Robust wavelet-based video watermarking scheme for copyright protection using the human visual system

2011 ◽  
Vol 20 (1) ◽  
pp. 013022 ◽  
Author(s):  
Radu O. Preda
2011 ◽  
Vol 179-180 ◽  
pp. 103-108
Author(s):  
Sheng Bing Che ◽  
Jin Kai Luo ◽  
Bin Ma

A quasi-blind adaptive video watermarking algorithm in uncompressed video wavelet domain based on human visual system is proposed in this paper. This algorithm established a visual model according to the human visual masking and the characteristics of wavelet coefficients. It did not require the scene segmentation of the video, choosing the video frames which used for embedding watermarking by the key, and embedding different watermarking which processed by Arnold scrambling into different frame, so it is robust to statistical analysis, frame crop and so on. To ensure the spatial synchrony when extracting the watermark information, zero-watermarking method and chaotic system are used to generate the synchronization information. The quantized central limit theorem is applied to adjust the low frequency coefficients, it makes the extracted watermark information keeps invariant when its element value changed in robust region. A new correlation detection method of watermarking information was put forward. Watermark detection does not require original video. It realized the quasi-blind watermark detection.


Author(s):  
Chun-Shien Lu ◽  
Hong-Yuan Mark Liao ◽  
Jan-Ru Chen ◽  
Kuo-Chin Fan

Digital watermarking has been proposed as very useful technology in the protection of digital data such as image, audio, video, formatted documents (PDF or PS), and 3D objects. In the literature, most of the existing watermarking approaches are conducted on images. However, video is even more useful and should be protected with higher priority. In particular, video sequences usually contain rich properties that images do not have. On the other hand, the types of attacks applied on a video are much different from those applied on an image. In this chapter, we will focus ourselves specifically on video watermarking. The content of this chapter is divided into two parts. In the first part, the existing video watermarking techniques are briefly reviewed. We have pointed out their advantages and disadvantages to realize what can be done about video watermarking. In the second part, we propose a compressed domain video watermarking scheme for copyright protection. For the sake of real-time video watermark detection, our method is directly conducted in the MPEG-2 bitstream. More specifically, watermarks are inserted into the VLC domain. We shall discuss how to select proper data in a video bitstream to embed watermarks while preserving perceptual fidelity. In addition, video watermarks are embedded by a new proposed watermarking technique, which is based on the concept of communications with side information. The power of our method is reflected by its robust capability against attacks. Future work will also be pointed out to further improve the current scheme


Author(s):  
Rakesh Ahuja ◽  
Dr. Sarabjeet Singh Bedi

<p>This paper focuses on moving picture expert group ( MPEG) based digital video watermarking scheme for copyright protection services. The present work implemented the video watermarking technique in which discrete cosine transform (DCT) intermediate frequency coefficients from instantaneous decoder refresh (IDR) frames are utilized. The subset of IDR frames as candidate frames are chosen to reduces the probability of temporal synchronization attacks to achieve better robustness and high visual perceptual quality.  A secret key based cryptographic technique is used to enhance the security of embedded watermark. The proposed scheme embedded the watermark directly during the differential pulse code modulation (DPCM) process and extracting through decoding the entropy details. Three keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the watermark. The robustness is evaluated by testing spatial synchronization attacks, temporal synchronization attacks and re-encoding attacks. The present work calculates the simulation results that shows the watermarking scheme achieved high robustness against video processing attacks frequently occur in the real world and perceptibility also obtained without changing the motion vectors during the DPCM process of MPEG-2 encoding scheme.</p>


Sign in / Sign up

Export Citation Format

Share Document