2.5-Domain Tri-Watermarking Algorithm for DCT-Based Video Protection

A 2.5-domain tri-watermarking algorithm (2.5D-TW) is presented in this paper. The proposed algorithm is the integration of dual domain bi-watermarking algorithm and visual cryptography, and the embedded tri-watermark is composed of three binary watermarks. The tri-watermark is embedded into the encoded blocks in discrete cosine transform (DCT) domain, however, the tri-watermark can be extracted from the DCT blocks and the decoded frames in spatial domain. Moreover, two types of third binary watermark of the tri-watermark are developed namely the intra-watermark and inter-watermark, those binary watermarks reveal the different robustness against various attacks. The proposed method attempts to localize the tampered areas and to detect the temporal attack.

[1]  Anastasios Tefas,et al.  Image authentication techniques for surveillance applications , 2001, Proc. IEEE.

[2]  Jianmin Jiang,et al.  The spatial relationship of DCT coefficients between a block and its sub-blocks , 2002, IEEE Trans. Signal Process..

[3]  Bijan G. Mobasseri,et al.  Content authentication and tamper detection in digital video , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[4]  Hong Heather Yu,et al.  A semi-fragile watermarking system for MPEG video authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[5]  Soo-Chang Pei,et al.  Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm , 2006, ASIACCS '06.

[6]  Cedric Nishan Canagarajah,et al.  Spatial digital watermark for MPEG-2 video authentication and tamper detection , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[7]  Ja-Ling Wu,et al.  DCT-based watermarking for video , 1998 .

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  Soo-Chang Pei,et al.  DCT-Based Image Protection using Dual-Domain Bi-Watermarking Algorithm , 2006, 2006 International Conference on Image Processing.

[10]  D. E. Pearson,et al.  Frequency mode LR attack operator for digitally watermarked images , 1998 .

[11]  Henry Leung,et al.  A chaotic authentication technique for digital video surveillance , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..