H.264/AVC video authentication using skipped macroblocks for an erasable watermark

This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data is embedded as fragile, blind and erasable watermark with low video quality degradations. Because of using a fragile watermark, hard authentication is possible. In contrast to other approaches, the watermarking is done after the H.264 compression process. Hence, the authentication information can be embedded in already encoded videos. To reconstruct the original H.264 compressed video the watermark can be removed. The framework is based on a new transcoder, which analyses the original H.264 bit stream, computes a watermark, embeds the watermark and generates a new H.264 bit stream. To authenticate the video a hash value is used. This value is encrypted with a private key of an asymmetric cryptosystem. The payload of the watermark consists of the encrypted hash value and a certificate with the public key. Some skipped macroblock of the H.264 video are used to embed the watermark. A special process selects these macroblocks. This process sets the distribution and the number of skipped blocks as well as the number of embedded bits per block to achieve low video quality degradations and low data rate. To embed the watermark the performance of several approaches is discussed and analyzed. The result of the framework is a new watermarked H.264 bit stream. All data necessary for authentication are embedded and cannot get lost.

[1]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[2]  Ahmed H. Tewfik,et al.  A SVD-Based Fragile Watermarking Scheme for Image Authentication , 2002, IWDW.

[3]  Gaëtan Le Guelvouit,et al.  Wide spread spectrum watermarking with side information and interference cancellation , 2003, IS&T/SPIE Electronic Imaging.

[4]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[5]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[6]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[7]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[8]  Qibin Sun,et al.  A hybrid watermarking scheme for H.264/AVC video , 2004, ICPR 2004.

[9]  F. Chung,et al.  Fragile watermarking scheme for image authentication , 2003 .

[10]  Thomas Wiegand,et al.  Draft ITU-T recommendation and final draft international standard of joint video specification , 2003 .

[11]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[12]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[13]  Qibin Sun,et al.  A hybrid watermarking scheme for H.264/AVC video , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[14]  C. V. Serdean,et al.  DWT Based Video Watermarking for Copyright , 2002 .

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.