Recoverable Video Watermark in DCT Domain

Few of current video watermarking algorithms can prevent HD videos from unauthorized copying after the production is distributed. This paper proposes a recoverable video watermarking algorithm in DCT domain to achieve this goal. Watermark is first split and modulated by CDMA. Then, after applying boundary detection, frames in one shot are divided into blocks. Finally, watermark is embedded into DCT coefficients of these blocks. The embedded watermark could resist to conventional video processing such as loss compression, resolution change, and format change, etc. The security of embedded watermark is based on the key used in CDMA modulation. With correct user keys, authorized user can completely remove the watermark and restored the high quality video. The experimental results show that the proposed algorithm is robust and practical.

[1]  Weiping Wang,et al.  New Public-Key Cryptosystem Based on Two-Dimension DLP , 2012, J. Comput..

[2]  Jeffrey J. Rodríguez,et al.  Prediction-error based reversible watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[3]  Qingshuang Zeng,et al.  A Robust Watermarking Against Shearing Based On Improved S-Radon Transformation , 2012, J. Comput..

[4]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[5]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[6]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[7]  Christophe De Vleeschouwer,et al.  Circular interpretation of histogram for reversible watermarking , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[8]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[9]  Iuon-Chang Lin,et al.  Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[10]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[11]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[12]  Chen-Hong Yuan,et al.  A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique , 2012, Journal of Zhejiang University SCIENCE C.

[13]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[14]  Boon-Lock Yeo,et al.  Video browsing using clustering and scene transitions on compressed sequences , 1995, Electronic Imaging.

[15]  Xinmin Zhou,et al.  Attack Model and Performance Evaluation of Text Digital Watermarking , 2010, J. Comput..

[16]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[17]  A. Murat Tekalp,et al.  Localized lossless authentication watermark (LAW) , 2003, IS&T/SPIE Electronic Imaging.

[18]  Lei Yang,et al.  A Robust Paper Public-key Watermarking Based on Contourlet Algorithm Transform and its Application , 2011, J. Softw..

[19]  Lei Yang,et al.  A Robust Public-key Watermarking Algorithm Based on Contourlet Transform and its Application , 2011 .

[20]  J. Tian High capacity reversible data embedding and content authentication , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[21]  Hui Liu,et al.  A Geometric Distortion Resilient Image Watermark Algorithm Based on DWT-DFT , 2011, J. Softw..