A novel robust video fingerprinting-watermarking hybrid scheme based on visual secret sharing

被引:5
|
作者
Liu, Xiyao [1 ]
Zhu, Yuesheng [1 ]
Sun, Ziqiang [1 ]
Diao, Mengge [1 ]
Zhang, Liming [2 ]
机构
[1] Peking Univ, Shenzhen Grad Sch, Commun & Informat Secur Lab, Shenzhen 518055, Peoples R China
[2] Univ Macau, Fac Sci & Technol, Macau 999078, Peoples R China
关键词
Digital rights management; Visual secret sharing; Fingerprinting; Zero-watermarking; 3D-DCT; EXTREME LEARNING-MACHINE; COPY DETECTION; ALGORITHM; TRANSFORM;
D O I
10.1007/s11042-014-2073-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel robust Video Fingerprinting-Watermarking Hybrid Scheme (VFWHS) is proposed by applying fingerprinting technique to zero-watermarking algorithm for enhancing the performance of video Digital Rights Management (DRM). In the VFWHS, the content-based feature of the original video is extracted by an improved 3D-DCT fingerprinting algorithm and stored in a video fingerprint database for retrieval, while the watermark-based feature of the watermark image is extracted by a 2D-DCT fingerprinting algorithm for copyright identification. According to the visual secret sharing scheme, a master share is generated from the content-based feature while an ownership share is generated from the master share and the watermark-based feature. The ownership share is then stored in an ownership database. When a video is queried, its content-based features are generated, and a process of similarity measurement is executed to obtain the matched feature with the relevant ownership share. The copyright ownership can be identified by stacking the master share generated from the queried video with the relevant ownership share. Our experimental results demonstrate that the VFWHS can obtain the relevant ownership share precisely for reliable copyright identification in the mass content processing which cannot be achieved by the zero-watermarking algorithms, and provide explicit copyright identification to avoid possible copyright dissension which cannot be achieved by the fingerprinting algorithms.
引用
收藏
页码:9157 / 9174
页数:18
相关论文
共 50 条
  • [21] An object based robust video watermarking scheme
    Fu, Yonggang
    Shen, Ruimin
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 188 - +
  • [22] Robust Visual Secret Sharing Scheme Applying to QR Code
    Tan, Longdan
    Liu, Kesheng
    Yan, Xuehu
    Liu, Lintao
    Lu, Tianqi
    Chen, Jinrui
    Liu, Feng
    Lu, Yuliang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [23] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623
  • [24] Robust Cheat-Prevention for Random Grids based Visual Secret Sharing Scheme
    Mishra, Sonu K.
    Biswaranjan, Kumar
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 517 - 523
  • [25] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [26] A hierarchical signature scheme for robust video authentication using secret sharing
    Atrey, PK
    Yan, WQ
    Chang, EC
    Kankanhalli, MS
    10TH INTERNATIONAL MULTIMEDIA MODELLING CONFERENCE, PROCEEDINGS, 2004, : 330 - 337
  • [27] Authentication and copyright protection watermarking scheme for H.264 based on visual saliency and secret sharing
    Tian, Lihua
    Zheng, Nanning
    Xue, Jianru
    Li, Ce
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (09) : 2991 - 3011
  • [28] Authentication and copyright protection watermarking scheme for H.264 based on visual saliency and secret sharing
    Lihua Tian
    Nanning Zheng
    Jianru Xue
    Ce Li
    Multimedia Tools and Applications, 2015, 74 : 2991 - 3011
  • [29] A Secure and Robust Audio Watermarking Scheme Using Secret Sharing in the Transform-Domain
    Abbasi, Aliya Tabassum
    Miao, Fuyou
    Islam, Md Shohidul
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2025, 44 (02) : 1274 - 1307
  • [30] Linear Equation Based Visual Secret Sharing Scheme
    Bunker, Subhash Chand
    Barasa, Mayur
    Ojha, Aparajita
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 406 - 410