A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC

被引:9
作者
Li, Chen [1 ]
Yang, Yi [1 ]
Liu, Kai [1 ]
Tian, Lihua [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Software Engn, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
SCHEME;
D O I
10.1155/2020/8848553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing application of advanced video coding (H.264/AVC) in the multimedia field, a great significance to research in video watermarking based on this video compression standard has been established. We propose a semifragile video watermarking algorithm, which can simultaneously implement frame attack and video tamper detection, herein. In this paper, the frame number is selected as the watermark information, and the relationship of the discrete cosine transform (DCT) nonzero coefficients is used as the authentication code. The 4 x 4 subblocks, whose DCT nonzero coefficients are sufficiently complex, are selected to embed the watermark. The parities of these nonzero coefficients in the medium frequency are modulated to embed watermarks. The experimental results show that the visual quality of the embedded watermarked video is virtually unaffected, and the algorithm exhibits good robustness. Furthermore, the algorithm can correctly implement frame attack and video tamper detection.
引用
收藏
页数:11
相关论文
共 20 条
  • [1] Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT
    Cedillo-Hernandez, Antonio
    Cedillo-Hernandez, Manuel
    Garcia-Vazquez, Mireya
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    Ramirez-Acosta, Alejandro
    [J]. SIGNAL PROCESSING, 2014, 97 : 40 - 54
  • [2] Chaotic watermarking for video authentication in surveillance applications
    Chen, Siyue
    Leung, Henry
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (05) : 704 - 709
  • [3] Chen Xiaoling, 2012, Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA), P134, DOI 10.1109/ISdea.2012.413
  • [4] Dong SS, 2016, PR IEEE I C PROGR IN, P596, DOI 10.1109/PIC.2016.7949570
  • [5] Facciol Robert, 2010, Proceedings 2010 IEEE International Symposium on Multimedia (ISM 2010), P161, DOI 10.1109/ISM.2010.31
  • [6] Tampering Detection in Compressed Digital Video Using Watermarking
    Fallahpour, Mehdi
    Shirmohammadi, Shervin
    Semsarzadeh, Mehdi
    Zhao, Jiying
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2014, 63 (05) : 1057 - 1072
  • [7] Low complexity semi-fragile watermarking scheme for H.264/AVC authentication
    Farfoura, Mahmoud E.
    Horng, Shi-Jinn
    Guo, Jing-Ming
    Al-Haj, Ali
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (13) : 7465 - 7493
  • [8] Gaur S, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), P399, DOI 10.1109/SPIN.2017.8049982
  • [9] An adaptive watermarking scheme for e-government document images
    Horng, Shi-Jinn
    Rosiyadi, Didi
    Fan, Pingzhi
    Wang, Xian
    Khan, Muhammad Khurram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 3085 - 3103
  • [10] Brain Intelligence: Go beyond Artificial Intelligence
    Lu, Huimin
    Li, Yujie
    Chen, Min
    Kim, Hyoungseop
    Serikawa, Seiichi
    [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (02) : 368 - 375