a survey on different video watermarking techniques and comparative analysis with reference to...
TRANSCRIPT
A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC
Sourav Bhattacharya ; T. Chattopadhyay ; Arpan Pal
2006 IEEE Tenth International Symposium on Consumer Electronics
Outline
Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video
Watermarking Techniques Watermarking Techniques Applicable to
H.264/AVC
Outline
Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video
Watermarking Techniques Watermarking Techniques Applicable to
H.264/AVC
Introduction
Digital Rights Management Many watermarking schemes have been
proposed to hide copyright marks The main purpose of digital watermarking is
to embed information imperceptibly and robustly in the host data
Introduction
Internet multimedia, wireless video, personal video recorders, video-on-demand, set-top box, videophone and videoconferencing
Demand higher compression and video quality
H.264 / Advanced Video Codec (AVC)better image quality in terms of peak-signal-to-noise-ratio (PSNR)
Outline
Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video
Watermarking Techniques Watermarking Techniques Applicable to
H.264/AVC
Video Watermarking
Digital watermarking Video watermarking terminologies Video watermarking techniques
Digital watermarking
Watermark can be a serial number or random number sequence, ownership identifiers, copyright messages, control signal, transaction dates
No or little perceptible differences between the original media and the watermarked media
Digital watermarking
Domain : a. spatial b. frequency
Document ex. text, image, audio, video
Perception Application :
a. source based b. destination based
Digital watermarking
The embedding or encoding process can be viewed as a function
X : origin media W : watermark K : key X’ : watermarked media [•] : optional argument
])[,,(' KWXEX
Digital watermarking
The decoding process
The detection process
])[],[,"(' KXXDW
])[,],[,"(} { KWXXdNoorYes
Video watermarking terminologies
Digital Video Payload
the amount information stored in a watermark Perceptibility Robustness
watermark always remain in video data Security
algorithm can be public choice a key from a large key space
Video watermarking techniques
Any image watermarking techniques can be extend to watermark video
Meet some challenges in reality video :redundant datamotion and motionless regionreal-time requirementsusceptible to pirate attacks
Working Domain
Pixel domainsimple , low time complexitybut lack in robustness and imperceptibility
Transform domainex. DCT, DWTdetection is performedapply properties of HVS
Outline
Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video
Watermarking Techniques Watermarking Techniques Applicable to
H.264/AVC
Survey on Video Watermarking
Watermark can be a. directly inserted in the raw video datab. integrated during encoding processc. implemented after compressing the video data
Survey on Video Watermarking
Spread spectrum (SS) DCT 2D spread spectrum
(just another watermarking system, JAWS) CDMA Perceptual Watermarking (PW)
Spread spectrum[11]
sequence of information bits :
large factor : cr (chip-rate)
the spread sequence :
binary pseudo-noise sequence :
watermark video signal :
amplitude factor : α
[11] F. Hartung and B. Girod, “Digital watermarking of raw and compress video” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun.,vol.2952,Oct. 1996,pp. 205-213.
crjicrjab ji )1(
}1,1{ja
}1,1{ip
iiii pbvv ˆ
Spread spectrum
signal sequence :
recovered information bit :
The robustness can be increasing by increasing cr ,but result in perceptibility
j
crj
crjiii
crj
crjiii
crj
crjiiij
acr
bpvpvps
1)1(
21)1(1)1(
ˆ
)(ˆ jj ssigna
JAWS[19]
[19] T. Kalker, G. Depovere, J. Haitsma, Maes , “A Video Watermarking System for Broadcast Monitoring”, proceedings of the SPIE, vol 3657, pp. 103-112, (1999).
CDMA [22]
[22] B. G. Mobasseri, “Exploring CDMA for watermarking of digital video”,(1999) proceeding of theSPIE, vol. 3675,pp 96-102
PW[29], [30]
The five property of the HVS a. Frequency sensitivity b. Luminance sensitivity c. Contrast masking d. Edge masking e. Temporal masking
[29] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks for digital images and video”, Proceedings of the IEEE, vol. 87, pp. 108-1126, (1999).
[30] M. M. Reid, R. J. Millar and N. D. Black , “Second-generation image coding an overview an overview”, ACM Computing Surveys, vol. 29, pp. 3-29.
Survey on Video Watermarking
Collusion resistant (CR)[21]
VLC[23]
RBEM[24]
(region based energy modification) Transformed Domain, proposed by Cox[25]
(TDC) 3D DFT Group of frames (GOF)[31]
Outline
Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video
Watermarking Techniques Watermarking Techniques Applicable to
H.264/AVC
Comparative Analysis of Different Video Watermarking Techniques
Technique R Rl I P T
SS A A G G G
JAWS A A G G G
CR G G G P P
CDMA A A G A A
VLC P P G G G
RBEM A A G A A
TDC G G G A A
PW A A G A G
3D DFT G G G A A
GOF G A G A G
R : Robustness
Rl : Reliability
I : Imperceptibility
P : Practicality
T : Time complexity
Denote measure
G : Good
A : Acceptable
P : Poor
Outline
Introduction Video Watermarking Survey on Video Watermarking Comparative Analysis of Different Video
Watermarking Techniques Watermarking Techniques Applicable to
H.264/AVC
Watermarking Techniques Applicable to H.264/AVC H.264/AVC is popular for its’ :
better compression, picture quality andapplicability to portable electronic device
we discuss about an overview of H.264/AVC and then the applicability of different watermarking technology in H.264/AVC
Watermarking Techniques Applicable to H.264/AVC Watermarking can be implemented in motion vec
tors or in integer transformation[28]
H.264 differs from other video CODECs like MPEG in the following basic units: a. All transformations are performed on 4x4 block instead of 8x8 or 16x16 block b. Integer transformation is used which differs from the DCT used in other CODECs
[28] Gang Qiu, Pina Marziliano, Anthony T.S. HO, Dajun He, and Qibin Sun, “A hybrid watermarking scheme for H.264/AVC video”, Proceedings of the 17th International Conference on Pattern Recognition (ICPR’04)
Watermarking Techniques Applicable to H.264/AVC Most of the reliable and robust watermarking
techniques are applied in transformed domain Modifications in the existing algorithm are
required to implement watermarking in H.264 Watermarking needs to be performed in real
time
Technique Domain Basic Tool Applicability in H.264
SSPixel/
Transformed
Algebraic/
DCTY
JAWS Pixel Algebraic Y
CR Pixel Algebraic Y
CDMA Pixel Algebraic N
VLCDuring
CompressionAlgebraic Y
RBEM Pixel Algebraic Y
TDC Transformed DCT N
PWPixel/
Transformed
Algebraic/
DFT/DCTY
3D DFT Transformed DFT N
The application of different watermarking technology in H.264
References
[21] K. Su, D. Kundur and D. Hatzinakos, “A novel approach to collusion-resistant video watermarking”, Proceedings of SPIE, vol. 4675, pp. 491-502.
[23] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Realtime labeling of MPEG-2 compressed video”, (1998) journal of visual communication and image representation, vol. 9, pp. 256-270.
[24] V. Darmstaedter, J. –F, Delaigle, D. Nicholson and B. Macq, “A block based watermarking technique for MPEG2 signals: Optimization and validation on real digital TV distribution links”, Proceedings 3rd European Conference on Multimedia Applications, Services and Techniques, pp. 190-206, 1998.[25] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE transactions on image processing, vol. 6, pp. 1673-1687, (1997).[31] F. Deguillaume, G Csurka, J. O’Ruanaidh and T. Pun, “Robust 3D DFT video watermarking”, Proceeding of the SPIE, vol. 3657, pp. 113-124.