A Survey on Different Video Watermarking Techniques and

Download Report

Transcript A Survey on Different Video Watermarking Techniques and

A Survey on Different Video
Watermarking Techniques and
Comparative Analysis with
Reference to H.264/AVC
Sourav Bhattacharya ; T. Chattopadhyay ; Arpan Pal
2006 IEEE Tenth International Symposium on
Consumer Electronics
Outline
 Introduction
 Video Watermarking
 Survey on Video Watermarking
 Comparative Analysis of Different Video
Watermarking Techniques
 Watermarking Techniques Applicable to
H.264/AVC
Outline
 Introduction
 Video Watermarking
 Survey on Video Watermarking
 Comparative Analysis of Different Video
Watermarking Techniques
 Watermarking Techniques Applicable to
H.264/AVC
Introduction
 Digital Rights Management
 Many watermarking schemes have been
proposed to hide copyright marks
 The main purpose of digital watermarking is
to embed information imperceptibly and
robustly in the host data
Introduction
 Internet multimedia, wireless video, personal
video recorders, video-on-demand, set-top
box, videophone and videoconferencing
 Demand higher compression and video
quality
 H.264 / Advanced Video Codec (AVC)
better image quality in terms of peak-signalto-noise-ratio (PSNR)
Outline
 Introduction
 Video Watermarking
 Survey on Video Watermarking
 Comparative Analysis of Different Video
Watermarking Techniques
 Watermarking Techniques Applicable to
H.264/AVC
Video Watermarking
 Digital watermarking
 Video watermarking terminologies
 Video watermarking techniques
Digital watermarking
 Watermark can be a serial number or random
number sequence, ownership identifiers,
copyright messages, control signal, transaction
dates
 No or little perceptible differences between the
original media and the watermarked media
Digital watermarking
 Domain :
a. spatial
b. frequency
 Document
ex. text, image, audio, video
 Perception
 Application :
a. source based
b. destination based
Digital watermarking
 The embedding or encoding process can be
viewed as a function
X '  E( X ,W , [ K ])
X : origin media
W : watermark
K : key
X’ : watermarked media
[•] : optional argument
Digital watermarking
 The decoding process
W '  D( X ", [ X ],[ K ])
 The detection process
{Yes or No}  d ( X ", [ X ],W , [ K ])
Video watermarking terminologies
 Digital Video
 Payload
the amount information stored in a watermark
 Perceptibility
 Robustness
watermark always remain in video data
 Security
algorithm can be public
choice a key from a large key space
Video watermarking techniques
 Any image watermarking techniques can be
extend to watermark video
 Meet some challenges in reality video :
redundant data
motion and motionless region
real-time requirement
susceptible to pirate attacks
Working Domain
 Pixel domain
simple , low time complexity
but lack in robustness and imperceptibility
 Transform domain
ex. DCT, DWT
detection is performed
apply properties of HVS
Outline
 Introduction
 Video Watermarking
 Survey on Video Watermarking
 Comparative Analysis of Different Video
Watermarking Techniques
 Watermarking Techniques Applicable to
H.264/AVC
Survey on Video Watermarking
 Watermark can be
a. directly inserted in the raw video data
b. integrated during encoding process
c. implemented after compressing the video
data
Survey on Video Watermarking
 Spread spectrum (SS)
 DCT
 2D spread spectrum
(just another watermarking system, JAWS)
 CDMA
 Perceptual Watermarking (PW)
Spread spectrum[11]
sequence of information bits : a j  {1,1}
large factor : cr (chip-rate)
the spread sequence : bi  a j j  cr  i  ( j 1)  cr
binary pseudo-noise sequence : pi {1,1}
watermark video signal : vˆi  vi    bi  pi
amplitude factor : α
[11] F. Hartung and B. Girod, “Digital watermarking of raw and
compress video” in Proc. SPIE Digital Compression Technologies
and Systems for Video Commun.,vol.2952,Oct. 1996,pp. 205-213.
Spread spectrum
signal sequence : ( j 1)cr1
( j 1)cr 1
( j 1)cr 1
2
ˆ
s j   pi  vi   pi  vi   pi    bi
i  j cr
i  j cr
i  j cr
 cr    a j
recovered information bit :
aˆ j  sign(s j )
 The robustness can be increasing by
increasing cr ,but result in perceptibility
JAWS[19]
[19] T. Kalker, G. Depovere, J. Haitsma, Maes , “A Video
Watermarking System for Broadcast Monitoring”, proceedings of the
SPIE, vol 3657, pp. 103-112, (1999).
JAWS
CDMA [22]
[22] B. G. Mobasseri, “Exploring CDMA for watermarking of digital
video”,(1999) proceeding of theSPIE, vol. 3675,pp 96-102
PW[29], [30]
 The five property of the HVS
a. Frequency sensitivity
b. Luminance sensitivity
c. Contrast masking
d. Edge masking
e. Temporal masking
[29] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks
for digital images and video”, Proceedings of the IEEE, vol. 87, pp. 108-1126,
(1999).
[30] M. M. Reid, R. J. Millar and N. D. Black , “Second-generation image
coding an overview an overview”, ACM Computing Surveys, vol. 29, pp. 3-29.
Survey on Video Watermarking
 Collusion resistant (CR)[21]
 VLC[23]
 RBEM[24]
(region based energy modification)
 Transformed Domain, proposed by Cox[25]
(TDC)
 3D DFT
 Group of frames (GOF)[31]
Outline
 Introduction
 Video Watermarking
 Survey on Video Watermarking
 Comparative Analysis of Different Video
Watermarking Techniques
 Watermarking Techniques Applicable to
H.264/AVC
Comparative Analysis of Different
Video Watermarking Techniques
R : Robustness
Rl : Reliability
I : Imperceptibility
P : Practicality
T : Time complexity
Denote measure
G : Good
A : Acceptable
P : Poor
Technique
SS
R
A
Rl
A
I
G
P
G
T
G
JAWS
CR
CDMA
A
G
A
A
G
A
G
G
G
G
P
A
G
P
A
VLC
RBEM
TDC
PW
P
A
G
A
P
A
G
A
G
G
G
G
G
A
A
A
G
A
A
G
3D DFT
GOF
G
G
G
A
G
G
A
A
A
G
Outline
 Introduction
 Video Watermarking
 Survey on Video Watermarking
 Comparative Analysis of Different Video
Watermarking Techniques
 Watermarking Techniques Applicable to
H.264/AVC
Watermarking Techniques Applicable
to H.264/AVC
 H.264/AVC is popular for its’ :
better compression, picture quality and
applicability to portable electronic device
 we discuss about an overview of H.264/AVC
and then the applicability of different
watermarking technology in H.264/AVC
Block diagram of H.264/AVC Encoder
Watermarking Techniques Applicable
to H.264/AVC
 Watermarking can be implemented in motion
vectors or in integer transformation[28]
 H.264 differs from other video CODECs like
MPEG in the following basic units:
a. All transformations are performed on
4x4 block instead of 8x8 or 16x16 block
b. Integer transformation is used which
differs from the DCT used in other CODECs
[28] Gang Qiu, Pina Marziliano, Anthony T.S. HO, Dajun He, and
Qibin Sun, “A hybrid watermarking scheme for H.264/AVC video”,
Proceedings of the 17th International Conference on Pattern
Recognition (ICPR’04)
Watermarking Techniques Applicable
to H.264/AVC
 Most of the reliable and robust watermarking
techniques are applied in transformed domain
 Modifications in the existing algorithm are
required to implement watermarking in H.264
 Watermarking needs to be performed in real
time
The application of different
watermarking technology in H.264
Technique
Domain
Basic Tool
Applicability in H.264
SS
Pixel/
Transformed
Algebraic/
DCT
Y
JAWS
Pixel
Algebraic
Y
CR
Pixel
Algebraic
Y
CDMA
Pixel
Algebraic
N
VLC
During
Compression
Algebraic
Y
RBEM
Pixel
Algebraic
Y
TDC
Transformed
DCT
N
PW
Pixel/
Transformed
Algebraic/
DFT/DCT
Y
3D DFT
Transformed
DFT
N
References
[21] K. Su, D. Kundur and D. Hatzinakos, “A novel approach to
collusion-resistant video watermarking”, Proceedings of SPIE, vol.
4675, pp. 491-502.
[23] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Realtime
labeling of MPEG-2 compressed video”, (1998) journal of visual
communication and image representation, vol. 9, pp. 256-270.
[24] V. Darmstaedter, J. –F, Delaigle, D. Nicholson and B. Macq, “A
block based watermarking technique for MPEG2 signals:
Optimization and validation on real digital TV distribution links”,
Proceedings 3rd European Conference on Multimedia Applications,
Services and Techniques, pp. 190-206, 1998.
[25] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure
spread spectrum watermarking for multimedia”, IEEE transactions
on image processing, vol. 6, pp. 1673-1687, (1997).
[31] F. Deguillaume, G Csurka, J. O’Ruanaidh and T. Pun, “Robust
3D DFT video watermarking”, Proceeding of the SPIE, vol. 3657,
pp. 113-124.