Chaotic watermarking for video authentication in surveillance applications

被引:34
作者
Chen, Siyue [1 ]
Leung, Henry [2 ]
机构
[1] Univ Calgary, Complex Syst Inc, Calgary, AB T2N 4T7, Canada
[2] Univ Calgary, Dept Elect & Comp Engn, Calgary, AB T2N 1N4, Canada
关键词
chaotic parameter modulation; digital watermarking; video authentication; video surveillance;
D O I
10.1109/TCSVT.2008.918801
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Installing video cameras in public facilities for surveillance becomes more and more popular. This paper proposes a novel authentication scheme based on chaotic semi-fragile watermarking. The timing information of video frames is modulated into the parameters of a chaotic system. The system output, which is a noise-like signal, is used as a watermark and embedded into the block-based discrete cosine transform domain. The embedded information is demodulated by a maximum likelihood estimator. Temporal tampering can be detected by the mismatch between the extracted and the observed timing information. In addition, the deviation of the extracted watermark from the original one allows us to locate spatial tampering. It is shown that the proposed scheme can satisfy the peculiar requirements of authenticating a digital video surveillance system.
引用
收藏
页码:704 / 709
页数:6
相关论文
共 17 条
[1]  
ALBIOL A, 2003, P ICIP BARC SPAIN SE, V2, P379
[2]  
Alligood K.T., 1997, CHAOS INTRO DYNAMICA
[3]  
[Anonymous], 1988, DETERMINISTIC CHAOS
[4]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[5]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[6]  
CHEN S, 2002, P ICASSP ORL FL, P4188
[7]   Analysis and design of secure watermark-based authentication systems [J].
Fei, Chuhong ;
Kundur, Deepa ;
Kwong, Raymond H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) :43-55
[8]  
Fridrich J, 2000, IEEE IMAGE PROC, P446, DOI 10.1109/ICIP.2000.900991
[9]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[10]   Computing bisimulations for finite-control π-calculus [J].
Lin, HM .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2000, 15 (01) :1-9