Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity.This study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4))...Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity.This study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their interaction with distinct irreducible polynomials.The primary aim is to enhance watermarking techniques for achieving imperceptibility,robustness,and efficient execution time.The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process.Scene selection is used strategically to embed watermarks in the most vital frames of the video,while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria,maintaining the video's visual quality.Concurrently,careful consideration is given to execution time,crucial in real-world scenarios,to balance efficiency and efficacy.The Peak Signal-to-Noise Ratio(PSNR)serves as a pivotal metric to gauge the watermark's imperceptibility and video quality.The study explores various irreducible polynomials,navigating the trade-offs between computational efficiency and watermark imperceptibility.In parallel,the study pays careful attention to the execution time,a paramount consideration in real-world scenarios,to strike a balance between efficiency and efficacy.This comprehensive analysis provides valuable insights into the interplay of GF multiplication tables,diverse irreducible polynomials,scene selection,adaptive thresholding,imperceptibility,and execution time.The evaluation of the proposed algorithm's robustness was conducted using PSNR and NC metrics,and it was subjected to assessment under the impact of five distinct attack scenarios.These findings contribute to the development of watermarking strategies that balance imperceptibility,robustness,and processing efficiency,enhancing the field's practicality and effectiveness.展开更多
This paper presents a novel technique for embedding a digital watermark into video frames based on motion vectors and discrete wavelet transform (DWT). In the proposed scheme, the binary image watermark is divided int...This paper presents a novel technique for embedding a digital watermark into video frames based on motion vectors and discrete wavelet transform (DWT). In the proposed scheme, the binary image watermark is divided into blocks and each watermark block is embedded several times in each selected video frame at different locations. The block-based motion estimation algorithm is used to select the video frame blocks having the greatest motion vectors magnitude. The DWT is applied to the selected frame blocks, and then, the watermark block is hidden into these blocks by modifying the coefficients of the Horizontal sub-bands (HL). Adding the watermark at different locations in the same video frame makes the scheme more robust against different types of attacks. The method was tested on different types of videos. The average peak signal to noise ratio (PSNR) and the normalized correlation (NC) are used to measure the performance of the proposed method. Experimental results show that the proposed algorithm does not affect the visual quality of video frames and the scheme is robust against a variety of attacks.展开更多
Digital watermarking is one of the most powerful tools used in ownership and copyrights protection in digital media. This paper presents a blind digital video watermarking technique based on a combination scheme betwe...Digital watermarking is one of the most powerful tools used in ownership and copyrights protection in digital media. This paper presents a blind digital video watermarking technique based on a combination scheme between the Discrete Wavelet transform in (DWT) and the real Schur Decomposition. The scheme starts with applying twolevel DWT to the video scene followed by Schur decomposition in which the binary watermark bits are embedded in the resultant block upper triangular matrix. The proposed technique shows high efficiency due to the use of Schur decomposition which requires fewer computations compared to other transforms. The imperceptibility of the scheme is also very high due to the use of DWT transform;therefore, no visual distortion is noticed in the watermarked video after embedding. Furthermore, the technique proves to be robust against set of standard attacks like: Gaussian, salt and pepper and rotation and some video attacks such as: frame dropping, cropping and averaging. Both capacity and blindness features are also considered and achieved in this technique.展开更多
A novel technique for the video watermarking based on the discrete wavelet transform (DWT) is present. The intra frames of video are transformed to three gray image firstly, and then the 2th-level discrete wavelet dec...A novel technique for the video watermarking based on the discrete wavelet transform (DWT) is present. The intra frames of video are transformed to three gray image firstly, and then the 2th-level discrete wavelet decomposition of the gray images is computed, with which the watermark W is embedded simultaneously into and invert wavelet transform is done to obtain the gray images which contain the secret information. Change the intra frames of video based on the three gray images to make the intra frame contain the secret information. While extracting the secret information, the intra frames are transformed to three gray image, 2th-level discrete wavelet transform is done to the gray images, and the watermark W’ is distilled from the wavelet coefficients of the three gray images. The test results show the superior performance of the technique and potential for the watermarking of video.展开更多
A new video watermarking method for the Audio Video coding Standard (AVS) is proposed. According to human visual masking properties, this method determines the region of interest for watermark embedding by analyzing v...A new video watermarking method for the Audio Video coding Standard (AVS) is proposed. According to human visual masking properties, this method determines the region of interest for watermark embedding by analyzing video semantics, and generates dynamic robust watermark according to video motion semantics, and embeds watermarks in the Intermediate Frequency (IF) Discrete Cosine Transform (DCT) coefficients of the luminance sub-block prediction residual in the region of interest. This method controls watermark embedding strength adaptively by video textures semantics. Ex- periments show that this method is robust not only to various conventional attacks, but also to re-frame, frame cropping, frame deletion and other video-specific attacks.展开更多
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind...The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.展开更多
Following the popularity of digital video application,video copying and dissemination have become very easy;however,this makes video hacking and piracy a potential threat in video communication.Video watermarking tech...Following the popularity of digital video application,video copying and dissemination have become very easy;however,this makes video hacking and piracy a potential threat in video communication.Video watermarking technology can solve the problem of copyright protection,and thus,it has been extensively researched.The robustness of the video watermarking algorithm in the bitstream domain is poor,especially the anti-recompression ability,since the watermarked video may be compressed again before transmitting.Considering this,this paper proposes a video watermarking algorithm in the bitstream domain based on moving object detection.To increase the robustness of the watermarking scheme,the moving macroblocks that belong to the moving object in each P frame can be identified via the moving object detection algorithm.Then,watermark embedding in the moving macroblocks is performed using codeword substitution to ensure the consistency of the bitstream.Moving object detection and watermark embedding are independent and are both carried out in the bitstream domain by partially decoding the bitstream;this avoids the complete decoding and reconstruction of the video,making the method to be highly efficient.The simulation results confirm that the proposed method is robust against recompression and has little impact on the video visual quality and no influence on the bit rate.展开更多
Related to the growth of data sharing on the Internet and the wide-spread use of digital media,multimedia security and copyright protection have become of broad interest.Visual cryptography(VC)is a method of sharing a...Related to the growth of data sharing on the Internet and the wide-spread use of digital media,multimedia security and copyright protection have become of broad interest.Visual cryptography(VC)is a method of sharing a secret image between a group of participants,where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original,and certain other groups are defined as prohibited,and even if they combine knowledge of their parts,they can’t obtain any information on the secret image.The visual cryptography is one of the techniques which used to transmit the secrete image under the cover picture.Human vision systems are connected to visual cryptography.The black and white image was originally used as a hidden image.In order to achieve the owner’s copy right security based on visual cryptography,a watermarking algorithm is presented.We suggest an approach in this paper to hide multiple images in video by meaningful shares using one binary share.With a common share,which we refer to as a smart key,we can decrypt several images simultaneously.Depending on a given share,the smart key decrypts several hidden images.The smart key is printed on transparency and the shares are involved in video and decryption is performed by physically superimposing the transparency on the video.Using binary,grayscale,and color images,we test the proposed method.展开更多
Video watermark is the main method to protect the copyright of digital video. In this paper, a blind video watermarking scheme based on independent component analysis (ICA) and shot segmentation is presented. In this ...Video watermark is the main method to protect the copyright of digital video. In this paper, a blind video watermarking scheme based on independent component analysis (ICA) and shot segmentation is presented. In this scheme, the global histogram comparison approach is used to segment the video, and ICA is performed on each ob- tained segment to get its independent component frames (ICFs). The copyright informa- tion is embedded into the principal independent component frames (PICFs) according to the single watermark embedding (SWE) scheme. The content-based shot segmentation for video sequences is used here to improve the robustness to temporal desynchroniza- tion. The watermark embedded in PICFs provides better robustness to intra-video collu- sion attack. And blind detection is achieved by using the SWE scheme. The simulations show the feasibility and validity of this scheme. It can resist most of the common frame-based and video-based attacks. The watermark can be detected blindly. And it is robust to temporal desynchronization and intra-video collusion.展开更多
In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the orig...In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression.展开更多
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of ...A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA(timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.展开更多
In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turb...In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turbo code was used to encode the message prior to watermark embedding and decode the watermark posterior to watermark detection. From the analysis and experiments, the following conclusion could be drawn. The T-DNW algorithm has little higher computational complexity than DNW. And both algorithms have the same performance in terms of watermark visual quality impact. Furthermore, the T-DNW algorithm is much more robust against some common attack than DNW. Although the T-DNW algorithm sacrifices a half payload, we think the achievements are encouraging.展开更多
文摘Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity.This study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their interaction with distinct irreducible polynomials.The primary aim is to enhance watermarking techniques for achieving imperceptibility,robustness,and efficient execution time.The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process.Scene selection is used strategically to embed watermarks in the most vital frames of the video,while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria,maintaining the video's visual quality.Concurrently,careful consideration is given to execution time,crucial in real-world scenarios,to balance efficiency and efficacy.The Peak Signal-to-Noise Ratio(PSNR)serves as a pivotal metric to gauge the watermark's imperceptibility and video quality.The study explores various irreducible polynomials,navigating the trade-offs between computational efficiency and watermark imperceptibility.In parallel,the study pays careful attention to the execution time,a paramount consideration in real-world scenarios,to strike a balance between efficiency and efficacy.This comprehensive analysis provides valuable insights into the interplay of GF multiplication tables,diverse irreducible polynomials,scene selection,adaptive thresholding,imperceptibility,and execution time.The evaluation of the proposed algorithm's robustness was conducted using PSNR and NC metrics,and it was subjected to assessment under the impact of five distinct attack scenarios.These findings contribute to the development of watermarking strategies that balance imperceptibility,robustness,and processing efficiency,enhancing the field's practicality and effectiveness.
文摘This paper presents a novel technique for embedding a digital watermark into video frames based on motion vectors and discrete wavelet transform (DWT). In the proposed scheme, the binary image watermark is divided into blocks and each watermark block is embedded several times in each selected video frame at different locations. The block-based motion estimation algorithm is used to select the video frame blocks having the greatest motion vectors magnitude. The DWT is applied to the selected frame blocks, and then, the watermark block is hidden into these blocks by modifying the coefficients of the Horizontal sub-bands (HL). Adding the watermark at different locations in the same video frame makes the scheme more robust against different types of attacks. The method was tested on different types of videos. The average peak signal to noise ratio (PSNR) and the normalized correlation (NC) are used to measure the performance of the proposed method. Experimental results show that the proposed algorithm does not affect the visual quality of video frames and the scheme is robust against a variety of attacks.
基金This paper is sponsored by the National Natural Science Foundation of China (No. 60802057, 61071153), National 863 Plan of China ( 2009AA01Z407 ), Shanghai Rising-Star Program (10QA1403700), and Shanghai Educational Development Foundation.
文摘Digital watermarking is one of the most powerful tools used in ownership and copyrights protection in digital media. This paper presents a blind digital video watermarking technique based on a combination scheme between the Discrete Wavelet transform in (DWT) and the real Schur Decomposition. The scheme starts with applying twolevel DWT to the video scene followed by Schur decomposition in which the binary watermark bits are embedded in the resultant block upper triangular matrix. The proposed technique shows high efficiency due to the use of Schur decomposition which requires fewer computations compared to other transforms. The imperceptibility of the scheme is also very high due to the use of DWT transform;therefore, no visual distortion is noticed in the watermarked video after embedding. Furthermore, the technique proves to be robust against set of standard attacks like: Gaussian, salt and pepper and rotation and some video attacks such as: frame dropping, cropping and averaging. Both capacity and blindness features are also considered and achieved in this technique.
基金Supported by the Science and Technology Plan Foundation of GuangDong (No. 2004B16001006) and the Science and Technology Plan Foundation of Dongguan (No. 2004D1015)
文摘A novel technique for the video watermarking based on the discrete wavelet transform (DWT) is present. The intra frames of video are transformed to three gray image firstly, and then the 2th-level discrete wavelet decomposition of the gray images is computed, with which the watermark W is embedded simultaneously into and invert wavelet transform is done to obtain the gray images which contain the secret information. Change the intra frames of video based on the three gray images to make the intra frame contain the secret information. While extracting the secret information, the intra frames are transformed to three gray image, 2th-level discrete wavelet transform is done to the gray images, and the watermark W’ is distilled from the wavelet coefficients of the three gray images. The test results show the superior performance of the technique and potential for the watermarking of video.
基金Supported by the Natural Science Foundation of Shaanxi Province (SJ08F15)the Industry Tackling Project of Shaanxi Province (2010K06-20)the National Natural Science Foundation of China and Civil Aviation Ad-ministration of China (No. 61072110)
文摘A new video watermarking method for the Audio Video coding Standard (AVS) is proposed. According to human visual masking properties, this method determines the region of interest for watermark embedding by analyzing video semantics, and generates dynamic robust watermark according to video motion semantics, and embeds watermarks in the Intermediate Frequency (IF) Discrete Cosine Transform (DCT) coefficients of the luminance sub-block prediction residual in the region of interest. This method controls watermark embedding strength adaptively by video textures semantics. Ex- periments show that this method is robust not only to various conventional attacks, but also to re-frame, frame cropping, frame deletion and other video-specific attacks.
文摘The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.
基金supported by the National Natural Science Foundation of China(No.61702563)。
文摘Following the popularity of digital video application,video copying and dissemination have become very easy;however,this makes video hacking and piracy a potential threat in video communication.Video watermarking technology can solve the problem of copyright protection,and thus,it has been extensively researched.The robustness of the video watermarking algorithm in the bitstream domain is poor,especially the anti-recompression ability,since the watermarked video may be compressed again before transmitting.Considering this,this paper proposes a video watermarking algorithm in the bitstream domain based on moving object detection.To increase the robustness of the watermarking scheme,the moving macroblocks that belong to the moving object in each P frame can be identified via the moving object detection algorithm.Then,watermark embedding in the moving macroblocks is performed using codeword substitution to ensure the consistency of the bitstream.Moving object detection and watermark embedding are independent and are both carried out in the bitstream domain by partially decoding the bitstream;this avoids the complete decoding and reconstruction of the video,making the method to be highly efficient.The simulation results confirm that the proposed method is robust against recompression and has little impact on the video visual quality and no influence on the bit rate.
文摘Related to the growth of data sharing on the Internet and the wide-spread use of digital media,multimedia security and copyright protection have become of broad interest.Visual cryptography(VC)is a method of sharing a secret image between a group of participants,where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original,and certain other groups are defined as prohibited,and even if they combine knowledge of their parts,they can’t obtain any information on the secret image.The visual cryptography is one of the techniques which used to transmit the secrete image under the cover picture.Human vision systems are connected to visual cryptography.The black and white image was originally used as a hidden image.In order to achieve the owner’s copy right security based on visual cryptography,a watermarking algorithm is presented.We suggest an approach in this paper to hide multiple images in video by meaningful shares using one binary share.With a common share,which we refer to as a smart key,we can decrypt several images simultaneously.Depending on a given share,the smart key decrypts several hidden images.The smart key is printed on transparency and the shares are involved in video and decryption is performed by physically superimposing the transparency on the video.Using binary,grayscale,and color images,we test the proposed method.
文摘Video watermark is the main method to protect the copyright of digital video. In this paper, a blind video watermarking scheme based on independent component analysis (ICA) and shot segmentation is presented. In this scheme, the global histogram comparison approach is used to segment the video, and ICA is performed on each ob- tained segment to get its independent component frames (ICFs). The copyright informa- tion is embedded into the principal independent component frames (PICFs) according to the single watermark embedding (SWE) scheme. The content-based shot segmentation for video sequences is used here to improve the robustness to temporal desynchroniza- tion. The watermark embedded in PICFs provides better robustness to intra-video collu- sion attack. And blind detection is achieved by using the SWE scheme. The simulations show the feasibility and validity of this scheme. It can resist most of the common frame-based and video-based attacks. The watermark can be detected blindly. And it is robust to temporal desynchronization and intra-video collusion.
基金partially supported by Fundamental Research Funds for the Central Universities of China(2016JKF01203)National Natural Science Foundation of China(61401408,61402484,and 61502160)
文摘In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression.
基金Supported bythe National Natural Science Foundationof China (60175001)
文摘A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA(timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.
文摘In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turbo code was used to encode the message prior to watermark embedding and decode the watermark posterior to watermark detection. From the analysis and experiments, the following conclusion could be drawn. The T-DNW algorithm has little higher computational complexity than DNW. And both algorithms have the same performance in terms of watermark visual quality impact. Furthermore, the T-DNW algorithm is much more robust against some common attack than DNW. Although the T-DNW algorithm sacrifices a half payload, we think the achievements are encouraging.