510 research outputs found

    An Improved Watermarking Algorithm Robust to Temporal Desynchronization Attacks

    Get PDF
    The watermarking scheme based on finite state machine can achieve temporal desynchronization without additional synchronization signals or exhaustive search. However, the resistance to the frame dropping attack and the decimation attack is highly dependent on the repetition redundancy unit. When the video is truncated, permuted and reassembled, the extracted watermark has a low bit correct rate (BCR). In this work, we analyze and improve the correlation-based extracting method for spread-spectrum watermarking and propose a non-synchronization extracting strategy based on statistical inference. The proposed method is resistant to most of the temporal synchronization attacks

    End-to-end security for video distribution

    Get PDF

    A Review of Audio Features and Statistical Models Exploited for Voice Pattern Design

    Full text link
    Audio fingerprinting, also named as audio hashing, has been well-known as a powerful technique to perform audio identification and synchronization. It basically involves two major steps: fingerprint (voice pattern) design and matching search. While the first step concerns the derivation of a robust and compact audio signature, the second step usually requires knowledge about database and quick-search algorithms. Though this technique offers a wide range of real-world applications, to the best of the authors' knowledge, a comprehensive survey of existing algorithms appeared more than eight years ago. Thus, in this paper, we present a more up-to-date review and, for emphasizing on the audio signal processing aspect, we focus our state-of-the-art survey on the fingerprint design step for which various audio features and their tractable statistical models are discussed.Comment: http://www.iaria.org/conferences2015/PATTERNS15.html ; Seventh International Conferences on Pervasive Patterns and Applications (PATTERNS 2015), Mar 2015, Nice, Franc

    Digital Video Watermarking Robust Against Camcorder Recording Based on DWT-SVD

    Get PDF
    In order to reduce the block effects in the dark regions and improve the flicker in the bright regions of the existing video watermark algorithms, we propose an improved video watermarking algorithm against camcorder recording based on DWT-SVD. In proposed algorithm, 3th level Discrete Wavelet Transform (DWT) is applied to Y luminance of every single frame, and Singular Value Decomposition (SVD) is used on sub-band of DWT. Watermark sequence is embedded by fine-tuning the singular value of consecutive frames. Experimental results show that the proposed algorithm is robust against many different attacks such as geometric attack, signal processing and camcorder recording. Moreover, the proposed scheme can reduce the blocks effect and improve the flicker by embedding watermark into edge feature of video frame. Although, the method can provide high video quality than the existing schemes, however, it is not robust to strong compression such as MPEG

    A New Video authentication Template Based on Bubble random Sampling

    Get PDF
    The rapid growth of digital video distribution has highlighted new important issues in digital rights management, as well as in other important applications such as video authentication. Digital watermarking offers a promising solution against piracy and it is therefore a very active area of research. However, robustness to video manipulations, either malicious or not, is a demanding task because there are many different types of possible attacks that can be envisioned. Among these, geometric and temporal distortions play the major roles. The countermeasures against these specific attacks are still an open challenge. In this paper we propose the use of a video authentication template based on bubble random sampling. The authentication template is introduced in order to ensure temporal synchronization and to prevent content tampering. The simulation results are encouraging and this approach is therefore worth further development efforts

    An Improved Histogram Based Boosting Detection Rate Video Watermarking Algorithm

    Get PDF
    The existing histogram based video watermarking algorithm with temporal modulated is robust to combined attacks, but the watermark detection rate is not high due to watermark cannot embedded to the smoothness and still areas effectively. To increase the watermark detection rate, in this paper, we proposed the improved algorithm of shot segmentation first and then propose an improved video watermarking algorithm which firstly construct the watermark template in each frame video in the same shot through computing block based histogram and selecting the position of the relative high variance. Then we embed the watermark template into the video frame by temporal modulation without changing the destination of the shot group of the consecutive frames. The watermark sequence is extracted by comparing the correlation distribution of video frame and corresponding watermark template in the time domain. Experimental results demonstrate that the proposed algorithm is robust to recording attacks and guarantee the watermarking video quality at the same time, besides the watermark sequences can embedded to the smoothness and still areas effectively, and the watermark detection rate can increase by about 10% than previous methods

    Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style

    Get PDF
    The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes
    • …
    corecore