Tampering Detection in Compressed Digital Video Using Watermarking

被引:53
作者
Fallahpour, Mehdi [1 ]
Shirmohammadi, Shervin [1 ]
Semsarzadeh, Mehdi [1 ]
Zhao, Jiying [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON K1N 6N5, Canada
关键词
Video authentication; video tampering detection; video watermarking; AUTHENTICATION; H.264/AVC; SCHEME; DESIGN; SECURE; DCT;
D O I
10.1109/TIM.2014.2299371
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a method to detect video tampering and distinguish it from common video processing operations, such as recompression, noise, and brightness increase, using a practical watermarking scheme for real-time authentication of digital video. In our method, the watermark signals represent the macroblock's and frame's indices, and are embedded into the nonzero quantized discrete cosine transform value of blocks, mostly the last nonzero values, enabling our method to detect spatial, temporal, and spatiotemporal tampering. Our method can be easily configured to adjust transparency, robustness, and capacity of the system according to the specific application at hand. In addition, our method takes advantage of content-based cryptography and increases the security of the system. While our method can be applied to any modern video codec, including the recently released high-efficiency video coding standard, we have implemented and evaluated it using the H. 264/AVC codec, and we have shown that compared with the existing similar methods, which also embed extra bits inside video frames, our method causes significantly smaller video distortion, leading to a PSNR degradation of about 0.88 dB and structural similarity index decrease of 0.0090 with only 0.05% increase in bitrate, and with the bit correct rate of 0.71 to 0.88 after H. 264/AVC recompression.
引用
收藏
页码:1057 / 1072
页数:16
相关论文
共 38 条
  • [1] [Anonymous], 2005, P IEEE C INSTR MEAS
  • [2] [Anonymous], 2013, JVT REFERENCE SOFTWA
  • [3] *ANSI, 2003, T1801032003 ANSI
  • [4] Watermarking of MPEG-4 video objects
    Barni, M
    Bartolini, F
    Checcacci, N
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (01) : 23 - 32
  • [5] Image authentication techniques for surveillance applications
    Bartolini, F
    Tefas, A
    Barni, M
    Pitas, I
    [J]. PROCEEDINGS OF THE IEEE, 2001, 89 (10) : 1403 - 1418
  • [6] An adaptive compressed MPEG-2 video watermarking scheme
    Biswas, S
    Das, SR
    Petriu, EM
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2005, 54 (05) : 1853 - 1861
  • [7] Biswas SN, 2012, IEEE IMTC P, P225
  • [8] Chaotic watermarking for video authentication in surveillance applications
    Chen, Siyue
    Leung, Henry
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (05) : 704 - 709
  • [9] Chen Xiaoling, 2012, Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA), P134, DOI 10.1109/ISdea.2012.413
  • [10] Dittmann J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P209, DOI 10.1109/MMCS.1999.778274