31 research outputs found

    Spread spectrum-based video watermarking algorithms for copyright protection

    Get PDF
    Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen

    Survey of watermarking techniques

    Get PDF

    High capacity data embedding schemes for digital media

    Get PDF
    High capacity image data hiding methods and robust high capacity digital audio watermarking algorithms are studied in this thesis. The main results of this work are the development of novel algorithms with state-of-the-art performance, high capacity and transparency for image data hiding and robustness, high capacity and low distortion for audio watermarking.En esta tesis se estudian y proponen diversos métodos de data hiding de imágenes y watermarking de audio de alta capacidad. Los principales resultados de este trabajo consisten en la publicación de varios algoritmos novedosos con rendimiento a la altura de los mejores métodos del estado del arte, alta capacidad y transparencia, en el caso de data hiding de imágenes, y robustez, alta capacidad y baja distorsión para el watermarking de audio.En aquesta tesi s'estudien i es proposen diversos mètodes de data hiding d'imatges i watermarking d'àudio d'alta capacitat. Els resultats principals d'aquest treball consisteixen en la publicació de diversos algorismes nous amb rendiment a l'alçada dels millors mètodes de l'estat de l'art, alta capacitat i transparència, en el cas de data hiding d'imatges, i robustesa, alta capacitat i baixa distorsió per al watermarking d'àudio.Societat de la informació i el coneixemen

    Digital video watermarking techniques for secure multimedia creation and delivery.

    Get PDF
    Chan Pik-Wah.Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.Includes bibliographical references (leaves 111-130).Abstracts in English and Chinese.Abstract --- p.iAcknowledgement --- p.ivChapter 1 --- Introduction --- p.1Chapter 1.1 --- Background --- p.1Chapter 1.2 --- Research Objective --- p.3Chapter 1.3 --- Contributions --- p.4Chapter 1.4 --- The Structure of this Thesis --- p.6Chapter 2 --- Literature Review --- p.7Chapter 2.1 --- Security in Multimedia Communications --- p.8Chapter 2.2 --- Cryptography --- p.11Chapter 2.3 --- Digital Watermarking --- p.14Chapter 2.4 --- Essential Ingredients for Video Watermarking --- p.16Chapter 2.4.1 --- Fidelity --- p.16Chapter 2.4.2 --- Robustness --- p.17Chapter 2.4.3 --- Use of Keys --- p.19Chapter 2.4.4 --- Blind Detection --- p.20Chapter 2.4.5 --- Capacity and Speed --- p.20Chapter 2.4.6 --- Statistical Imperceptibility --- p.21Chapter 2.4.7 --- Low Error Probability --- p.21Chapter 2.4.8 --- Real-time Detector Complexity --- p.21Chapter 2.5 --- Review on Video Watermarking Techniques --- p.22Chapter 2.5.1 --- Video Watermarking --- p.25Chapter 2.5.2 --- Spatial Domain Watermarks --- p.26Chapter 2.5.3 --- Frequency Domain Watermarks --- p.30Chapter 2.5.4 --- Watermarks Based on MPEG Coding Struc- tures --- p.35Chapter 2.6 --- Comparison between Different Watermarking Schemes --- p.38Chapter 3 --- Novel Watermarking Schemes --- p.42Chapter 3.1 --- A Scene-based Video Watermarking Scheme --- p.42Chapter 3.1.1 --- Watermark Preprocess --- p.44Chapter 3.1.2 --- Video Preprocess --- p.46Chapter 3.1.3 --- Watermark Embedding --- p.48Chapter 3.1.4 --- Watermark Detection --- p.50Chapter 3.2 --- Theoretical Analysis --- p.52Chapter 3.2.1 --- Performance --- p.52Chapter 3.2.2 --- Capacity --- p.56Chapter 3.3 --- A Hybrid Watermarking Scheme --- p.60Chapter 3.3.1 --- Visual-audio Hybrid Watermarking --- p.61Chapter 3.3.2 --- Hybrid Approach with Different Water- marking Schemes --- p.69Chapter 3.4 --- A Genetic Algorithm-based Video Watermarking Scheme --- p.73Chapter 3.4.1 --- Watermarking Scheme --- p.75Chapter 3.4.2 --- Problem Modelling --- p.76Chapter 3.4.3 --- Chromosome Encoding --- p.79Chapter 3.4.4 --- Genetic Operators --- p.80Chapter 4 --- Experimental Results --- p.85Chapter 4.1 --- Test on Robustness --- p.85Chapter 4.1.1 --- Experiment with Frame Dropping --- p.87Chapter 4.1.2 --- Experiment with Frame Averaging and Sta- tistical Analysis --- p.89Chapter 4.1.3 --- Experiment with Lossy Compression --- p.90Chapter 4.1.4 --- Test of Robustness with StirMark 4.0 --- p.92Chapter 4.1.5 --- Overall Comparison --- p.98Chapter 4.2 --- Test on Fidelity --- p.100Chapter 4.2.1 --- Parameter(s) Setting --- p.101Chapter 4.2.2 --- Evaluate with PSNR --- p.101Chapter 4.2.3 --- Evaluate with MAD --- p.102Chapter 4.3 --- Other Features of the Scheme --- p.105Chapter 4.4 --- Conclusion --- p.106Chapter 5 --- Conclusion --- p.108Bibliography --- p.11

    A NOVEL JOINT PERCEPTUAL ENCRYPTION AND WATERMARKING SCHEME (JPEW) WITHIN JPEG FRAMEWORK

    Get PDF
    Due to the rapid growth in internet and multimedia technologies, many new commercial applications like video on demand (VOD), pay-per-view and real-time multimedia broadcast etc, have emerged. To ensure the integrity and confidentiality of the multimedia content, the content is usually watermarked and then encrypted or vice versa. If the multimedia content needs to be watermarked and encrypted at the same time, the watermarking function needs to be performed first followed by encryption function. Hence, if the watermark needs to be extracted then the multimedia data needs to be decrypted first followed by extraction of the watermark. This results in large computational overhead. The solution provided in the literature for this problem is by using what is called partial encryption, in which media data are partitioned into two parts - one to be watermarked and the other is encrypted. In addition, some multimedia applications i.e. video on demand (VOD), Pay-TV, pay-per-view etc, allow multimedia content preview which involves „perceptual‟ encryption wherein all or some selected part of the content is, perceptually speaking, distorted with an encryption key. Up till now no joint perceptual encryption and watermarking scheme has been proposed in the literature. In this thesis, a novel Joint Perceptual Encryption and Watermarking (JPEW) scheme is proposed that is integrated within JPEG standard. The design of JPEW involves the design and development of both perceptual encryption and watermarking schemes that are integrated in JPEG and feasible within the „partial‟ encryption framework. The perceptual encryption scheme exploits the energy distribution of AC components and DC components bitplanes of continuous-tone images and is carried out by selectively encrypting these AC coefficients and DC components bitplanes. The encryption itself is based on a chaos-based permutation reported in an earlier work. Similarly, in contrast to the traditional watermarking schemes, the proposed watermarking scheme makes use of DC component of the image and it is carried out by selectively substituting certain bitplanes of DC components with watermark bits. vi ii Apart from the aforesaid JPEW, additional perceptual encryption scheme, integrated in JPEG, has also been proposed. The scheme is outside of joint framework and implements perceptual encryption on region of interest (ROI) by scrambling the DCT blocks of the chosen ROI. The performances of both, perceptual encryption and watermarking schemes are evaluated and compared with Quantization Index modulation (QIM) based watermarking scheme and reversible Histogram Spreading (RHS) based perceptual encryption scheme. The results show that the proposed watermarking scheme is imperceptible and robust, and suitable for authentication. Similarly, the proposed perceptual encryption scheme outperforms the RHS based scheme in terms of number of operations required to achieve a given level of perceptual encryption and provides control over the amount of perceptual encryption. The overall security of the JPEW has also been evaluated. Additionally, the performance of proposed separate perceptual encryption scheme has been thoroughly evaluated in terms of security and compression efficiency. The scheme is found to be simpler in implementation, have insignificant effect on compression ratios and provide more options for the selection of control factor

    Watermarking digital image and video data. A state-of-the-art overview

    Full text link
    corecore