Special Issue: Information Security of Multimedia Contents

Video Watermarking Robust Against Frame Operations Based on Hamming Code Correction

Expand
  • School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018, China

Received date: 2016-07-29

  Revised date: 2016-08-16

  Online published: 2016-09-30

Abstract

A frame alignment algorithm is proposed using the (7,4) Hamming code correction to resist these attacking operations. In this algorithm, the watermark is extracted by identifying watermarked frames. The simple linear iterative clustering (SLIC) superpixels method is used to extract the frames' natural characteristics X, which is a 7-bit binary sequence representing the clustering centers obtained using SLIC via preprocessing and quantization. The approach takes advantage of (7,4) Hamming code correction that can hide three bits of the target code S by modifying only one bit. The watermark is then embedded into the video containing alignment marks with DCT-SVD decomposition. Experimental results show that the proposed approach can resist attacks such as frame dropping, frame insertion and recoding. It is also robust against common signal processing operations.

Cite this article

REN Shao-ying, YUAN Shi-jie, GAO Peng, LU Jian-feng, ZHANG Shan-qing, LI Li . Video Watermarking Robust Against Frame Operations Based on Hamming Code Correction[J]. Journal of Applied Sciences, 2016 , 34(5) : 585 -597 . DOI: 10.3969/j.issn.0255-8297.2016.05.011

References

[1] Hernandez A C, Hernandez M C, Vazquez M G. Transcoding resilient video watermarking schemebased on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97: 40-54.
[2] Xu D W, Wang R D, Wang J C. A novel watermarking scheme for H.264/AVC video authentication[J]. Signal Processing: Image Communication, 2011, 26: 267-279.
[3] Tian L H, Zheng N N, Xue J R. Authentication and copyright protection watermarkingscheme for H.264 based on visual saliency and secret sharing [J]. Multimed Tools Appl, 2015, 74: 2991-3011.
[4] Wei H R, Kou Z Y. Research and application of digital watermarkfor video copyright protection[J]. International Conference on Computational Intelligence and Security, 2009, 246-250.
[5] Li Q, Wang R D, Xu D W. Fragile video watermarking algorithm based on H.264/AVC [J]. Materials Research Innovations, 2013, 17(s1): 94-100.
[6] Chen H Y, Zhu Y S. A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique [J]. Multimedia Tool & Applications, 2012, 71(3): 991-1012.
[7] Liu Z, Li Q, Guan S, Peng X Y. A robust watermarking algorithm based on differential energy and QIM for uncompressed video [C]//15th international Conference, Intelligent Information Hiding and Multimedia Signal Processing, 2009: 382-385.
[8] Fallahpour M, Shirmohammadi S, Semsarzadeh M. Tampering detection in compressed digital video using watermarking [J]. IEEE Transactions on Instrumentation and Measurement, 2014, 63(5): 1057-1072.
[9] Crandall R. Some notes on steganography. steganography mailing list [Online]. http://os.inf.tu-dresden.de/westfeld/crandall.pdf.
[10] Morelos-Zaragoza R H. The art of error correcting coding [M]. [s.l.]: Wiley, 2006.
[11] Zhang W, Wang S, Zhang X. Improving embedding efficiencyof covering codes for applications in steganography [J]. IEEE Communications Letters, 2007, 11(8): 680-682.
[12] 张立和,杨成,孔祥维. 基于运动矢量统计的同步视频水印算法[J]. 光电子·激光,2007, 2: 236-240. Zhang L H, Yang C, Kong X W. Video watermarking synchronization based on motion vector statistic [J]. Journal of Optoe lectronics·Laser, 2007, 18(2): 236-240. (in Chinese)
[13] 曾骁,陈真勇,范围,陈辉,熊璋. 用于内容认证的半脆弱可逆视频水印算法[J]. 中国图象图形学 报,2010, 15(8): 1189-1195. Zeng X, Chen Z Y, Fan W, Chen H, Xiong Z. Invertible semi-fragile video watermarking algorithm used for content authentication [J]. Journal of Image and Graphic, 2010, 15(8): 1189-1195. (in Chinese)
[14] Cedillo-Hernandez A, Cedillo-Hernandez M, Garcia-Vazquez M, Nakano-Miyatake M, Perez-Meana H. Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT [J]. Signal Processing, 2014, 97(7): 40-54.
[15] Lee M J, Im D H, Lee H Y, Kim K S, Lee H K. Real-time video watermarking system on the compressed domain for high definition video contents: practical issues [J]. Digital Signal Processing, 2012(22): 190-198.
[16] Preda R., Vizireanu D N. Robust wavelet-based video watermarking scheme for copyright protection using the human visual system [J]. Journal of Electronic Imaging, 2012(20): 013022-1-013022-8.
[17] Ling H, Wang L, Zou F. Robust video watermarking based on affine invariant regions in the compressed domain [J]. Signal Processing, 2011, 91(8): 1863-1875.
[18] Achanta R, Shaji A. Smith K, Lucchi A, Fua P, Süstrunk S. SLIC superpixels compared to state-of-the-art superpixel methods [J]. IEEE Pattern Analysis and Machine Intelligence 2012, 34(11): 2274-2282.
[19] Chang C C, Kieu T D, Chou Y C. A high payload steganographic scheme based on (7,4) Hamming code for digital images [C]//Internatimal Symposium on Electronic Commerce and Security, 2008: 16-21.

Outlines

/