A low cost fragile watermarking scheme in H.264/AVC compressed domain

H.264/AVC-based products have grown tremendously in social networks; issues of content-based authentication become increasingly important. This paper presents a blind fragile watermarking scheme for content-based H.264/AVC authentication, which enjoys high sensitivity to typical video attacks. A spatiotemporal analysis is exploited to guarantee a minimum impact on perceptual quality and bit-rate increment. The watermark features are extracted from intra/inter prediction modes of intra/inter macroblocks, constituting the content-based Message Authentication Code (MAC) which is embedded/extracted in a Group-of-Pictures GOP-based fashion utilizing the syntactic elements of the Network Application Layer (NAL) units from the compressed bitstream. It’s unnecessary to fully decode a compressed bitstream before the embedding or detection processes. A content-based key is generated to control fragile watermark generation, embedding, extraction, and verification algorithms. Additionally, fragility is ensured by selecting the last nonzero quantized ac residuals for watermark embedding. The embedded watermark can be detected and verified by means of partially decoding intra/inter prediction modes from syntactic elements of the bitstream without the prior knowledge of the original video or complete decoding. Experiment results demonstrate that the performance of the proposed scheme is excellent in terms of bit-rate and perceptual quality. Furthermore, various types of content-preserving and/or content-changing attacks can be detected efficiently.

[1]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[2]  Wen Gao,et al.  A novel coefficient scanning scheme for directional spatial prediction-based image compression , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[3]  Tae-Hyun Kim,et al.  Video watermarking technique for H.264/AVC , 2012 .

[4]  Junjie Li,et al.  An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream , 2011 .

[5]  Z. Jane Wang,et al.  Robust digital video watermarking scheme for H.264 advanced video coding standard , 2007, J. Electronic Imaging.

[6]  Athanassios N. Skodras,et al.  Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams , 2009, Journal of Real-Time Image Processing.

[7]  Russell M. Mersereau,et al.  Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase , 2008, IEEE Transactions on Information Forensics and Security.

[8]  Yuting Su,et al.  Information Hiding Based on Intra Prediction Modes for H.264/AVC , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[9]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[10]  A. Aydin Alatan,et al.  Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Rangding Wang,et al.  Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping , 2011 .

[12]  Mauro Barni,et al.  Robust frame-based watermarking for digital video , 2001, 12th International Workshop on Database and Expert Systems Applications.

[13]  Yi Pan,et al.  A blind watermarking method using maximum wavelet coefficient quantization , 2009, Expert Syst. Appl..

[14]  Ahmed Bouridane,et al.  Combined fragile watermark and digital signature for H.264/AVC video authentication , 2009, 2009 17th European Signal Processing Conference.

[15]  Iain E.G,et al.  H.264 and MPEG 4 video , 2009 .

[16]  Jicheng Wang,et al.  A novel watermarking scheme for H.264/AVC video authentication , 2011, Signal Process. Image Commun..

[17]  Sung-Min Kim,et al.  Data Hiding on H.264/AVC Compressed Video , 2007, ICIAR.

[18]  Chuen-Ching Wang,et al.  Fragile watermarking scheme for H.264 video authentication , 2010 .

[19]  Edward J. Delp,et al.  Video and image watermark synchronization , 2005 .

[20]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[22]  Iain E. G. Richardson,et al.  H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia , 2003 .

[23]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[24]  Qibin Sun,et al.  A hybrid watermarking scheme for H.264/AVC video , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[25]  E M Van Buskirk,et al.  When seeing isn't believing. , 1997, Journal of glaucoma.

[26]  Shih-Chia Huang,et al.  Optimization of Hybridized Error Concealment for H.264 , 2008, IEEE Transactions on Broadcasting.

[27]  Yu Sun,et al.  Video transcoding: an overview of various techniques and research issues , 2005, IEEE Transactions on Multimedia.

[28]  Dima Pröfrock,et al.  H.264/AVC video authentication using skipped macroblocks for an erasable watermark , 2005, Visual Communications and Image Processing.

[29]  Takao Terano,et al.  Image copyright protection with forward error correction , 2009, Expert Syst. Appl..

[30]  Oscal T.-C. Chen,et al.  Data hiding in inter and intra prediction modes of H.264/AVC , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[31]  Borko Furht,et al.  Handbook of Video Databases: Design and Applications , 2003 .

[32]  Azadeh Mansouri,et al.  A Low Complexity Video Watermarking in H.264 Compressed Domain , 2010, IEEE Transactions on Information Forensics and Security.

[33]  Faouzi Kossentini,et al.  H.264/AVC baseline profile decoder complexity analysis , 2003, IEEE Trans. Circuits Syst. Video Technol..

[34]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[35]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[36]  Russell M. Mersereau,et al.  A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Transactions on Information Forensics and Security.