Robust track-and-trace video watermarking

نویسندگان

  • Lei Yang
  • Qian Chen
  • Jun Tian
  • Dapeng Wu
چکیده

With the development of computers and the Internet, digital multimedia can be distributed and pirated easily. Watermarking is a useful technique for multimedia copyright protection. In this paper, we develop a robust video watermarking system. It consists of two components, i.e., watermarking embedder and watermarking detector. In the embedder, we insert a watermark pattern into video frames according to a watermark payload. The watermark pattern is generated from a Pseudo-random Noise (PN) sequence generator using the spread spectrum technique. User and copyright information are mapped to a binary sequence and then encrypted with Advance Encryption Standard (AES) and encoded/protected by convolutional error correction code (ECC) to produce watermark payload. The watermark pattern is weighted and embedded to each frame to meet perceptual requirements. In addition, the video is slightly geometrically manipulated in order to defend possible collusion attacks. The detector extracts the watermark from the candidate video. Kanade-Lucas-Tomasi feature tracker (KLT) is used to register the candidate video with respect to the original video, to enhance the correlation with the reference. The cross-correlation sequence is binarized, ECC decoded and decrypted. The experimental results show that the proposed video watermark system is very robust to not only geometric attack, but also collusion attacks, and that it is perceptually invisible to human vision system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust multiplicative video watermarking using statistical modeling

The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

A chaos-based video watermarking algorithm

The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

A Robust Digital Image Watermarking Scheme Based on DWT

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012