A novel watermarking scheme for H.264/AVC video authentication

As the H.264/AVC-based video products become more and more popular, issues of copyright protection and authentication that are appropriate for this standard will be very important. In this paper, a content-based authentication watermarking scheme for H.264/AVC video is proposed. Considering the new feature of H.264/AVC, the content-based authentication code for spatial tampering is firstly generated using the reliable features extracted from video frame blocks. The authentication code, which can detect malicious manipulations but allow recompression, is embedded into the DCT coefficients in diagonal positions using a novel modulation method. Spatial tampering can be located by comparing the extracted and the original feature-based watermarks. In addition, combining ECC and interleaving coding, the frame index of each video frame is used as watermark information and embedded in the residual coefficients. Temporal tampering can be detected by the mismatch between the extracted and the observed frame index. Experimental results show that the proposed scheme can discriminate the malicious tampering from the mild signal processing. The tampered location can also be approximately determined according to the glide window and the predefined threshold.

[1]  Bijan G. Mobasseri,et al.  Authentication of H.264 streams by direct watermarking of CAVLC blocks , 2007, Electronic Imaging.

[2]  Wang,et al.  Study on ontology-based semantic retrieval model , 2009 .

[3]  Russell M. Mersereau,et al.  Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase , 2008, IEEE Transactions on Information Forensics and Security.

[4]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[5]  Yuan-Gen Wang,et al.  Robust dual watermarking algorithm for AVS video , 2009, Signal Process. Image Commun..

[6]  Yulin Wang,et al.  Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain , 2006, IEEE Transactions on Image Processing.

[7]  Henry Leung,et al.  Chaotic Watermarking for Video Authentication in Surveillance Applications , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Qibin Sun,et al.  A hybrid watermarking scheme for H.264/AVC video , 2004, ICPR 2004.

[9]  Jeffrey A. Bloom,et al.  H.264/AVC stream replacement technique for video watermarking , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[10]  Tien-Ying Kuo,et al.  Fragile Video Watermarking Technique by Motion Field Embedding with Rate-Distortion Minimization , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[11]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[12]  Jing Zhang,et al.  Robust Video Watermarking of H.264/AVC , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.

[13]  Sunil R. Das,et al.  An adaptive compressed MPEG-2 video watermarking scheme , 2005, IEEE Transactions on Instrumentation and Measurement.

[14]  T. Wiegand,et al.  Text Description of Joint Model Reference Encoding Methods and Decoding Concealment Methods , 2004 .

[15]  Hong Heather Yu,et al.  Classification of video tampering methods and countermeasures using digital watermarking , 2001, SPIE ITCom.

[16]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[17]  Qi Tian,et al.  A Secure and Robust Authentication Scheme for Video Transcoding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Anthony T. S. Ho,et al.  An efficient authentication method for H.264/AVC , 2005 .

[20]  Russell M. Mersereau,et al.  A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Trans. Inf. Forensics Secur..

[21]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[22]  Mohan S. Kankanhalli,et al.  A scalable signature scheme for video authentication , 2006, Multimedia Tools and Applications.

[23]  Xiao Zeng,et al.  A Novel Reversible Semi-Fragile Watermarking Algorithm of MPEG-4 Video for Content Authentication , 2008, 2008 Second International Symposium on Intelligent Information Technology Application.

[24]  Tiago Rosa Maria Paula Queluz Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.

[25]  Yuewei Dai,et al.  Feature-based watermarking scheme for MPEG-I/II video authentication , 2004, IS&T/SPIE Electronic Imaging.

[26]  Dima Pröfrock,et al.  H.264/AVC video authentication using skipped macroblocks for an erasable watermark , 2005, Visual Communications and Image Processing.

[27]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[28]  Ji-Sang Yoo,et al.  The problems in digital watermarking into intra-frames of H.264/AVC , 2010, Image Vis. Comput..

[29]  Athanassios N. Skodras,et al.  Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams , 2009, Journal of Real-Time Image Processing.

[30]  Chun-Chieh Chen,et al.  Towards Effective Content Authentication for Digital Videos by Employing Feature Extraction and Quantization , 2009, IEEE Transactions on Circuits and Systems for Video Technology.