission protection method of video communication in the first embodiment of the present invention.
首先在步骤 301中, 将多媒体数据分块处理, 对当前块的关键数据进 行备份编码。  First, in step 301, the multimedia data is processed into blocks, and the key data of the current block is back-coded.
如上所述, 首先要进行就是在发端用数字水印对关键数据做备份保 护。 结合现有的运动补偿或其他视频压缩编码标准, 对于视频数据的处理 是分块进行的。 比如在 I- 1.263标准中, 视频流分为图像帧序列, 每个图像 帧分为多个 GOB, 每个 GOB对应一行 MB, 每个 MB又包含 4个 8 χ 8 亮度分量信号 B1...B4和 2个色差分量信号。 图 4示出了这种分块方案。 每个 MB由两个数字指示其位置, 第一个下标为行号也即所属 GOB号, 第二个下标为列号也即在 GOB中的序号。  As mentioned above, the first thing to do is to use the digital watermark at the origin to back up the critical data. In combination with existing motion compensation or other video compression coding standards, the processing of video data is performed in blocks. For example, in the I- 1.263 standard, the video stream is divided into image frame sequences, each image frame is divided into multiple GOBs, each GOB corresponds to one row of MB, and each MB contains four 8 χ 8 luminance component signals B1... B4 and 2 color difference components. Figure 4 shows this blocking scheme. Each MB is indicated by two numbers, the first subscript is the line number, which is the GOB number, and the second subscript is the column number, which is the serial number in the GOB.
关键数据的备份编码就是专门用于嵌入水印之前的编码, 该编码方式 可以区别于正常的编码方式。 本发明第一实施例中, 对于运动向量 (MV) 的备份编码, 用量化的方法实现。 运动向量分为横向 (X)分量和纵向 (Y)分 量, 分别表示当前宏块相对于其前帧参考宏块在水平和垂直方面的位移 量。 备份编码时分别以 4 比特对两个分量编码, 4 比特编码可以代表 16 种码字,对应表示横向分量或纵向分量的以下 16种取值情况: 小于 -3、 -3、 -2,5、 -2、 -1.5、 -1、 -0.5 , 0、 0.5、 1、 1.5、 2、 2.5、 3、 3.5、 大于 3.5。 The backup code of the key data is specifically used for the coding before embedding the watermark, and the coding mode can be distinguished from the normal coding mode. In the first embodiment of the present invention, the backup coding of the motion vector (MV) is implemented by a quantization method. The motion vector is divided into a horizontal (X) component and a vertical (Y) component, respectively representing the horizontal and vertical displacement of the current macroblock relative to its previous frame reference macroblock. the amount. When the backup code is encoded, the two components are respectively encoded by 4 bits, and the 4-bit code can represent 16 code words, corresponding to the following 16 kinds of values representing the horizontal component or the vertical component: less than -3, -3, -2, 5, -2, -1.5, -1, -0.5, 0, 0.5, 1, 1.5, 2, 2.5, 3, 3.5, greater than 3.5.
这里将两端超出一定量化范围的情况用一个码字表示, 这样的量化方 法具有良好的性能和编码效率。 事实上, 由于 MV各个分量取值主要集中 在零附近,对大量实际视频序列测试得到的运动向量各个分量主要集中在 [-2,2]区间内。 为了尽量减小运动向量的嵌入对图像带来的影响,把运动向 量的分量的取值在 [-3,3.5]的区间内进行均匀量化, 而这个区间的两端以外 各用一个码字表示。 这样大大缩小了 MV的编码量, 减少了数据量, 提高 水印嵌入的可行性, 同时也能保证关键数据编码损失较少。  Here, the case where both ends exceed a certain quantization range is represented by one codeword, and such quantization method has good performance and coding efficiency. In fact, since the values of the individual components of the MV are mainly concentrated near zero, the components of the motion vector obtained by testing a large number of actual video sequences are mainly concentrated in the interval [-2, 2]. In order to minimize the influence of the embedding of the motion vector on the image, the value of the component of the motion vector is uniformly quantized in the interval of [-3, 3.5], and each end of the interval is represented by a codeword. . This greatly reduces the amount of MV coding, reduces the amount of data, improves the feasibility of watermark embedding, and also ensures less loss of key data coding.
事实上采用上述非均匀量化之后, 对于每个分量, 当 |Μ ≤3时, 可以 用嵌入正确的 MV完全恢复上一行受损的 MV, ^v \> 3.5时, 虽然不能恢 复受损的 MV, 但通过取值范围的比较可以确定误码影响的范围, 达到误 码检测的目的。 In fact, after using the above non-uniform quantization, for each component, when |Μ ≤ 3 , the MV of the previous row can be completely recovered by embedding the correct MV, ^v \> 3.5, although the damaged MV cannot be recovered. However, by comparing the range of values, the range of the impact of the error can be determined to achieve the purpose of error detection.
这里对嵌入的 MV采用定长 (4bit)编码, 是为了便于以后的误码检测, 比如每个分量对应的编码结果为 0000到 1111 , 可以依次对应上面所述 16 种取值情况,码表举例如表一。该表对应于特殊情况,只是作为一个特例, 具体应用中可以按情况取值。  Here, the fixed MV (4bit) encoding is used for the embedded MV, so as to facilitate the subsequent error detection. For example, the encoding result corresponding to each component is 0000 to 1111, which can sequentially correspond to the 16 kinds of values described above. As shown in Table 1. This table corresponds to a special case, but as a special case, the value can be taken according to the situation in the specific application.
Figure imgf000014_0001
Figure imgf000014_0001
然后在步驟 302中, 用数字水印将当前块的关键数据的备份编码嵌入 到当前块对应的保护块的非关键数据编码中。 其中保护块不同于但对应于 当前块, 也就是说每个数据块都有其他一个数据块作为它的保护块, 同时 它本身也是另夕 I、一个数据块的保护块。  Then in step 302, the backup code of the key data of the current block is embedded into the non-critical data code of the protection block corresponding to the current block by digital watermarking. The protection block is different from but corresponding to the current block, that is to say, each data block has another data block as its protection block, and it is itself a protection block of another data block.
以图 3所示的 I- 1.263等编码方案为例, 码流中的每一层都有对应的起 始码, GOB的起始码在传输中又起到同步的作用。 通过检查 GOB的起始 码,可以将比特错误限制在所在的 GOB中,不会影响到下一个 GOB中去。 因此可以选择将上一行 MB例如 GOBI的 MBl,m的运动向量在其下一行 GOB2的 MB2,m中进行保护, 即当前 MB的下一行对应位置的 MB是其 保护块, 同理当前 MB就是上一行对应位置 MB的保护块, 也称上一行对 应位置的 MB为当前 MB的被保护块, 如果是最后一行则由第一行保护。 经过这样行与行之间的循环保护, 可以实现有效的备份, 比如在 GOB2没 有误码时, 即使 GOBI中的数据出错, 也可以恢复 GOBI的关键数据, 从 而用于有效的错误掩盖。 Taking the coding scheme of I- 1.263 shown in Figure 3 as an example, each layer in the code stream has a corresponding The start code, the start code of the GOB plays a synchronous role in the transmission. By checking the start code of the GOB, the bit error can be limited to the GOB in which it is located, without affecting the next GOB. Therefore, the motion vector of MB1,m of the previous line MB, for example, GOBI, can be selected to be protected in the MB2,m of the next line of GOB2, that is, the MB of the corresponding position of the next line of the current MB is its protection block, and the current MB is the same. A row corresponds to the protection block of position MB. The MB corresponding to the position of the previous row is the protected block of the current MB, and if it is the last row, it is protected by the first row. Through such loop protection between lines and lines, effective backup can be realized. For example, when there is no error in GOB2, even if the data in GOBI is wrong, the key data of GOBI can be restored, which is used for effective error concealment.
前面已经提到数据水印的内容为关键数据即运动向量, 而没有给出数 字水印的载体是什么。 当然, 由于关键数据的编码本身是重要的, 因此不 能再将关键数据的备份水印嵌入到关键数据的编码中, 这样的做法在逻辑 上是矛盾的。 本发明的第一实施例中, 以 H.263为例, 采用相对不重要的 数据编码作为水印的载体, 以保证视频流本身传输质量不受损。 前面已经 提到, 本发明第一实施例中选择高频的 DCT 系数作为水印的载体是有其 原因的。  It has been mentioned above that the content of the data watermark is the key data, that is, the motion vector, and the carrier of the digital watermark is not given. Of course, since the encoding of key data is important in itself, it is not logical to embed the backup watermark of key data into the encoding of key data. This is logically contradictory. In the first embodiment of the present invention, H.263 is taken as an example, and relatively unimportant data coding is used as a carrier of the watermark to ensure that the transmission quality of the video stream itself is not impaired. As mentioned above, the DCT coefficient of the high frequency is selected as the carrier of the watermark in the first embodiment of the present invention for a reason.
根据人的视觉特性, 人眼对视频的直流和低频成分, 即对应于 DCT 系数中的直流(Direct Current, 筒称 "DC" ) 系数和低频交流( Alternating Current, 简称 "AC" ) 系数的变化较为敏感, 而对高频 AC成分中的噪声 或失真不敏感, 因此不宜在 DC或低频 AC系数中嵌入运动向量。 但由于 视频编码中采用的帧间编码模式使得帧差信号的 DCT 系数都比较小, 特 别是高频分量系数几乎为零。 为了避免码率增加过多, 本发明选择将运动 向量信息嵌入在亮度信号序号为 8和 9的变换系数, 即 AC8和 AC9上。 实验证明选择这两个系数作为水印载体的视频质量提高效果最佳。 如果将这 8个比特的水印信息隐藏到或者嵌入到保护块的 AC8、 AC9编码 中也是一个有待考虑的问题。 本发明的第一实施例中, 将 8比特信息恰好 嵌入到对应保护块的 4个亮度信号的 AC8、 AC9系数, 共 8个系数中, 即 每个 AC8或 AC9量化系数上隐藏一个比特的水印信息。 具体的将 MV备份编码的比特信息插入到对应的 DCT系数的编码中 的规则如下: 按照 MV备份编码的比特为 0或者 1, 将 DCT的编码变为 与其编码前值最接近的偶数或奇数编码, 如果它本身就是则不需要变化。 According to the human visual characteristics, the direct and low frequency components of the human eye to the video, that is, the DC (Direct Current, "DC") coefficient and the low frequency alternating current (AC) coefficient in the DCT coefficient It is sensitive and insensitive to noise or distortion in high frequency AC components, so it is not appropriate to embed motion vectors in DC or low frequency AC coefficients. However, the inter-frame coding mode used in video coding makes the DCT coefficients of the frame difference signals relatively small, especially the high-frequency component coefficients are almost zero. In order to avoid excessive bit rate increase, the present invention chooses to embed motion vector information in transform coefficients of luminance signal numbers 8 and 9, namely AC8 and AC9. Experiments show that selecting these two coefficients as the watermark carrier has the best video quality improvement effect. It is also a problem to be considered if the 8 bits of watermark information are hidden or embedded in the AC8 and AC9 codes of the protection block. In the first embodiment of the present invention, 8-bit information is exactly embedded in the AC8 and AC9 coefficients of the four luminance signals corresponding to the protection block, and a total of 8 coefficients, that is, a watermark with one bit hidden on each AC8 or AC9 quantized coefficient. information. The specific rules for inserting the bit information of the MV backup code into the coding of the corresponding DCT coefficient are as follows: The bit coded according to the MV backup is 0 or 1, and the code of the DCT is changed to the even or odd code closest to the value before the encoding. If it is, it does not need to change.
该水印嵌入方法的数学模型描述如下:  The mathematical model of the watermark embedding method is described as follows:
6 = 0,1为需嵌入的比特信息, LEVEL为未嵌入 6时 c,.,/ = 89系数量化后 的值, 则表示为嵌入 έ后的值, Δ £ 为嵌入 έ后产生的误差, 则有 MLEVEL = LEVEL + ALEVEL。 Let 6 = 0, 1 be the bit information to be embedded, LEVEL is the value after the c,., / = 8 , 9 coefficients are not embedded in 6 , then the value is the value after embedding, and Δ £ is generated after embedding The error is MLEVEL = LEVEL + ALEVEL.
按照上面所述的奇偶对应原则, 要求嵌入信息 6与 M£ ££的对应关系 如下
Figure imgf000016_0001
偶数或奇数。
According to the parity correspondence principle described above, the correspondence between the embedded information 6 and M £ £ is required as follows
Figure imgf000016_0001
Even or odd.
按照尽量为了減小水印嵌入对 DCT 系数带来的影响, 使 EL尽 量小 , 即 LEVEL和 MLEVEL所对应的量化前的 DCT系数应该尽量接近。 因此 本发明的第一实施中, 具体的嵌入算法表述为:  In order to reduce the influence of the watermark embedding on the DCT coefficient, the EL should be as small as possible, that is, the DCT coefficients before the quantization corresponding to LEVEL and MLEVEL should be as close as possible. Therefore, in the first implementation of the present invention, the specific embedding algorithm is expressed as:
当 6 = 0且 LEVEL为偶数 , 则不需要变化 , MLEVEL = LEVEL , ALEVEL = 0; 当 ^ O jL ^ra 为奇数,则按下式对 AL£ ¾ 取值,并进一步确定 M^ E :  When 6 = 0 and LEVEL is even, no change is needed, MLEVEL = LEVEL, ALEVEL = 0; When ^ O jL ^ra is odd, the value of AL£ 3⁄4 is taken as follows, and M^ E is further determined:
ALEVEL = *)
Figure imgf000016_0002
ALEVEL = *)
Figure imgf000016_0002
其中/ eve/ = (l C0/卜 β/ 2)/(2. β >) , sign(-)为符号函数, COF为 C,. = 8,9量化前 的值, ^为量化因子, /表示整除操作; Where / eve / = (l C0 /bu β / 2) / (2. β >) , sign(-) is a sign function, COF is C,. = 8,9 before quantization, ^ is the quantization factor, / Indicates the divisible operation;
当/, = 1且 LEVEL为奇数 , 则不需要变 4乜, MLEVEL = LEVEL , ALEVEL = 0; 当 δ = 1且 LEVEL为偶数但不为 0 时, EVEL取值同(*)式, 由此确定 When /, = 1 and LEVEL is odd, you do not need to change 4乜, MLEVEL = LEVEL, ALEVEL = 0; When δ = 1 and LEVEL is even but not 0, EVEL takes the same value as (*), thus determine
MLEVEL; MLEVEL;
当 δ = 1且 LEVEL = 0 0†, ALEVEL = sign(COF) , 由 j]:匕确定 MLEVEL。  When δ = 1 and LEVEL = 0 0†, ALEVEL = sign(COF) , MJVEL is determined by j]:匕.
可见该嵌入方法在近 50%的情况下, 嵌入前后的 DCT编码值相同, 因而它对码率的影响不大。经过嵌入后,在编码时用 ^¾作为 iC,,/-89的 量化值进行 VLC编码。 在完成发送端的水印嵌入保护后,在收端则要提取数字水印得到关键 数据备份, 并由其检测多媒体数据误码。 It can be seen that in the case of nearly 50% of the embedding method, the DCT coding values before and after embedding are the same, so that it has little effect on the code rate. After embedding, VLC encoding is performed using ^3⁄4 as the quantized value of iC, / -8 , 9 , at the time of encoding. After the watermark embedding protection of the transmitting end is completed, the digital watermark is extracted at the receiving end to obtain key data backup, and the multimedia data error is detected by the digital data.
因此在步骤 303中, 从所有保护块中提取数字水印得到其所对应的被 保护块的关键数据备份。 以 H.263为例, 提取数字水印的方法艮简单, 只 需要根据视频解码的 AC8和 AC9的量化值 ^判断, 按照其奇偶性判 断对应水印比特的值, 用公式表示如下:
Figure imgf000017_0001
Therefore, in step 303, the digital watermark is extracted from all the protected blocks to obtain a key data backup of the corresponding protected block. Taking H.263 as an example, the method of extracting digital watermark is simple. It only needs to judge according to the quantized value of AC8 and AC9 of video decoding, and judge the value of corresponding watermark bit according to its parity, which is expressed by the following formula:
Figure imgf000017_0001
将 4个亮度块中的 8个比特提取出来后, 按嵌入时的顺序排列, 就得 到了上一行对应位置被保护块的运动向量范围的码字, 查表一获得相应的 运动向量取值情况。  After extracting 8 bits out of 4 luma blocks, they are arranged in the order of embedding, and the codewords of the motion vector range of the corresponding block in the previous row are obtained, and the corresponding motion vector value is obtained by looking up Table 1. .
然后在步骤 304中, 进一步根据恢复的关键数据备份和本身正常通道 传输的关键数据的对比来检测误码情况。  Then, in step 304, the error condition is further detected based on the comparison of the recovered key data backup and the key data transmitted by the normal channel itself.
本发明第二实施例在第一实施例的基础上, 由四条准则判断误码情 况:  The second embodiment of the present invention determines the error condition by four criteria on the basis of the first embodiment:
首先, 根据以下第一准则判断当前块是否正确: 如果当前块的关键数 据备份与本身所传输的关键数据一致, 或者当前块所对应的被保护块的关 键数据备份与该被保护块本身所传输的关键数据一致, 则当前块正确。  First, it is determined whether the current block is correct according to the following first criterion: if the key data backup of the current block is consistent with the key data transmitted by itself, or the key data backup of the protected block corresponding to the current block is transmitted by the protected block itself. The key data is consistent, then the current block is correct.
其次, 对于没有被所述第一准则判断为正确的数据块, 根据以下第二 准则判断当前块是否错误: 如果当前块的关键数据备份与本身所传输的关 键数据不一致并且当前块所对应的保护块正确, 或者当前块所对应的被保 护块的关键数据备份与该被保护块本身所传输的关键数据不一致且该被 保护块正确, 则当前块错误。  Secondly, for the data block that is not determined to be correct by the first criterion, determine whether the current block is erroneous according to the following second criterion: if the key data backup of the current block is inconsistent with the key data transmitted by itself and the protection corresponding to the current block If the block is correct, or the key data backup of the protected block corresponding to the current block is inconsistent with the key data transmitted by the protected block itself and the protected block is correct, the current block is incorrect.
对于用运动补偿编码方法传输的多媒体通信, 对于没有被所述第一准 贝 ij、 第二准则判断为正确或错误的数据块, 根据以下第三准则判断当前块 是否错误: 如果当前块的参考编码块错误, 则当前块错误。 这是因为对于 每个数据块来说, 其编码是基于其参考块进行的, 因此参考块错误则当前 块无法进行解码。  For the multimedia communication transmitted by the motion compensation coding method, for the data block that is not determined to be correct or incorrect by the first criterion ij, the second criterion, determine whether the current block is wrong according to the following third criterion: If the current block is referenced If the encoding block is wrong, the current block is wrong. This is because for each data block, its encoding is based on its reference block, so the current block cannot be decoded with reference to the block error.
针对于上述运动向量作为被保护关键数据的情况, 所述第一准则、 第 二准则中, 根据以下第四准则判断关键数据备份与关键数据是否一致: 如 果运动向量备份编码中其横向分量和纵向分量共 8比特表示的取值情况与 对应数据块本身传输的运动向量的取值情况符合, 则该运动向量备份与该 运动向量一致。 In the case of the above motion vector as the protected key data, the first criterion, the first In the second criterion, it is judged whether the key data backup is consistent with the key data according to the following fourth criterion: if the motion vector backup code has a total of 8 bits of the horizontal component and the vertical component, and the motion vector of the corresponding data block itself is transmitted. If the value is consistent, the motion vector backup is consistent with the motion vector.
下面以 H.263为例详细说明这些准则的具体实现方案。  The specific implementation of these guidelines is described in detail below by taking H.263 as an example.
在视频解码时,逐一检查每个 MB, 比较从 VLC解码中得到的运动向 量与从嵌入的水印中提取到的运动向量, 检测是否有误码。 设 VLC解码 过程中获得的 GOB"中 MB,,,,,,的运动向量为 MV„,,„ , 由对应保护块 中 经过解水印信息提取得到 GOB,,中 MB,,,,,,的运动向量备份记为 。 因为运动 向 量有 两 个分量 , 因 此可以表示成: MC[D„,M f , κ·„,„,=[ „,„„ Κ „,„,]7' , 其中上标 x,y分别表示横向和纵向分量。 下面描述 过程中, 采用数学逻辑符号描述判断准则, 逻辑运算 "n" 和 "u" 表示 与和或。 In the video decoding, each MB is checked one by one, and the motion vector obtained from the VLC decoding and the motion vector extracted from the embedded watermark are compared to detect whether there is a bit error. Let the motion vector of MB, ",,," in the GOB" obtained in the VLC decoding process be MV „,, „ , and extract the GOB, the medium MB,,,,,, from the corresponding protection block by the watermarking information. The motion vector backup is recorded as. Since the motion vector has two components, it can be expressed as: MC[D„, M f , κ·„, „,=[ „, „„ Κ „, „,] 7 ' , where The x, y represent the horizontal and vertical components, respectively. In the following description, the mathematical logic symbol is used to describe the judgment criterion, and the logical operations "n" and "u" represent the sum and the sum.
对于^ ,,,,,, 其保护块为 , ,+υ,, , 被保护块为 ,,-υ,, , 它本身传输的 MV 为 MV, ,,„, ,保护块 Μβ„+、,„,为它保护的 MV备份为 MV ,它本身为被保护块 ML,, 所保护的 MV备份为 MV .,,, , 被保护块本身传输的 MV为^ 而每个 MB所对应的参考 MB为同一 GOB中前一个 MB, 即 的参考 MB为 -、。 则四条准则具体描述如下: For its protection block ,,,,,, ^,, + υ ,,, protected blocks ,, - υ ,,, which is transmitted itself MV MV, ,, ",, protection block Μβ" + ,, „, the MV protected for it is backed up as MV, which is itself protected by ML, and the protected MV is backed up as MV.,,,, the MV transmitted by the protected block itself is ^ and the reference MB corresponding to each MB For the previous MB in the same GOB, that is, the reference MB is -,. The four criteria are described as follows:
第一准则, 如果满足 iM ,,,,, = MV , )u ( K„.,,„, = MV ,,, ), 则判定 MB,,,,,, = True , 即 „为正确, 无误码; The first criterion, if i M , , , , , MV , )u ( K„.,,„, = MV ,,, ) is satisfied, then judge MB,,,,,, = True, that is, „ is correct, No error code;
第 二 准 则 , 如 果 满 足 Second criterion, if it is sufficient
[{MV, ,.,„≠ MV,,',,,, ) (Μβ„.,„
Figure imgf000018_0001
False , 表示 错误, 发生误码;
[{MV, ,.,„≠ MV,,',,,, ) (Μβ„ .,„
Figure imgf000018_0001
False, indicating an error, a bit error occurred;
第三准则, 如杲满足應, Fake , 则判定 M£,,,„, = ¾ e ; The third criterion, if 杲 meets, Fake, then determines M£,,, „, = 3⁄4 e ;
第四准则, 如果满足 (M „= C)n(MC l j;,), 贝 'J判定 ,,„ =Μ^,„ , 否 则判定 ,„,≠ MV;KI„ , 而这里判断 MV,m = MV ,或 M „ = MV „的规则又是: 如果 „,与 Λ „';„或 M„';„与 M/„';,的备份编码值相等, 即表 1中的码字一样, 则判 断 MV ,,, = MV„ 或 = MV'„成立, 否则不成立。 The fourth criterion, if (M „= C)n(MC lj;,) is satisfied, B'J is judged, „=Μ^,„, otherwise judged, „,≠ MV; KI „ , and here MV, m The rule of = MV , or M „ = MV „ is: If „, and Λ „'; or M„'; „ and M/„';, the backup code values are equal, ie the code words in Table 1 , then judge MV,,, = MV„ or = MV'„ is established, otherwise it does not hold.
这里需要说明的是, 上述四个准则如果没有优先级顺序则存在相互冲 突的情况, 因此本发明的第一实施例中, 设定优先级顺序从高到底依次为 第一准则、 第二准则、 第三准则、 第四准则。 高优先級的准则判定之后的 结论, 低优先级准则不得推翻。 比如第一准则中判定当前块为正确, 则在 第三准则中就不再对当前块进行判定。 It should be noted here that the above four criteria are mutually rushed if there is no priority order. In the first embodiment of the present invention, the priority order is set from the highest to the lowest, and the first criterion, the second criterion, the third criterion, and the fourth criterion. The conclusions after the high-priority criteria are judged, the low-priority criteria must not be overturned. For example, if the first criterion determines that the current block is correct, then the current block is no longer determined in the third criterion.
另夕卜,在第四准则中是根据备份编码的码字来判断 MV分量是否相等 的, 这就等于是按照 MV的取值范围是否一样来判断其是否相等。 特别是 对于量化范围的两端, 当 MV范围超出均匀量化范围 [-3,3.5]时, 这本身就 是小概率事件, 如果^ ,, ,和^ „同样都超出了范围, 则可以在艮大概率上 认为它们是相等的。  In addition, in the fourth criterion, whether the MV components are equal according to the code words of the backup encoding is determined, which is equal to whether the MV values are equal or not. Especially for both ends of the quantization range, when the MV range exceeds the uniform quantization range [-3, 3.5], this is itself a small probability event. If ^ , , , and ^ „ are also out of range, they can be enlarged. They are considered to be equal in probability.
在步骤 305中, 判断当前块是否错误, 如果是, 就进入步骤 306; 否 贝' J , 结束本流程。  In step 305, it is determined whether the current block is erroneous. If yes, the process proceeds to step 306; otherwise, the process ends.
在步骤 306中, 判断当前块的对应保护块是否正确, 如果正确, 就进 入步骤 307; 否则, 进入步骤 308。  In step 306, it is judged whether the corresponding protection block of the current block is correct. If it is correct, the process proceeds to step 307; otherwise, the process proceeds to step 308.
在步骤 307中, 也就是在当前块错误, 其对应保护块正确的情况下, 由于所带的关键数据备份为正确, 因此可以用于恢复原关键数据。 所以当 当前块错误时, 如果其所对应的保护块正确, 则用当前块的关键数据备份 作为其关键数据进行解码。  In step 307, that is, in the case of the current block error, the corresponding protection block is correct, since the key data backup is correct, it can be used to restore the original key data. Therefore, when the current block is wrong, if the corresponding protection block is correct, the key data backup of the current block is used as its key data for decoding.
用当前块的运动向量备份反推当前块的在前一图像帧中的参考块的 位置, 并用该参考块代替当前块。 以 Η.263为例, 当检测到膽, 有误码时, 如果其保护块 正确, 即 MV:,,m正确, 则采用 MV:,,m对 MB,,,,,,进行错误掩盖。 即釆用 MV 作为 的运动向量, 然后从 MK,"来反推 ΜΒ,„,在前一帧中参考 宏块的位置, 设该参考宏块为爐 ,,„, , 上标 ref表示参考帧, 然后用細 re/ ,,,,,, 的数据来替代 , ,.,"。 The position of the reference block in the previous image frame of the current block is reversed with the motion vector backup of the current block, and the current block is replaced with the reference block. Taking Η.263 as an example, when the biliary is detected and there is a bit error, if the protection block is correct, that is, MV:, m is correct, MV:,, m is used to mask the error of MB,,,,,. That is, using MV as the motion vector, and then from MK, "to push back ,", in the previous frame, refer to the position of the macroblock, and set the reference macroblock to furnace, „, , superscript ref denotes reference frame , then replace the data with fine re/ ,,,,,, , ,.,".
在步驟 308中,也就是在当前块错误,其对应保护块也错误的情况下, 用与当前块邻近且正确的一个或多个数据块的关键数据的平均值作为当 前块的关键数据进行解码。  In step 308, that is, in the case of the current block error, and the corresponding protection block is also wrong, the average value of the key data of one or more data blocks adjacent to the current block and the correct block is used as the key data of the current block for decoding. .
这里的平均值可以是由各种广义平均算法计算。 比如算术平均 ((a+b)/2), 加权平均 ;l!a+w2*b),w,+w2=l ,w,,w2>0) , 几何平均 (sqrt(ab)) , 调和平均 (ab/(a+b)), 以及中值平均 (aha2, ,an总共 n个数, 大小排 序 a a^ .an^an,则中值平均 =a(n+1)/2,—般要求 n为奇数)等, 还可以采用去 掉被平均数组的最大最小值后的各种平均值形式。 The average here can be calculated by various generalized averaging algorithms. For example, arithmetic average ((a+b)/2), weighted average ; l! a+w 2 *b), w, +w 2 =l , w,, w 2 >0) , geometric mean (sqrt(ab) ), harmonic mean (ab/(a+b)), and median average (a h a 2 , , a n total number of n, size The order aa^.an^an, the median average = a( n+1)/2 , generally requires n to be an odd number, etc., and various average forms after the maximum and minimum values of the average array are removed.
如果所保护的运动向量备份也出错, 则用当前图像帧中与当前块邻近 且正确的一个或多个数据块的运动向量的平均值来反推当前块在前一图 像帧中的参考块的位置, 并用该参考块代替当前块。 以 H.263为例, 應,,,,,, 周围相邻的 8个宏块 (上,下,左,右, 左上, 右上, 左下, 右下)中, 对于数 据正确的那些宏块 (数量可能小于 8个), 通过将这些相邻宏块的运动向量 进行平均, 得到一个新的运动向量^^^ , / ^^^卜^ +^^^' ' = - ^'1 , 把这个新的向量作为 MB,,.,,,的运动向量,然后从 K ,,,,„来反推 M ,„在前一帧中 参考宏块的位置,设该参考宏块为 MB ,,„,然后用 ΜΒ „的数据来替代 ,, ,,,,。 If the protected motion vector backup is also in error, the reference block of the current block in the previous image frame is reversed with the average of the motion vectors of the one or more data blocks adjacent to the current block in the current image frame. Position, and replace the current block with the reference block. Take H.263 as an example, in the vicinity of 8 macroblocks (up, down, left, right, top left, top right, bottom left, bottom right), for those macroblocks with correct data ( The number may be less than 8). By averaging the motion vectors of these adjacent macroblocks, a new motion vector ^^^ , / ^^^ bu ^ +^^^'' = - ^' 1 is obtained . The new vector is used as the motion vector of MB,,.,,, and then K, ,,, „ to reverse M, „refer to the position of the macroblock in the previous frame, and set the reference macroblock to MB, „ And then use ΜΒ „ data to replace,, ,,,,.
最后, 本发明的第三实施例在第一实施例的基础上, 将该视频传输保 护方法应用在 Η.263视频传输中, 并用国际标准图像序列 "Foreman" 和 "Claire" 进行实验, 实验结果很好的验证了本发明的有效性。  Finally, the third embodiment of the present invention applies the video transmission protection method to the Η.263 video transmission based on the first embodiment, and performs experiments using the international standard image sequences "Foreman" and "Claire". The effectiveness of the present invention is well demonstrated.
使用标准图像序列, 取 400帧 (重复 10次)进行实验研究, 图像格 式是 QCIF, Y:U:V是 4:1 : 1。 实验中目标帧频为 15frames/s, H.263编码器 使用的量化因子 (QP ) 为 5。  Using a standard image sequence, 400 frames (repeated 10 times) were used for the experimental study. The image format was QCIF, and Y:U:V was 4:1:1. In the experiment, the target frame rate is 15 frames/s, and the H.263 encoder uses a quantization factor (QP) of 5.
图 5中给出的左右两副图分别是 Foreman序列的第 16帧图像在采用 一般的错误掩盖方法和本发明的方法两种情况下得到的恢复图像的对比。 可以看出, 应用本发明的方法, 恢复图像的主观质量有显箸改善。  The left and right figures shown in Fig. 5 are the comparison of the restored images obtained by the 16th frame image of the Foreman sequence in the case of the general error concealing method and the method of the present invention, respectively. It can be seen that with the method of the present invention, the subjective quality of the restored image is significantly improved.
图 6中给出的两副图分別是 Foreman和 Claire实验中在不同误码率下 在釆用一般的错误掩盖方法和本发明的方法两种情况下解码端恢复视频 的平均峰值信噪比(Peak Signal Noise Rate, 简称 "PSNR" )。 从图中可以 看出,当误码率小于 10- 3时,利用本发明方法进行错误掩盖,恢复图像 PSNR 比利用一般的错误掩盖方法平均提高 2-3dB, 从而有效地保证了恢复视频 的质量。 The two graphs given in Figure 6 are the average peak signal-to-noise ratios of the recovered video at the decoder end in the Foreman and Claire experiments at different bit error rates, using both the general error masking method and the method of the present invention. Peak Signal Noise Rate, referred to as "PSNR". As it can be seen from the figure, when the error rate is less than 10-3, using the method of the present invention for error concealment, error recovery than with the general method of masking an average of 2-3dB image PSNR, thus effectively ensuring the quality of reconstructed video .
另外, 从视频码流量来说, 如果不采用本发明的数字水印方法, 而是 采用单独重复传送运动向量的方法进行错误掩盖, 则增加的码流量高达 8.8% - 35.2%。 比较而言, 本发明方法的性能优于一般的错误掩盖算法。  In addition, from the case of video code traffic, if the digital watermarking method of the present invention is not employed, but the method of separately transmitting the motion vector is used for error concealment, the increased code traffic is as high as 8.8% - 35.2%. In comparison, the performance of the method of the present invention is superior to the general error masking algorithm.
熟悉本领域的技术人员可以理解,在上述对本发明实施例的描述中以 H.263为例进行,但该传输保护方法可以直接应用于其他标准,如, H.261、 1-1.263、 1-1.263+、 H.263++, H.264、 MPEG-1 , MPEG-2, MPEG-4, 以及 其它基于块 DCT ( Block-based DCT, 筒称 "B-DCT" )的标准或非标准多 媒体传输技术, 应用在任何这些可行的技术中均能够实现发明目的而不影 响其实质和范围。 It will be understood by those skilled in the art that in the above description of the embodiments of the present invention H.263 is taken as an example, but the transmission protection method can be directly applied to other standards, such as H.261, 1-1.263, 1-1.263+, H.263++, H.264, MPEG-1, MPEG-. 2, MPEG-4, and other block-based DCT (Block-based DCT, "B-DCT") standard or non-standard multimedia transmission technology, can be used in any of these feasible technologies to achieve the purpose of the invention without affecting Its essence and scope.
熟悉本领域的技术人员还可以理解,在上述对本发明实施例的描述中 以运动向量作为关键数据来保护和错误掩盖, 当该方法也适用于除运动向 量之外的其它视频关键数据的保护, 比如视频序列结构参数、 图象帧的结 构参数、 块组 (GOB)结构参数、 PEI信息、 补充增强信息 (Supplemental Enhancement Information, 简称 "SEI" )等, 照样实现发明目的而不影响其 实质和范围。  It will also be understood by those skilled in the art that in the above description of the embodiments of the present invention, motion vectors are used as key data for protection and error concealment, and when the method is also applicable to protection of video key data other than motion vectors, For example, video sequence structure parameters, image frame structure parameters, block group (GOB) structure parameters, PEI information, Supplemental Enhancement Information (SEI), etc., still achieve the purpose of the invention without affecting its essence and scope. .
同样的, 在上述对本发明实施例的描述中其他具体参数或方案, 比如 用 DCT系数作为水印^■载、 用 8比特对运动向量量化等, 均可以用其他 可行参数或方案代替, 能实现发明目的而不影响其实质和范围。  Similarly, in the above description of the embodiments of the present invention, other specific parameters or schemes, such as using DCT coefficients as watermarks, and 8-bit pairs of motion vectors, can be replaced by other feasible parameters or schemes, and the invention can be realized. Purpose without affecting its substance and scope.
虽然通过参照本发明的某些优选实施例, 已经对本发明进行了图示和 描述, 但本领域的普通技术人员应该明白, 可以在形式上和细节上对其作 各种改变, 而不偏离本发明的精神和范围。  Although the present invention has been illustrated and described with reference to the preferred embodiments of the present invention, those skilled in the art The spirit and scope of the invention.

Claims

权 利 要 求 Rights request
1. 一种多媒体通信的传输保护方法, 其特征在于, 包含以下步驟: A在发端用数字水印对关键数据做备份保护;  A transmission protection method for multimedia communication, comprising the following steps: A: performing backup protection on key data by using a digital watermark at the originating end;
B 在收端提取数字水印得到关键数据备份, 由其检测多媒体数据误 码;  B extracts the digital watermark at the receiving end to obtain key data backup, which detects the error of the multimedia data;
C对发生误码的多媒体数据进行错误掩盖。  C confuses the errored multimedia data.
2. 根据权利要求 1所述的多媒体通信的传输保护方法, 其特征在于, 所述步骤 A包含以下子步骤:  The transmission protection method for multimedia communication according to claim 1, wherein the step A comprises the following sub-steps:
将多媒体数据分块处理, 对当前块的所述关键数据进行备份编码; 用数字水印将所述当前块的―关键数据的备份编码嵌入到所述当前块 对应的保护块的非关键数据编码中;  Performing block processing on the multimedia data, performing backup encoding on the key data of the current block; embedding the backup code of the key data of the current block into the non-critical data encoding of the protection block corresponding to the current block by digital watermarking ;
其中, 所述保护块不同于但对应于所述当前块。  The protection block is different from but corresponding to the current block.
3. 根据权利要求 2所述的多媒体通信的传输保护方法, 其特征在于, 所述步驟 B包含以下子步骤:  The transmission protection method for multimedia communication according to claim 2, wherein the step B comprises the following sub-steps:
从所有所述保护块中提取数字水印得到其所对应的被保护块的关键 数据备份;  Extracting a digital watermark from all of the protection blocks to obtain a key data backup of the corresponding protected block;
首先, 根据以下第一准则判断当前块是否正确: 如果当前块的关键数 据备份与本身所传输的关键数据一致, 或者当前块所对应的被保护块的关 键数据备份与该被保护块本身所传输的关键数据一致, 则当前块正确; 其次, 对于没有被所述第一准则判断为正确的数据块, 根据以下第二 准则判断当前块是否错误: 如果当前块的关键数据备份与本身所传输的关 键数据不一致并且当前块所对应的保护块正确, 或者当前块所对应的被保 护块的关键数据备份与该被保护块本身所传输的关键数据不一致且该被 保护块正确, 则当前块错误。  First, it is determined whether the current block is correct according to the following first criterion: if the key data backup of the current block is consistent with the key data transmitted by itself, or the key data backup of the protected block corresponding to the current block is transmitted by the protected block itself. The key data is consistent, then the current block is correct. Secondly, for the data block that is not judged to be correct by the first criterion, it is determined according to the following second criterion whether the current block is wrong: if the key data of the current block is backed up and transmitted by itself If the key data is inconsistent and the protection block corresponding to the current block is correct, or the key data backup of the protected block corresponding to the current block is inconsistent with the key data transmitted by the protected block itself and the protected block is correct, the current block is incorrect.
4. 根据权利要求 3所述的多媒体通信的传输保护方法, 其特征在于, 所述多媒体通信用运动补偿编码方法传输, 所述步骤 B 还包含以下子步 骤:  The method for transmitting and protecting multimedia communication according to claim 3, wherein the multimedia communication is transmitted by using a motion compensation coding method, and the step B further includes the following substeps:
对于没有被所述第一准则、 第二准则判断为正确或错误的数据块, 根 据以下第三准则判断当前块是否错误: 如果当前块的参考编码块错误, 则 当前块错误。 For a data block that is not determined to be correct or incorrect by the first criterion and the second criterion, determine whether the current block is erroneous according to the following third criterion: if the reference coding block of the current block is incorrect, The current block is wrong.
5. 根据权利要求 3所述的多媒体通信的传输保护方法, 其特征在于, 所述步骤 C包含子步骤, 当前块错误时, 如果其所对应的保护块正确, 则 用当前块的关键数据备份作为其关键数据进行解码。  The transmission protection method for multimedia communication according to claim 3, wherein the step C includes a sub-step, and when the current block is incorrect, if the corresponding protection block is correct, the key data of the current block is backed up. Decode as its key data.
6. 根据权利要求 3所述的多媒体通信的传输保护方法, 其特征在于, 所述步骤 C包含子步驟, 当前块错误时, 如果其所对应的保护块错误, 则 用与当前块邻近且正确的一个或多个数据块的关键数据的平均值作为当 前块的关键数据进行解码。  The transmission protection method for multimedia communication according to claim 3, wherein the step C includes a sub-step, and when the current block is incorrect, if the corresponding protection block is incorrect, the neighboring block is adjacent to the current block. The average of the key data of one or more data blocks is decoded as key data of the current block.
7. 根据权利要求 6所述的多媒体通信的传输保护方法, 其特征在于, 所述平均值可以是以下之一:  The transmission protection method for multimedia communication according to claim 6, wherein the average value may be one of the following:
术平均值、 加权平均值、 几何平均值、 调和平均值、 中值平均值、 或者去掉被平均数组中最大值和最小值后的算术平均值、 加权平均 值、 几何平均值、 调和平均值、 及中值平均值。  Mean, weighted mean, geometric mean, harmonic mean, median mean, or arithmetic mean, weighted average, geometric mean, harmonic mean, after removing the maximum and minimum values in the average array, And the median average.
8. 根据权利要求 1 - 7中任意一条权利要求所述的多媒体通信的传输 保护方法, 其特征在于, 所述多媒体通信的传输方法为 H.261、 H.263、 1-1.263+、 1-1.263++、 1-1.264、 运动图像专家组标准 1、 运动图像专家组标准 2、 运动图像专家组标准 4的部分 2和部分 10中的任意一种。  The method for transmitting and protecting multimedia communication according to any one of claims 1-7, wherein the transmission method of the multimedia communication is H.261, H.263, 1-1.263+, 1- 1.263++, 1-1.264, Moving Picture Experts Group Standard 1, Moving Picture Experts Group Standard 2, Moving Picture Experts Group Standard 4 Part 2 and Part 10.
9. 根据权利要求 8所述的多媒体通信的传输保护方法, 其特征在于, 所述关键数据包含:  The transmission protection method for multimedia communication according to claim 8, wherein the key data comprises:
宏块的运动向量、 视频序列结构参数、 图象帧的结构参数、 块组结构 参数、 图像增强信息、 或补充增强信息。  The motion vector of the macroblock, the video sequence structure parameter, the structure parameter of the image frame, the block group structure parameter, the image enhancement information, or the supplemental enhancement information.
10.根据权利要求 8所述的多媒体通信的传输保护方法,其特征在于, 所述非关键数据为彩色图象亮度分量信号或者灰度图象的灰度信号的离 散余弦变换交流系数中的序号为 7到 12的之间的任意两个系数。  10 . The transmission protection method for multimedia communication according to claim 8 , wherein the non-critical data is a serial number in a discrete cosine transform AC coefficient of a color image luminance component signal or a gray signal of a gray image Any two coefficients between 7 and 12.
11. 根据权利要求 10所述的多媒体通信的传输保护方法, 其特征在 于, 所述非关键数据为彩色图象亮度分量信号或者灰度图象的灰度信号 的离散余弦变换交流系数中的序号为 8和 9的两个系数。  The transmission protection method for multimedia communication according to claim 10, wherein the non-critical data is a color image luminance component signal or a gradation signal of a gray image, and a serial number in a discrete cosine transform AC coefficient Two coefficients for 8 and 9.
12.根据权利要求 9所述的多媒体通信的传输保护方法,其特征在于, 所述运动向量的备份编码方法包含以下步骤, 分别以 4比特对所述运动向量的横向分量、 纵向分量编码; The transmission protection method for multimedia communication according to claim 9, wherein the backup encoding method of the motion vector comprises the following steps: Encoding the horizontal component and the longitudinal component of the motion vector by 4 bits, respectively;
其中, 所述 4 比特编码对应表示所述横向分量或纵向分量的任意 16 种互易的离散取值情况。  The 4-bit code corresponds to a discrete value of any of the 16 reciprocal representations of the horizontal component or the vertical component.
13, 根据权利要求 12 中所述的多媒体通信的传输保护方法, 其特征 在于, 所述步骤 B的所述第一准则、 第二准则中, 据以下第四准则判断 所述关键数据备份与所述关键数据是否一致:  The transmission protection method for multimedia communication according to claim 12, wherein in the first criterion and the second criterion of step B, the key data backup and the location are determined according to the following fourth criterion. Whether the key data is consistent:
如果所述运动向量备份编码中其横向分量和纵向分量共 8比特表示的 取值情况与对应数据块本身传输的所述运动向量的取值情况符合, 则所述 运动向量备份与所述运动向量一致。  If the value of the 8-bit representation of the horizontal component and the vertical component of the motion vector backup code is consistent with the value of the motion vector transmitted by the corresponding data block itself, the motion vector backup and the motion vector Consistent.
14.根据权利要求 8所述的多媒体通信的传输保护方法,其特征在于, 所述多媒体数据为图像帧序列;  The transmission protection method for multimedia communication according to claim 8, wherein the multimedia data is an image frame sequence;
每个所述图像帧分为至少两个数据块组;  Each of the image frames is divided into at least two data block groups;
每个所述数据块组分为至少两个所述数据块;  Each of the data block components is at least two of the data blocks;
每个所述数据块至少包含 4个亮度分量或者灰度信号块;  Each of the data blocks includes at least 4 luminance components or gray signal blocks;
每个所述数据块所对应的保护块为其后一个所述数据块组中满足预 设——对应关系的数据块;  a protection block corresponding to each of the data blocks is a data block in the subsequent one of the data block groups that satisfies a preset-correspondence relationship;
每个所述数据块所对应的被保护块为其前一个所述数据块组中满足 所述预设——对应关系的数据块;  The protected block corresponding to each of the data blocks is a data block in the previous one of the data block groups that satisfies the preset-correspondence relationship;
每个所述数据块所对应的参考数据块为同一数据块组中前一个数据 块。  The reference data block corresponding to each of the data blocks is the previous data block in the same data block group.
15. 根据权利要求 14所述的多媒体通信的传输保护方法, 其特征在 于, 在所述预设——对应关系中,  The transmission protection method for multimedia communication according to claim 14, wherein in the preset-correspondence relationship,
每个所述数据块所对应的保护块为其后一个所述数据块组中相同位 置的数据块;  a protection block corresponding to each of the data blocks is a data block of the same position in the next one of the data block groups;
每个所述数据块所对应的被保护块为其前一个所述数据块组中相同 位置的数据块。  The protected block corresponding to each of the data blocks is a data block of the same position in the previous one of the data block groups.
16. 根据权利要求 14所述的多媒体通信的传输保护方法, 其特征在 于, 所述步骤 A中进行所述关键数据备份的数字水印嵌入时,将所述运动 向量的 8比特备份编码分別插入到对应保护块的 4个所述亮度分量或者灰 度信号块的离散余弦变换交流系数中所述序号为 7到 I2的任意两个系数 的编码中。 The method for transmitting and protecting multimedia communication according to claim 14, wherein when the digital watermark of the key data backup is performed in the step A, the 8-bit backup code of the motion vector is separately inserted into Corresponding to the four brightness components or gray of the protection block The discrete cosine transform AC coefficient of the degree signal block is encoded in any two coefficients of the sequence number 7 to I 2 .
17. 根据权利要求 16所述的多媒体通信的传输保护方法, 其特征在 于, 所述运动向量的 8比特备份编码分别插入到对应保护块的 4个所述 亮度分量或者灰度信号块的离散余弦变换交流系数中所述序号为 8和 9的 系数的编码中。  The transmission protection method for multimedia communication according to claim 16, wherein the 8-bit backup code of the motion vector is respectively inserted into the discrete cosine of the four luma components or the gradation signal block of the corresponding protection block. The code of the coefficients of the numbers 8 and 9 in the transforming AC coefficients is transformed.
18. 根据权利要求 16所述的多媒体通信的传输保护方法, 其特征在 于, 将所述运动向量备份编码的比特插入到对应的所述离散余弦变换系数 的编码中的规则如下:  18. The transmission protection method for multimedia communication according to claim 16, wherein the rules for inserting the motion vector backup coded bits into the coding of the corresponding discrete cosine transform coefficients are as follows:
按照所述运动向量备份编码的比特, 将所述离散余弦变换的编码变为 与其编码前的值最接近的值的偶数或奇数编码。  The code of the discrete cosine transform is changed to an even or odd code of the value closest to the value before encoding according to the motion vector back-coded bits.
19. 根据权利要求 14所述的多媒体通信的传输保护方法, 其特征在 于, 所述步骤 C中, 当前块错误时, 如果其所对应的保护块正确, 则用当 前块的运动向量备份反推当前块在前一图像帧中的参考块的位置 , 并用该 参考块代替当前块。  The transmission protection method for multimedia communication according to claim 14, wherein, in the step C, when the current block is incorrect, if the corresponding protection block is correct, the motion vector backup of the current block is used to back up The position of the reference block of the current block in the previous image frame, and the current block is replaced with the reference block.
20. 根据权利要求 14所述的多媒体通信的传输保护方法, 其特征在 于, 所述步骤 C中, 当前块错误时, 如果其所对应的保护块错误, 则用当 前图像帧中与当前块邻近且正确的一个或多个数据块的运动向量的平均 值来反推当前块在前一图像帧中的参考块的位置, 并用该参考块代替当前 块。  The transmission protection method for multimedia communication according to claim 14, wherein, in the step C, when the current block is incorrect, if the corresponding protection block is incorrect, the current image frame is adjacent to the current block. And the average of the motion vectors of the correct one or more data blocks to reverse the position of the reference block of the current block in the previous image frame, and replace the current block with the reference block.
PCT/CN2006/002232 2005-09-02 2006-08-30 Multimedia communication transport protection method WO2007025476A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510029395.9 2005-09-02
CN 200510029395 CN1893663A (en) 2005-09-02 2005-09-02 Transmission protection method of multi-media communication

Publications (1)

Publication Number Publication Date
WO2007025476A1 true WO2007025476A1 (en) 2007-03-08

Family

ID=37598084

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/002232 WO2007025476A1 (en) 2005-09-02 2006-08-30 Multimedia communication transport protection method

Country Status (2)

Country Link
CN (1) CN1893663A (en)
WO (1) WO2007025476A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3094094A1 (en) * 2012-01-20 2016-11-16 BlackBerry Limited Multiple sign bit hiding within a transform unit
US9900622B2 (en) 2012-01-20 2018-02-20 Blackberry Limited Multiple sign bit hiding within a transform unit
CN111539870A (en) * 2020-02-25 2020-08-14 成都信息工程大学 New media image tampering recovery method and device based on erasure codes

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227604B (en) * 2007-01-18 2010-05-19 上海未来宽带技术及应用工程研究中心有限公司 Method for detecting network video quality by network injury tolerance
WO2009036684A1 (en) * 2007-09-14 2009-03-26 Huawei Technologies Co., Ltd. A method and device for embedding and detecting watermark information
CN101389009B (en) * 2007-09-14 2010-12-15 华为技术有限公司 Watermark information embedding, detection method and device
US8767840B2 (en) * 2009-02-11 2014-07-01 Taiwan Semiconductor Manufacturing Company, Ltd. Method for detecting errors and recovering video data
CN101990090B (en) * 2009-08-06 2013-08-07 中兴通讯股份有限公司 Method and device for labelling characteristic information of video code stream and method and device for detecting characteristic information of video code stream
CN101917628B (en) * 2010-08-30 2012-07-18 武汉烽火众智数字技术有限责任公司 Whole-frame error concealment method based on adaptive block sizes
CN102025993B (en) * 2010-12-17 2014-01-08 深圳中兴力维技术有限公司 Video transmission method and system based on H.264
CN105190659B (en) * 2013-02-26 2021-02-05 数字标记公司 Method, apparatus and arrangement for device-to-device communication
CN103796024B (en) * 2014-01-17 2017-05-03 西安空间无线电技术研究所 Method for transmitting multiple paths of images at the same time based on information hiding

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003073772A1 (en) * 2002-02-28 2003-09-04 Techno Mathematical Co., Ltd. Error masking method using moving picture electronic watermark of video
WO2005122081A1 (en) * 2004-06-08 2005-12-22 Koninklijke Philips Electronics N.V. Watermarking based on motion vectors

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003073772A1 (en) * 2002-02-28 2003-09-04 Techno Mathematical Co., Ltd. Error masking method using moving picture electronic watermark of video
WO2005122081A1 (en) * 2004-06-08 2005-12-22 Koninklijke Philips Electronics N.V. Watermarking based on motion vectors

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3094094A1 (en) * 2012-01-20 2016-11-16 BlackBerry Limited Multiple sign bit hiding within a transform unit
US9900622B2 (en) 2012-01-20 2018-02-20 Blackberry Limited Multiple sign bit hiding within a transform unit
US10743028B2 (en) 2012-01-20 2020-08-11 Velos Media, Llc Multiple sign bit hiding within a transform unit
US11786596B2 (en) 2012-01-20 2023-10-17 Velos Media, Llc Multiple sign bit hiding within a transform unit
CN111539870A (en) * 2020-02-25 2020-08-14 成都信息工程大学 New media image tampering recovery method and device based on erasure codes
CN111539870B (en) * 2020-02-25 2023-07-14 成都信息工程大学 Tamper recovery method and device for new media image based on erasure codes

Also Published As

Publication number Publication date
CN1893663A (en) 2007-01-10

Similar Documents

Publication Publication Date Title
WO2007025476A1 (en) Multimedia communication transport protection method
JP5007322B2 (en) Video encoding method
US8064527B2 (en) Error concealment in a video decoder
Chu et al. Detection and concealment of transmission errors in H. 261 images
JP4362259B2 (en) Video encoding method
US8144764B2 (en) Video coding
JP5722943B2 (en) Redundant video encoding method and apparatus
EP0800743A1 (en) Method and device for concealment and containment of errors in a macroblock-based video codec
WO2003007495A1 (en) A method and device for suspecting errors and recovering macroblock data in video coding
WO2003007536A1 (en) Method for detection and recovery of errors in the frame
Bartolini et al. A data hiding approach for correcting errors in H. 263 video transmitted over a noisy channel
US20050089102A1 (en) Video processing
Khan et al. Error Detection and Correction in H. 263 coded video over wireless network
YaLin et al. Adaptive error concealment algorithm and its application to MPEG-2 video communications
KR100312418B1 (en) Intra mode code selection method in video coder
Aladrovic et al. An error resilience scheme for layered video coding
Piva et al. Data hiding for error concealment of H. 264/AVC video transmission over mobile networks
WO2003054798A2 (en) Transmission and watermarking of video and images
Wu et al. Data Hiding for Video Communication
Campisi et al. 10 Data Hiding for Image and Video Coding
Wan et al. Error concealment for video transmission based on watermarking
VIDEO Kounghooi Hwang and Byeungwoo Jeon School of Electrical and Computer Engineering
Chen An error concealment technique based on JPEG-2000 and projections onto convex sets
Choi et al. Error-resilient method for robust video transmissions
KR20050099079A (en) Error concealment method in decoding motion picture

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06775549

Country of ref document: EP

Kind code of ref document: A1