A Survey on Different Video Watermarking Techniques and
Download
Report
Transcript A Survey on Different Video Watermarking Techniques and
A Survey on Different Video
Watermarking Techniques and
Comparative Analysis with
Reference to H.264/AVC
Sourav Bhattacharya ; T. Chattopadhyay ; Arpan Pal
2006 IEEE Tenth International Symposium on
Consumer Electronics
Outline
Introduction
Video Watermarking
Survey on Video Watermarking
Comparative Analysis of Different Video
Watermarking Techniques
Watermarking Techniques Applicable to
H.264/AVC
Outline
Introduction
Video Watermarking
Survey on Video Watermarking
Comparative Analysis of Different Video
Watermarking Techniques
Watermarking Techniques Applicable to
H.264/AVC
Introduction
Digital Rights Management
Many watermarking schemes have been
proposed to hide copyright marks
The main purpose of digital watermarking is
to embed information imperceptibly and
robustly in the host data
Introduction
Internet multimedia, wireless video, personal
video recorders, video-on-demand, set-top
box, videophone and videoconferencing
Demand higher compression and video
quality
H.264 / Advanced Video Codec (AVC)
better image quality in terms of peak-signalto-noise-ratio (PSNR)
Outline
Introduction
Video Watermarking
Survey on Video Watermarking
Comparative Analysis of Different Video
Watermarking Techniques
Watermarking Techniques Applicable to
H.264/AVC
Video Watermarking
Digital watermarking
Video watermarking terminologies
Video watermarking techniques
Digital watermarking
Watermark can be a serial number or random
number sequence, ownership identifiers,
copyright messages, control signal, transaction
dates
No or little perceptible differences between the
original media and the watermarked media
Digital watermarking
Domain :
a. spatial
b. frequency
Document
ex. text, image, audio, video
Perception
Application :
a. source based
b. destination based
Digital watermarking
The embedding or encoding process can be
viewed as a function
X ' E( X ,W , [ K ])
X : origin media
W : watermark
K : key
X’ : watermarked media
[•] : optional argument
Digital watermarking
The decoding process
W ' D( X ", [ X ],[ K ])
The detection process
{Yes or No} d ( X ", [ X ],W , [ K ])
Video watermarking terminologies
Digital Video
Payload
the amount information stored in a watermark
Perceptibility
Robustness
watermark always remain in video data
Security
algorithm can be public
choice a key from a large key space
Video watermarking techniques
Any image watermarking techniques can be
extend to watermark video
Meet some challenges in reality video :
redundant data
motion and motionless region
real-time requirement
susceptible to pirate attacks
Working Domain
Pixel domain
simple , low time complexity
but lack in robustness and imperceptibility
Transform domain
ex. DCT, DWT
detection is performed
apply properties of HVS
Outline
Introduction
Video Watermarking
Survey on Video Watermarking
Comparative Analysis of Different Video
Watermarking Techniques
Watermarking Techniques Applicable to
H.264/AVC
Survey on Video Watermarking
Watermark can be
a. directly inserted in the raw video data
b. integrated during encoding process
c. implemented after compressing the video
data
Survey on Video Watermarking
Spread spectrum (SS)
DCT
2D spread spectrum
(just another watermarking system, JAWS)
CDMA
Perceptual Watermarking (PW)
Spread spectrum[11]
sequence of information bits : a j {1,1}
large factor : cr (chip-rate)
the spread sequence : bi a j j cr i ( j 1) cr
binary pseudo-noise sequence : pi {1,1}
watermark video signal : vˆi vi bi pi
amplitude factor : α
[11] F. Hartung and B. Girod, “Digital watermarking of raw and
compress video” in Proc. SPIE Digital Compression Technologies
and Systems for Video Commun.,vol.2952,Oct. 1996,pp. 205-213.
Spread spectrum
signal sequence : ( j 1)cr1
( j 1)cr 1
( j 1)cr 1
2
ˆ
s j pi vi pi vi pi bi
i j cr
i j cr
i j cr
cr a j
recovered information bit :
aˆ j sign(s j )
The robustness can be increasing by
increasing cr ,but result in perceptibility
JAWS[19]
[19] T. Kalker, G. Depovere, J. Haitsma, Maes , “A Video
Watermarking System for Broadcast Monitoring”, proceedings of the
SPIE, vol 3657, pp. 103-112, (1999).
JAWS
CDMA [22]
[22] B. G. Mobasseri, “Exploring CDMA for watermarking of digital
video”,(1999) proceeding of theSPIE, vol. 3675,pp 96-102
PW[29], [30]
The five property of the HVS
a. Frequency sensitivity
b. Luminance sensitivity
c. Contrast masking
d. Edge masking
e. Temporal masking
[29] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks
for digital images and video”, Proceedings of the IEEE, vol. 87, pp. 108-1126,
(1999).
[30] M. M. Reid, R. J. Millar and N. D. Black , “Second-generation image
coding an overview an overview”, ACM Computing Surveys, vol. 29, pp. 3-29.
Survey on Video Watermarking
Collusion resistant (CR)[21]
VLC[23]
RBEM[24]
(region based energy modification)
Transformed Domain, proposed by Cox[25]
(TDC)
3D DFT
Group of frames (GOF)[31]
Outline
Introduction
Video Watermarking
Survey on Video Watermarking
Comparative Analysis of Different Video
Watermarking Techniques
Watermarking Techniques Applicable to
H.264/AVC
Comparative Analysis of Different
Video Watermarking Techniques
R : Robustness
Rl : Reliability
I : Imperceptibility
P : Practicality
T : Time complexity
Denote measure
G : Good
A : Acceptable
P : Poor
Technique
SS
R
A
Rl
A
I
G
P
G
T
G
JAWS
CR
CDMA
A
G
A
A
G
A
G
G
G
G
P
A
G
P
A
VLC
RBEM
TDC
PW
P
A
G
A
P
A
G
A
G
G
G
G
G
A
A
A
G
A
A
G
3D DFT
GOF
G
G
G
A
G
G
A
A
A
G
Outline
Introduction
Video Watermarking
Survey on Video Watermarking
Comparative Analysis of Different Video
Watermarking Techniques
Watermarking Techniques Applicable to
H.264/AVC
Watermarking Techniques Applicable
to H.264/AVC
H.264/AVC is popular for its’ :
better compression, picture quality and
applicability to portable electronic device
we discuss about an overview of H.264/AVC
and then the applicability of different
watermarking technology in H.264/AVC
Block diagram of H.264/AVC Encoder
Watermarking Techniques Applicable
to H.264/AVC
Watermarking can be implemented in motion
vectors or in integer transformation[28]
H.264 differs from other video CODECs like
MPEG in the following basic units:
a. All transformations are performed on
4x4 block instead of 8x8 or 16x16 block
b. Integer transformation is used which
differs from the DCT used in other CODECs
[28] Gang Qiu, Pina Marziliano, Anthony T.S. HO, Dajun He, and
Qibin Sun, “A hybrid watermarking scheme for H.264/AVC video”,
Proceedings of the 17th International Conference on Pattern
Recognition (ICPR’04)
Watermarking Techniques Applicable
to H.264/AVC
Most of the reliable and robust watermarking
techniques are applied in transformed domain
Modifications in the existing algorithm are
required to implement watermarking in H.264
Watermarking needs to be performed in real
time
The application of different
watermarking technology in H.264
Technique
Domain
Basic Tool
Applicability in H.264
SS
Pixel/
Transformed
Algebraic/
DCT
Y
JAWS
Pixel
Algebraic
Y
CR
Pixel
Algebraic
Y
CDMA
Pixel
Algebraic
N
VLC
During
Compression
Algebraic
Y
RBEM
Pixel
Algebraic
Y
TDC
Transformed
DCT
N
PW
Pixel/
Transformed
Algebraic/
DFT/DCT
Y
3D DFT
Transformed
DFT
N
References
[21] K. Su, D. Kundur and D. Hatzinakos, “A novel approach to
collusion-resistant video watermarking”, Proceedings of SPIE, vol.
4675, pp. 491-502.
[23] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Realtime
labeling of MPEG-2 compressed video”, (1998) journal of visual
communication and image representation, vol. 9, pp. 256-270.
[24] V. Darmstaedter, J. –F, Delaigle, D. Nicholson and B. Macq, “A
block based watermarking technique for MPEG2 signals:
Optimization and validation on real digital TV distribution links”,
Proceedings 3rd European Conference on Multimedia Applications,
Services and Techniques, pp. 190-206, 1998.
[25] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure
spread spectrum watermarking for multimedia”, IEEE transactions
on image processing, vol. 6, pp. 1673-1687, (1997).
[31] F. Deguillaume, G Csurka, J. O’Ruanaidh and T. Pun, “Robust
3D DFT video watermarking”, Proceeding of the SPIE, vol. 3657,
pp. 113-124.