Video Watermarking Robust Against Frame Operations Based on Hamming Code Correction
Received date: 2016-07-29
Revised date: 2016-08-16
Online published: 2016-09-30
A frame alignment algorithm is proposed using the (7,4) Hamming code correction to resist these attacking operations. In this algorithm, the watermark is extracted by identifying watermarked frames. The simple linear iterative clustering (SLIC) superpixels method is used to extract the frames' natural characteristics X, which is a 7-bit binary sequence representing the clustering centers obtained using SLIC via preprocessing and quantization. The approach takes advantage of (7,4) Hamming code correction that can hide three bits of the target code S by modifying only one bit. The watermark is then embedded into the video containing alignment marks with DCT-SVD decomposition. Experimental results show that the proposed approach can resist attacks such as frame dropping, frame insertion and recoding. It is also robust against common signal processing operations.
Key words: targeting codes; frame dropping; recoding; video watermarking
REN Shao-ying, YUAN Shi-jie, GAO Peng, LU Jian-feng, ZHANG Shan-qing, LI Li . Video Watermarking Robust Against Frame Operations Based on Hamming Code Correction[J]. Journal of Applied Sciences, 2016 , 34(5) : 585 -597 . DOI: 10.3969/j.issn.0255-8297.2016.05.011
[1] Hernandez A C, Hernandez M C, Vazquez M G. Transcoding resilient video watermarking schemebased on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97: 40-54.
[2] Xu D W, Wang R D, Wang J C. A novel watermarking scheme for H.264/AVC video authentication[J]. Signal Processing: Image Communication, 2011, 26: 267-279.
[3] Tian L H, Zheng N N, Xue J R. Authentication and copyright protection watermarkingscheme for H.264 based on visual saliency and secret sharing [J]. Multimed Tools Appl, 2015, 74: 2991-3011.
[4] Wei H R, Kou Z Y. Research and application of digital watermarkfor video copyright protection[J]. International Conference on Computational Intelligence and Security, 2009, 246-250.
[5] Li Q, Wang R D, Xu D W. Fragile video watermarking algorithm based on H.264/AVC [J]. Materials Research Innovations, 2013, 17(s1): 94-100.
[6] Chen H Y, Zhu Y S. A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique [J]. Multimedia Tool & Applications, 2012, 71(3): 991-1012.
[7] Liu Z, Li Q, Guan S, Peng X Y. A robust watermarking algorithm based on differential energy and QIM for uncompressed video [C]//15th international Conference, Intelligent Information Hiding and Multimedia Signal Processing, 2009: 382-385.
[8] Fallahpour M, Shirmohammadi S, Semsarzadeh M. Tampering detection in compressed digital video using watermarking [J]. IEEE Transactions on Instrumentation and Measurement, 2014, 63(5): 1057-1072.
[9] Crandall R. Some notes on steganography. steganography mailing list [Online]. http://os.inf.tu-dresden.de/westfeld/crandall.pdf.
[10] Morelos-Zaragoza R H. The art of error correcting coding [M]. [s.l.]: Wiley, 2006.
[11] Zhang W, Wang S, Zhang X. Improving embedding efficiencyof covering codes for applications in steganography [J]. IEEE Communications Letters, 2007, 11(8): 680-682.
[12] 张立和,杨成,孔祥维. 基于运动矢量统计的同步视频水印算法[J]. 光电子·激光,2007, 2: 236-240. Zhang L H, Yang C, Kong X W. Video watermarking synchronization based on motion vector statistic [J]. Journal of Optoe lectronics·Laser, 2007, 18(2): 236-240. (in Chinese)
[13] 曾骁,陈真勇,范围,陈辉,熊璋. 用于内容认证的半脆弱可逆视频水印算法[J]. 中国图象图形学 报,2010, 15(8): 1189-1195. Zeng X, Chen Z Y, Fan W, Chen H, Xiong Z. Invertible semi-fragile video watermarking algorithm used for content authentication [J]. Journal of Image and Graphic, 2010, 15(8): 1189-1195. (in Chinese)
[14] Cedillo-Hernandez A, Cedillo-Hernandez M, Garcia-Vazquez M, Nakano-Miyatake M, Perez-Meana H. Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97(7): 40-54.
[15] Lee M J, Im D H, Lee H Y, Kim K S, Lee H K. Real-time video watermarking system on the compressed domain for high definition video contents: practical issues [J]. Digital Signal Processing, 2012(22): 190-198.
[16] Preda R., Vizireanu D N. Robust wavelet-based video watermarking scheme for copyright protection using the human visual system [J]. Journal of Electronic Imaging, 2012(20): 013022-1-013022-8.
[17] Ling H, Wang L, Zou F. Robust video watermarking based on affine invariant regions in the compressed domain [J]. Signal Processing, 2011, 91(8): 1863-1875.
[18] Achanta R, Shaji A. Smith K, Lucchi A, Fua P, Süstrunk S. SLIC superpixels compared to state-of-the-art superpixel methods [J]. IEEE Pattern Analysis and Machine Intelligence 2012, 34(11): 2274-2282.
[19] Chang C C, Kieu T D, Chou Y C. A high payload steganographic scheme based on (7,4) Hamming code for digital images [C]//Internatimal Symposium on Electronic Commerce and Security, 2008: 16-21.
/
| 〈 |
|
〉 |