A robust watermarking scheme against frame blending and projection attacks

被引:8
作者
Gaj, Sibaji [1 ]
Rathore, Anoop Kumar [1 ]
Sur, Arijit [1 ]
Bora, Prabin Kumar [2 ]
机构
[1] IIT Guwahati, Multimedia Lab, Dept Comp Sci & Engn, Gauhati 781039, India
[2] IIT Guwahati, Dept Elect & Elect Engn, Gauhati 781039, India
关键词
Video watermarking; Cam-cording attack; Frame blending; Frame projection;
D O I
10.1007/s11042-016-3961-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Camcorder based video copy attack has become a serious threat to the electronic movie distribution services. Although watermarking is used to authenticate against such camcorder based copy attack, in the camcorder recorded videos, the embedded watermark suffers from several geometric distortions and temporal de-synchronizations. This paper proposes a watermarking scheme which is robust against the distortion due to cam-cordering process. Firstly, a comprehensive literature survey has been done on the watermarking schemes resilient to the cam-cording attack. Based on the existing limitations of the state-of-art literature, a watermarking scheme is devised to embed a watermark which is robust against to frame blending and projection attacks which are the major distortions caused during cam-cording. A comprehensive set of experiments has been carried out to show the applicability of the proposed scheme over the existing literature.
引用
收藏
页码:20755 / 20779
页数:25
相关论文
共 23 条
[1]  
Delannay D, 2001, COMPENSATION GEOMETR, DOI [10.1117/12.435395, DOI 10.1117/12.435395]
[2]  
Do H, 2008, IEEE INT SYMP SIGNAL, P330, DOI 10.1109/ISSPIT.2008.4775680
[3]   Object based watermarking for H.264/AVC video resistant to rst attacks [J].
Gaj, Sibaji ;
Patel, Ashish Singh ;
Sur, Arijit .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (06) :3053-3080
[4]   IMPROVED WATERMARK DETECTION ROBUST TO CAMCORDER CAPTURE BASED ON QUADRANGLE ESTIMATION [J].
Lee, Min-Jeong ;
Kim, Kyung-Su ;
Suh, Young-Ho ;
Lee, Heung-Kyu .
2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, :101-+
[5]  
Lee MJ, 2008, IEEE IMAGE PROC, P425, DOI 10.1109/ICIP.2008.4711782
[6]   Segmentation-Based Image Copy-Move Forgery Detection Scheme [J].
Li, Jian ;
Li, Xiaolong ;
Yang, Bin ;
Sun, Xingming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :507-518
[7]   AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording [J].
Li, Li ;
Dong, Zihui ;
Lu, Jianfeng ;
Dai, Junping ;
Huang, Qianru ;
Chang, Chin-Chen ;
Wu, Ting .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 26 :1-8
[8]   Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update [J].
Li, Xiong ;
Niu, Jianwei ;
Liao, Junguo ;
Liang, Wei .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) :374-382
[9]   Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels [J].
Liao, Xin ;
Shu, Changwen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 28 :21-27
[10]   Distinctive image features from scale-invariant keypoints [J].
Lowe, DG .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2004, 60 (02) :91-110