A Novel Video Content Authentication Algorithm Combined Semi-fragile Watermarking with Compressive Sensing

Author(s):  
Xiaoling Chen ◽  
Huimin Zhao

2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Qiang Ma ◽  
Ling Xing

AbstractPerceptual video hashing represents video perceptual content by compact hash. The binary hash is sensitive to content distortion manipulations, but robust to perceptual content preserving operations. Currently, boundary between sensitivity and robustness is often ambiguous and it is decided by an empirically defined threshold. This may result in large false positive rates when received video is to be judged similar or dissimilar in some circumstances, e.g., video content authentication. In this paper, we propose a novel perceptual hashing method for video content authentication based on maximized robustness. The developed idea of maximized robustness means that robustness is maximized on condition that security requirement of hash is first met. We formulate the video hashing as a constrained optimization problem, in which coefficients of features offset and robustness are to be learned. Then we adopt a stochastic optimization method to solve the optimization. Experimental results show that the proposed hashing is quite suitable for video content authentication in terms of security and robustness.





2017 ◽  
Vol 24 (2) ◽  
pp. 211-240 ◽  
Author(s):  
Raahat Devender Singh ◽  
Naveen Aggarwal


Author(s):  
Mubbashar Sadddique ◽  
Khurshid Asghar ◽  
Tariq Mehmood ◽  
Muhammad Hussain ◽  
Zulfiqar Habib


2013 ◽  
Vol 13 (02) ◽  
pp. 1340002 ◽  
Author(s):  
DURGESH SINGH ◽  
SHIVENDRA SHIVANI ◽  
SUNEETA AGARWAL

This paper suggests an efficient fragile watermarking scheme for image content authentication along with altered region restoration capability. In this scheme, image is divided into nonoverlapping blocks of size 2 × 2 and for each block, eight bits for image content recovery data and four bits for authentication data from five most significant bits (MSBs) of each pixel, are generated. These 12 bits are embedded into the least significant bits (LSBs) of the pixels which are placed in its corresponding mapping block. At the receiver end by comparing the recalculated and extracted authentication data, the tampered blocks can easily be identified and using recovery data, one can easily restore the tampered block. Results of experiments demonstrate that the proposed scheme is effective enough for alteration detection as well as tamper recovery of the image.



Sign in / Sign up

Export Citation Format

Share Document