3 research outputs found

    Video Watermarking Based on Interactive Detection of Feature Regions

    Get PDF
    International audienceVideo watermarking is very important in many areas of activity and especially in multimedia applications. Therefore, security of video stream has recently become a major concern and has attracted more and more attention in both the research and industrial domains. In this perspective, several video watermarking approaches are proposed but, based on our knowledge, there is no method which verified the compromise between invisibility and robustness against all usual attacks. In our previous work, we proposed a new video watermarking approach based on feature region generated from mosaic frame and multi-frequential embedding. This approach allowed obtaining a good invisibility and robustness against the maximum of usual attacks. In our future work, we propose to optimize the choice of the region of interest by using crowdsourcing technique. This last one is an emerging field of knowledge management that involves analyzing the behavior of users when the

    A robust video watermarking based on feature regions and crowdsourcing

    No full text
    International audienceVideo watermarking technique aims at resolving insecurity problems. Recently, many approaches have been proposed in order to satisfy the new constraints of video applications such as robustness to collusion attacks, high level of security and signature invisibility. In this paper, a new video watermarking approach based on feature regions is proposed. The originality of this approach is to use crowdsourcing technique in order to detect feature regions. First, video summary is generated. This summary is then used to detect the first type of feature regions based on crowdsourcing technique. On the other hand, mosaic is generated from original video to detect the second type of feature region browsed by the moving objects. Finally, the signature is embedded into the mosaic generated after merging these two types of feature regions using multi-frequential watermarking scheme. Experimental results have shown a high level of invisibility thanks to the efficient choice of the embedded target. Moreover, the proposed approach is robust against several attacks especially to collusion attacks

    Nouvelle méthode d’évaluation de robustesse des algorithmes de tatouage vidéo : jeu d’attaque

    No full text
    International audienceWatermarking techniques evaluation presents a critical and very important step. In fact, with the progressive evolution of video processing and communication, many watermarking approaches are proposed and their efficiency varies from an approach to another one. This efficiency is generally evaluated based on several constraints where the most important are invisibility and robustness in front of attacks. This last one is often estimated by testing classical and simple attacks such as rotation, translation and noise add. Nevertheless, a simple watermarking technique can easily resist to this type of attacks. So, it is necessary to study the impact of other attacks which are always applied in reality such as camcording attack. The integration of these important attacks will allowed a more efficient comparison between the various proposed techniques. In this paper, a new attacking game is proposed. In this game, different marked videos will be at the disposal of a set of users who can interact to destroy the inserted mark. Indeed, a list of different attacks will be given to users who can apply a combination of several of them to the marked videos. This list will contain the most important and dangerous attacks such as camcording, color add compression. This game allowed us to evaluate our video watermarking technique. In more, based on users’ choices, we can identify the most important attacks for them.L’évaluation d’une technique de tatouage a été toujours une étape critique et importante. En effet, l’évolution progressive des outils de traitement et de communication de vidéos a fait naître de nombreuses et différentes techniques de tatouage dont l’efficacité varie d’un algorithme à un autre. Cette efficacité est toujours évaluée en se basant sur plusieurs contraintes dont les plus importantes sont l’invisibilité et la robustesse face aux attaques. Cette dernière est souvent évaluée en testant des attaques classiques et simples telles que la compression, la rotation, la translation et l’ajout de bruit. Des techniques simples de tatouage peuvent résister à des attaques simples sans pour autant être robustes aux attaques observées dans le monde réel comme le "Camcording" d’un contenu vidéo. En situation réelle, un utilisateur mal intentionné (ou un pirate) va filmer illégalement un contenu projeté, recadrer l’image, transcoder le contenu obtenu. La question que nous nous posons est l’évaluation de méthodes de tatouage dans ce type de contexte. Dans le cadre de l’élaboration d’un nouveau protocole d’évaluation de techniques de tatouage vidéo, nous proposons, dans ce papier, un jeu d’attaques de vidéos tatouées mis à disposition d’un ensemble d’utilisateurs qui vont interagir afin de détruire la marque qui a été insérée. Ceci sera réalisé en leur fournissant une liste d’attaques qu’ils peuvent librement appliquer et combiner à ces vidéos tatouées. Cette liste va comprendre les attaques les plus importantes et réelles que peut subir une vidéo telles que le camcording, la déformation, l’ajout de couleur et la compression. Ce jeu nous a permis non seulement d’évaluer n’importe quel algorithme de tatouage vidéo, mais surtout, d’identifier, à partir de l’étude de choix des utilisateurs les attaques les plus importantes pour eux
    corecore