Content fragile watermarking for H.264/AVC video authentication

被引:7
作者
Sadi, K. Ait [1 ]
Guessoum, A. [2 ]
Bouridane, A. [3 ]
Khelifi, F. [3 ]
机构
[1] Ctr Dev Technol Avancees, Div Architecture Syst, Algiers, Algeria
[2] Univ Saad Dahlab, Inst Elect, Blida, Algeria
[3] Northumbria Univ, Sch Comp Engn & Informat Sci, Northumbria, England
关键词
Content protection; fragile watermarking; digital signature; video authentication; H.264/AVC codec; SCHEME;
D O I
10.1080/00207217.2016.1242163
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Discrete cosine transform is exploited in this work to generate the authentication data that are treated as a fragile watermark. This watermark is embedded in the motion vectors. The advances in multimedia technologies and digital processing tools have brought with them new challenges for the source and content authentication. To ensure the integrity of the H.264/AVC video stream, we introduce an approach based on a content fragile video watermarking method using an independent authentication of each group of pictures (GOPs) within the video. This technique uses robust visual features extracted from the video pertaining to the set of selected macroblocs (MBs) which hold the best partition mode in a tree-structured motion compensation process. An additional security degree is offered by the proposed method through using a more secured keyed function HMAC-SHA-256 and randomly choosing candidates from already selected MBs. In here, the watermark detection and verification processes are blind, whereas the tampered frames detection is not since it needs the original frames within the tampered GOPs. The proposed scheme achieves an accurate authentication technique with a high fragility and fidelity whilst maintaining the original bitrate and the perceptual quality. Furthermore, its ability to detect the tampered frames in case of spatial, temporal and colour manipulations is confirmed.
引用
收藏
页码:673 / 691
页数:19
相关论文
共 30 条
[1]  
[Anonymous], 2011, INT J COMPUT SCI ENG
[2]  
Bovik A. C, 2010, Handbook of Image and Video Processing
[3]  
Chang L., 2008, EURASIP J IMAGE VIDE, P1, DOI [10.1155/2008/810362, DOI 10.1155/2008/810362]
[4]   Low complexity semi-fragile watermarking scheme for H.264/AVC authentication [J].
Farfoura, Mahmoud E. ;
Horng, Shi-Jinn ;
Guo, Jing-Ming ;
Al-Haj, Ali .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (13) :7465-7493
[5]  
Feng D., 2003, TECHNOLOGICAL FUNDAM
[6]  
Fridrich J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P536, DOI 10.1109/MMCS.1999.778542
[7]   A low cost fragile watermarking scheme in H.264/AVC compressed domain [J].
Horng, Shi-Jinn ;
Farfoura, Mahmoud E. ;
Fan, Pingzhi ;
Wang, Xian ;
Li, Tianrui ;
Guo, Jing-Ming .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) :2469-2495
[8]   Design of real-time video watermarking based on Integer DCT for H.264 encoder [J].
Joshi, Amit M. ;
Mishra, Vivekanand ;
Patrikar, R. M. .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2015, 102 (01) :141-155
[9]  
Kim J, 2006, LECT NOTES COMPUT SC, V4116, P242
[10]   Video watermarking technique for H.264/AVC [J].
Kim, Taehyun ;
Park, Kyungoh ;
Hong, Youpyo .
OPTICAL ENGINEERING, 2012, 51 (04)