Low complexity semi-fragile watermarking scheme for H.264/AVC authentication

This paper presents a low complexity configurable semi-fragile watermarking scheme for content-based H.264/AVC authentication, which allows content-preserving manipulations such as video transcoding techniques, while it is very sensitive to content-changing and frame manipulations. A low cost spatial analysis is exploited to maximize robustness and lessen the incurred distortion. Invariant features are extracted from intra macroblocks, and frame index timing information constituting the content-based authentication codes are embedded/extracted into Quantized DCT (QDCT) coefficients in a Group of Pictures GOP-based fashion. The embedded watermark can be detected and verified by partially decoding intra and inter macroblocks without the prior knowledge of the original video or complete video decoding. Spatial and temporal tampering can be characterized and localized by comparing the extracted and re-generated feature-based watermarks. Experimental results demonstrate that the performance of the proposed scheme is indeed superb in terms of bit-rate and perceptual quality. Moreover, various types of attacks have been simulated and characterized.

[1]  Faouzi Kossentini,et al.  H.264/AVC baseline profile decoder complexity analysis , 2003, IEEE Trans. Circuits Syst. Video Technol..

[2]  Qi Tian,et al.  A Secure and Robust Authentication Scheme for Video Transcoding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Tsong-Yi Chen,et al.  H.264 Video Authentication Based on Semi-fragile Watermarking , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[4]  Russell M. Mersereau,et al.  Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Yu Sun,et al.  Video transcoding: an overview of various techniques and research issues , 2005, IEEE Transactions on Multimedia.

[6]  A. Aydin Alatan,et al.  Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Athanassios N. Skodras,et al.  Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams , 2009, Journal of Real-Time Image Processing.

[8]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[9]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[10]  Borko Furht,et al.  Handbook of Video Databases: Design and Applications , 2003 .

[11]  Ji-Sang Yoo,et al.  The problems in digital watermarking into intra-frames of H.264/AVC , 2010, Image Vis. Comput..

[12]  John F. Roddick,et al.  An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..

[13]  Qibin Sun,et al.  A hybrid watermarking scheme for H.264/AVC video , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[14]  Azadeh Mansouri,et al.  A Low Complexity Video Watermarking in H.264 Compressed Domain , 2010, IEEE Transactions on Information Forensics and Security.

[15]  Jicheng Wang,et al.  A novel watermarking scheme for H.264/AVC video authentication , 2011, Signal Process. Image Commun..

[16]  Hsiang-Cheh Huang,et al.  Coevolutionary genetic watermarking for owner identification , 2014, Neural Computing and Applications.

[17]  Z. Jane Wang,et al.  Robust digital video watermarking scheme for H.264 advanced video coding standard , 2007, J. Electronic Imaging.

[18]  Dima Pröfrock,et al.  H.264/AVC video authentication using skipped macroblocks for an erasable watermark , 2005, Visual Communications and Image Processing.

[19]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[20]  Pingzhi Fan,et al.  A low cost fragile watermarking scheme in H.264/AVC compressed domain , 2014, Multimedia Tools and Applications.

[21]  Wen-Chung Kuo Image Hiding by Square Fully Exploiting Modification Directions , 2013, J. Inf. Hiding Multim. Signal Process..

[22]  Xing Xin,et al.  A quantization-based semi-fragile watermarking scheme for image content authentication , 2011, J. Vis. Commun. Image Represent..

[23]  E M Van Buskirk,et al.  When seeing isn't believing. , 1997, Journal of glaucoma.

[24]  Hsiang-Cheh Huang,et al.  Progressive Watermarking Techniques Using Genetic Algorithms , 2007 .

[25]  Iain E. G. Richardson,et al.  H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia , 2003 .

[26]  K. R. Rao,et al.  Video authentication for H.264/AVC using digital signature standard and secure hash algorithm , 2006, NOSSDAV '06.

[27]  Russell M. Mersereau,et al.  A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Transactions on Information Forensics and Security.