a survey on different video watermarking techniques and comparative analysis with reference to...

33
A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC Sourav Bhattacharya ; T. Chattopadhyay ; Arpan Pal 2006 IEEE Tenth International Symposium on Consumer Electronics

Upload: gabriella-holt

Post on 18-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC

Sourav Bhattacharya ; T. Chattopadhyay ; Arpan Pal

2006 IEEE Tenth International Symposium on Consumer Electronics

Outline

Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video

Watermarking Techniques Watermarking Techniques Applicable to

H.264/AVC

Outline

Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video

Watermarking Techniques Watermarking Techniques Applicable to

H.264/AVC

Introduction

Digital Rights Management Many watermarking schemes have been

proposed to hide copyright marks The main purpose of digital watermarking is

to embed information imperceptibly and robustly in the host data

Introduction

Internet multimedia, wireless video, personal video recorders, video-on-demand, set-top box, videophone and videoconferencing

Demand higher compression and video quality

H.264 / Advanced Video Codec (AVC)better image quality in terms of peak-signal-to-noise-ratio (PSNR)

Outline

Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video

Watermarking Techniques Watermarking Techniques Applicable to

H.264/AVC

Video Watermarking

Digital watermarking Video watermarking terminologies Video watermarking techniques

Digital watermarking

Watermark can be a serial number or random number sequence, ownership identifiers, copyright messages, control signal, transaction dates

No or little perceptible differences between the original media and the watermarked media

Digital watermarking

Domain : a. spatial b. frequency

Document ex. text, image, audio, video

Perception Application :

a. source based b. destination based

Digital watermarking

The embedding or encoding process can be viewed as a function

X : origin media W : watermark K : key X’ : watermarked media [•] : optional argument

])[,,(' KWXEX

Digital watermarking

The decoding process

The detection process

])[],[,"(' KXXDW

])[,],[,"(} { KWXXdNoorYes

Video watermarking terminologies

Digital Video Payload

the amount information stored in a watermark Perceptibility Robustness

watermark always remain in video data Security

algorithm can be public choice a key from a large key space

Video watermarking techniques

Any image watermarking techniques can be extend to watermark video

Meet some challenges in reality video :redundant datamotion and motionless regionreal-time requirementsusceptible to pirate attacks

Working Domain

Pixel domainsimple , low time complexitybut lack in robustness and imperceptibility

Transform domainex. DCT, DWTdetection is performedapply properties of HVS

Outline

Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video

Watermarking Techniques Watermarking Techniques Applicable to

H.264/AVC

Survey on Video Watermarking

Watermark can be a. directly inserted in the raw video datab. integrated during encoding processc. implemented after compressing the video data

Survey on Video Watermarking

Spread spectrum (SS) DCT 2D spread spectrum

(just another watermarking system, JAWS) CDMA Perceptual Watermarking (PW)

Spread spectrum[11]

sequence of information bits :

large factor : cr (chip-rate)

the spread sequence :

binary pseudo-noise sequence :

watermark video signal :

amplitude factor : α

[11] F. Hartung and B. Girod, “Digital watermarking of raw and compress video” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun.,vol.2952,Oct. 1996,pp. 205-213.

crjicrjab ji )1(

}1,1{ja

}1,1{ip

iiii pbvv ˆ

Spread spectrum

signal sequence :

recovered information bit :

The robustness can be increasing by increasing cr ,but result in perceptibility

j

crj

crjiii

crj

crjiii

crj

crjiiij

acr

bpvpvps

1)1(

21)1(1)1(

ˆ

)(ˆ jj ssigna

JAWS[19]

[19] T. Kalker, G. Depovere, J. Haitsma, Maes , “A Video Watermarking System for Broadcast Monitoring”, proceedings of the SPIE, vol 3657, pp. 103-112, (1999).

JAWS

CDMA [22]

[22] B. G. Mobasseri, “Exploring CDMA for watermarking of digital video”,(1999) proceeding of theSPIE, vol. 3675,pp 96-102

PW[29], [30]

The five property of the HVS a. Frequency sensitivity b. Luminance sensitivity c. Contrast masking d. Edge masking e. Temporal masking

[29] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks for digital images and video”, Proceedings of the IEEE, vol. 87, pp. 108-1126, (1999).

[30] M. M. Reid, R. J. Millar and N. D. Black , “Second-generation image coding an overview an overview”, ACM Computing Surveys, vol. 29, pp. 3-29.

Survey on Video Watermarking

Collusion resistant (CR)[21]

VLC[23]

RBEM[24]

(region based energy modification) Transformed Domain, proposed by Cox[25]

(TDC) 3D DFT Group of frames (GOF)[31]

Outline

Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video

Watermarking Techniques Watermarking Techniques Applicable to

H.264/AVC

Comparative Analysis of Different Video Watermarking Techniques

Technique R Rl I P T

SS A A G G G

JAWS A A G G G

CR G G G P P

CDMA A A G A A

VLC P P G G G

RBEM A A G A A

TDC G G G A A

PW A A G A G

3D DFT G G G A A

GOF G A G A G

R : Robustness

Rl : Reliability

I : Imperceptibility

P : Practicality

T : Time complexity

Denote measure

G : Good

A : Acceptable

P : Poor

Outline

Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video

Watermarking Techniques Watermarking Techniques Applicable to

H.264/AVC

Watermarking Techniques Applicable to H.264/AVC H.264/AVC is popular for its’ :

better compression, picture quality andapplicability to portable electronic device

we discuss about an overview of H.264/AVC and then the applicability of different watermarking technology in H.264/AVC

Block diagram of H.264/AVC Encoder

Watermarking Techniques Applicable to H.264/AVC Watermarking can be implemented in motion vec

tors or in integer transformation[28]

H.264 differs from other video CODECs like MPEG in the following basic units: a. All transformations are performed on 4x4 block instead of 8x8 or 16x16 block b. Integer transformation is used which differs from the DCT used in other CODECs

[28] Gang Qiu, Pina Marziliano, Anthony T.S. HO, Dajun He, and Qibin Sun, “A hybrid watermarking scheme for H.264/AVC video”, Proceedings of the 17th International Conference on Pattern Recognition (ICPR’04)

Watermarking Techniques Applicable to H.264/AVC Most of the reliable and robust watermarking

techniques are applied in transformed domain Modifications in the existing algorithm are

required to implement watermarking in H.264 Watermarking needs to be performed in real

time

Technique Domain Basic Tool Applicability in H.264

SSPixel/

Transformed

Algebraic/

DCTY

JAWS Pixel Algebraic Y

CR Pixel Algebraic Y

CDMA Pixel Algebraic N

VLCDuring

CompressionAlgebraic Y

RBEM Pixel Algebraic Y

TDC Transformed DCT N

PWPixel/

Transformed

Algebraic/

DFT/DCTY

3D DFT Transformed DFT N

The application of different watermarking technology in H.264

References

[21] K. Su, D. Kundur and D. Hatzinakos, “A novel approach to collusion-resistant video watermarking”, Proceedings of SPIE, vol. 4675, pp. 491-502.

[23] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Realtime labeling of MPEG-2 compressed video”, (1998) journal of visual communication and image representation, vol. 9, pp. 256-270.

[24] V. Darmstaedter, J. –F, Delaigle, D. Nicholson and B. Macq, “A block based watermarking technique for MPEG2 signals: Optimization and validation on real digital TV distribution links”, Proceedings 3rd European Conference on Multimedia Applications, Services and Techniques, pp. 190-206, 1998.[25] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE transactions on image processing, vol. 6, pp. 1673-1687, (1997).[31] F. Deguillaume, G Csurka, J. O’Ruanaidh and T. Pun, “Robust 3D DFT video watermarking”, Proceeding of the SPIE, vol. 3657, pp. 113-124.