收稿日期: 2016-07-29
修回日期: 2016-08-16
网络出版日期: 2016-09-30
基金资助
国家自然科学基金(No.61370218)资助
Video Watermarking Robust Against Frame Operations Based on Hamming Code Correction
Received date: 2016-07-29
Revised date: 2016-08-16
Online published: 2016-09-30
提出一种基于(7,4)汉明码纠错机制的抗视频帧操作的帧定位算法,可通过识别含水印帧来提取受到帧操作攻击的水印信息。首先利用改进的简单线性迭代聚类(simple lineariterative clustering,SLIC)超像素分割算法提取视频帧的固有特征X,这里X是一串7位的0-1序列,是由SLIC超像素分割算法通过预处理、量化等运算得到的聚类中心。将视频帧的固有特征X与汉明码结合形成一个特殊的编码S。以编码S为定位码,利用(7,4)汉明码的纠错机制修改1位可隐藏3位的性能来实现定位码的标识,再基于DCT-SVD(discrete cosinetransformation-singular value decomposition)分解将水印信息嵌入到含定位标识的视频中。实验结果表明,该算法不仅能抵抗帧删除、帧添加和重编码等攻击,也能抵抗常见的信号处理操作。
任少盈, 袁世杰, 高鹏, 陆剑锋, 张善卿, 李黎 . 基于汉明纠错机制的抗帧操作的视频水印[J]. 应用科学学报, 2016 , 34(5) : 585 -597 . DOI: 10.3969/j.issn.0255-8297.2016.05.011
A frame alignment algorithm is proposed using the (7,4) Hamming code correction to resist these attacking operations. In this algorithm, the watermark is extracted by identifying watermarked frames. The simple linear iterative clustering (SLIC) superpixels method is used to extract the frames' natural characteristics X, which is a 7-bit binary sequence representing the clustering centers obtained using SLIC via preprocessing and quantization. The approach takes advantage of (7,4) Hamming code correction that can hide three bits of the target code S by modifying only one bit. The watermark is then embedded into the video containing alignment marks with DCT-SVD decomposition. Experimental results show that the proposed approach can resist attacks such as frame dropping, frame insertion and recoding. It is also robust against common signal processing operations.
Key words: targeting codes; frame dropping; recoding; video watermarking
[1] Hernandez A C, Hernandez M C, Vazquez M G. Transcoding resilient video watermarking schemebased on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97: 40-54.
[2] Xu D W, Wang R D, Wang J C. A novel watermarking scheme for H.264/AVC video authentication[J]. Signal Processing: Image Communication, 2011, 26: 267-279.
[3] Tian L H, Zheng N N, Xue J R. Authentication and copyright protection watermarkingscheme for H.264 based on visual saliency and secret sharing [J]. Multimed Tools Appl, 2015, 74: 2991-3011.
[4] Wei H R, Kou Z Y. Research and application of digital watermarkfor video copyright protection[J]. International Conference on Computational Intelligence and Security, 2009, 246-250.
[5] Li Q, Wang R D, Xu D W. Fragile video watermarking algorithm based on H.264/AVC [J]. Materials Research Innovations, 2013, 17(s1): 94-100.
[6] Chen H Y, Zhu Y S. A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique [J]. Multimedia Tool & Applications, 2012, 71(3): 991-1012.
[7] Liu Z, Li Q, Guan S, Peng X Y. A robust watermarking algorithm based on differential energy and QIM for uncompressed video [C]//15th international Conference, Intelligent Information Hiding and Multimedia Signal Processing, 2009: 382-385.
[8] Fallahpour M, Shirmohammadi S, Semsarzadeh M. Tampering detection in compressed digital video using watermarking [J]. IEEE Transactions on Instrumentation and Measurement, 2014, 63(5): 1057-1072.
[9] Crandall R. Some notes on steganography. steganography mailing list [Online]. http://os.inf.tu-dresden.de/westfeld/crandall.pdf.
[10] Morelos-Zaragoza R H. The art of error correcting coding [M]. [s.l.]: Wiley, 2006.
[11] Zhang W, Wang S, Zhang X. Improving embedding efficiencyof covering codes for applications in steganography [J]. IEEE Communications Letters, 2007, 11(8): 680-682.
[12] 张立和,杨成,孔祥维. 基于运动矢量统计的同步视频水印算法[J]. 光电子·激光,2007, 2: 236-240. Zhang L H, Yang C, Kong X W. Video watermarking synchronization based on motion vector statistic [J]. Journal of Optoe lectronics·Laser, 2007, 18(2): 236-240. (in Chinese)
[13] 曾骁,陈真勇,范围,陈辉,熊璋. 用于内容认证的半脆弱可逆视频水印算法[J]. 中国图象图形学 报,2010, 15(8): 1189-1195. Zeng X, Chen Z Y, Fan W, Chen H, Xiong Z. Invertible semi-fragile video watermarking algorithm used for content authentication [J]. Journal of Image and Graphic, 2010, 15(8): 1189-1195. (in Chinese)
[14] Cedillo-Hernandez A, Cedillo-Hernandez M, Garcia-Vazquez M, Nakano-Miyatake M, Perez-Meana H. Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97(7): 40-54.
[15] Lee M J, Im D H, Lee H Y, Kim K S, Lee H K. Real-time video watermarking system on the compressed domain for high definition video contents: practical issues [J]. Digital Signal Processing, 2012(22): 190-198.
[16] Preda R., Vizireanu D N. Robust wavelet-based video watermarking scheme for copyright protection using the human visual system [J]. Journal of Electronic Imaging, 2012(20): 013022-1-013022-8.
[17] Ling H, Wang L, Zou F. Robust video watermarking based on affine invariant regions in the compressed domain [J]. Signal Processing, 2011, 91(8): 1863-1875.
[18] Achanta R, Shaji A. Smith K, Lucchi A, Fua P, Süstrunk S. SLIC superpixels compared to state-of-the-art superpixel methods [J]. IEEE Pattern Analysis and Machine Intelligence 2012, 34(11): 2274-2282.
[19] Chang C C, Kieu T D, Chou Y C. A high payload steganographic scheme based on (7,4) Hamming code for digital images [C]//Internatimal Symposium on Electronic Commerce and Security, 2008: 16-21.
/
| 〈 |
|
〉 |