Fast geometric resistant video watermarking scheme for gateway copyright protection

2013 ◽  
Vol 33 (12) ◽  
pp. 3531-3535
Author(s):  
Hongbin LIU ◽  
Ling DU ◽  
Hongli JI
Author(s):  
Chun-Shien Lu ◽  
Hong-Yuan Mark Liao ◽  
Jan-Ru Chen ◽  
Kuo-Chin Fan

Digital watermarking has been proposed as very useful technology in the protection of digital data such as image, audio, video, formatted documents (PDF or PS), and 3D objects. In the literature, most of the existing watermarking approaches are conducted on images. However, video is even more useful and should be protected with higher priority. In particular, video sequences usually contain rich properties that images do not have. On the other hand, the types of attacks applied on a video are much different from those applied on an image. In this chapter, we will focus ourselves specifically on video watermarking. The content of this chapter is divided into two parts. In the first part, the existing video watermarking techniques are briefly reviewed. We have pointed out their advantages and disadvantages to realize what can be done about video watermarking. In the second part, we propose a compressed domain video watermarking scheme for copyright protection. For the sake of real-time video watermark detection, our method is directly conducted in the MPEG-2 bitstream. More specifically, watermarks are inserted into the VLC domain. We shall discuss how to select proper data in a video bitstream to embed watermarks while preserving perceptual fidelity. In addition, video watermarks are embedded by a new proposed watermarking technique, which is based on the concept of communications with side information. The power of our method is reflected by its robust capability against attacks. Future work will also be pointed out to further improve the current scheme


Author(s):  
Rakesh Ahuja ◽  
Dr. Sarabjeet Singh Bedi

<p>This paper focuses on moving picture expert group ( MPEG) based digital video watermarking scheme for copyright protection services. The present work implemented the video watermarking technique in which discrete cosine transform (DCT) intermediate frequency coefficients from instantaneous decoder refresh (IDR) frames are utilized. The subset of IDR frames as candidate frames are chosen to reduces the probability of temporal synchronization attacks to achieve better robustness and high visual perceptual quality.  A secret key based cryptographic technique is used to enhance the security of embedded watermark. The proposed scheme embedded the watermark directly during the differential pulse code modulation (DPCM) process and extracting through decoding the entropy details. Three keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the watermark. The robustness is evaluated by testing spatial synchronization attacks, temporal synchronization attacks and re-encoding attacks. The present work calculates the simulation results that shows the watermarking scheme achieved high robustness against video processing attacks frequently occur in the real world and perceptibility also obtained without changing the motion vectors during the DPCM process of MPEG-2 encoding scheme.</p>


2009 ◽  
Vol 4 (3) ◽  
Author(s):  
Tanfeng Sun ◽  
Xinghao Jiang ◽  
Shusen Shi ◽  
Zhigao Lin ◽  
Guanglei Fu

Author(s):  
Yanwei Liu ◽  
Jinxia Liu ◽  
Antonios Argyriou ◽  
Siwei Ma ◽  
Liming Wang ◽  
...  

Similar to conventional video, the increasingly popular 360  virtual reality (VR) video requires copyright protection mechanisms. The classic approach for copyright protection is the introduction of a digital watermark into the video sequence. Due to the nature of spherical panorama, traditional watermarking schemes that are dedicated to planar media cannot work efficiently for 360  VR video. In this article, we propose a spherical wavelet watermarking scheme to accommodate 360  VR video. With our scheme, the watermark is first embedded into the spherical wavelet transform domain of the 360  VR video. The spherical geometry of the 360  VR video is used as the host space for the watermark so that the proposed watermarking scheme is compatible with the multiple projection formats of 360  VR video. Second, the just noticeable difference model, suitable for head-mounted displays (HMDs), is used to control the imperceptibility of the watermark on the viewport. Third, besides detecting the watermark from the spherical projection, the proposed watermarking scheme also supports detecting watermarks robustly from the viewport projection. The watermark in the spherical domain can protect not only the 360  VR video but also its corresponding viewports. The experimental results show that the embedded watermarks are reliably extracted both from the spherical and the viewport projections of the 360  VR video, and the robustness of the proposed scheme to various copyright attacks is significantly better than that of the competing planar-domain approaches when detecting the watermark from viewport projection.


2011 ◽  
Vol 10 ◽  
pp. 843-848 ◽  
Author(s):  
Ming Jiang ◽  
Zhao-feng Ma ◽  
Xin-xin Niu ◽  
Yi-xian Yang

2018 ◽  
Vol 7 (S1) ◽  
pp. 73-77
Author(s):  
J. Udayakumar ◽  
G. Prabakaran ◽  
R. Madhan Mohan

Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright in fingerprint has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright protection is proposed. The watermarking phase of this proposed algorithm is based on, the discrete cosine transform (DCT), while the encryption phase is based on using four chaotic maps with different dimensions. The proposed watermarking scheme uses a new PN-codes embedding strategy of the watermark into the cover image. This strategy allows decreasing the embedding strength factor of the scheme to a value that maximizes imperceptibility performance while maintaining acceptable robustness of the watermarking scheme. On the other hand, the proposed chaos-based encryption algorithm used four chaotic maps of different dimensions and it has two diffusion stages rather than one to improve the algorithm efficiency. The proposed encryption algorithm is tested using different experiments. The experimental results demonstrate that the proposed encryption algorithm shows advantages of large key space, high resistance against differential attacks and high security analysis such as statistical analysis, and sensitivity analysis.


Sign in / Sign up

Export Citation Format

Share Document