Chaotic Watermarking for Video Authentication in Surveillance Applications

Installing video cameras in public facilities for surveillance becomes more and more popular. This paper proposes a novel authentication scheme based on chaotic semi-fragile watermarking. The timing information of video frames is modulated into the parameters of a chaotic system. The system output, which is a noise-like signal, is used as a watermark and embedded into the block-based discrete cosine transform domain. The embedded information is demodulated by a maximum likelihood estimator. Temporal tampering can be detected by the mismatch between the extracted and the observed timing information. In addition, the deviation of the extracted watermark from the original one allows us to locate spatial tampering. It is shown that the proposed scheme can satisfy the peculiar requirements of authenticating a digital video surveillance system.

[1]  J. Yorke,et al.  Chaos: An Introduction to Dynamical Systems , 1997 .

[2]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[3]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[4]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[5]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[6]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[7]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[8]  Anastasios Tefas,et al.  Image authentication using chaotic mixing systems , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[9]  Anastasios Tefas,et al.  Image authentication techniques for surveillance applications , 2001, Proc. IEEE.

[10]  Hong Heather Yu,et al.  A semi-fragile watermarking system for MPEG video authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Chaotic parameter modulation with application to digital watermarking , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[12]  Chai Wah Wu,et al.  On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..

[13]  Antonio Albiol,et al.  Robust motion detector for video surveillance applications , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[14]  Qi Tian,et al.  A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[15]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.