A Semi-fragile Video Watermarking Algorithm Based On Chromatic Residual DCT

被引:20
作者
Tian, Lihua [1 ]
Dai, Hangtao [1 ]
Li, Chen [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Software Engn, Xian 710049, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
H; 264; Chromatic DCT; Video watermark; Prediction mode; Tamper detection; SCHEME;
D O I
10.1007/s11042-019-08256-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a semi fragile video watermarking scheme based on chromatic DCT is proposed, which can protect copyright and tamper detection simultaneously. Firstly, through the experiment, it is found that the chroma block has a more stable prediction mode relative to the luminance block, which can effectively reduce the asynchronous probability brought by the change of the prediction mode. At the same time, blocks contains more the number of nonzero (NNZ) coefficients, the less the prediction mode changes. Therefore, for each macroblock, the algorithm sort its 4 x 4 sub macroblock according to the NNZ of chroma DCT coefficients, then select the sub block which has most NNZ residual coefficients. According to the secret key K and medium frequency stability of Intra 4 x 4 coefficients, modulate the relationship of three DCT coefficients near medium frequency. Secondly, the sensitivity of the prediction mode to malicious attacks and recompression operations is different. Therefore, the algorithm classifies the prediction mode of the macroblock and generates the authentication code using the prediction mode. The experimental results show that the video quality is negligible affected after watermark embedding, and the change of video bit rate is basically constant. At the same time, the chromatic DCT algorithm can also use the authentication code of the prediction mode to detect and locate the tampering at the 4 x 4 sub block level with good robustness.
引用
收藏
页码:1759 / 1779
页数:21
相关论文
共 20 条
  • [1] Afanasyeva A, 2014, INT C IMAGE PROCESSI, P1
  • [2] Bhattacharya A, 2013, INT CONF IMAG VIS, P489, DOI 10.1109/IVCNZ.2013.6727063
  • [3] Chen Xiaoling, 2012, Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA), P134, DOI 10.1109/ISdea.2012.413
  • [4] DUTTA T, 2013, NAT C COMM NCC, P1
  • [5] Tampering Detection in Compressed Digital Video Using Watermarking
    Fallahpour, Mehdi
    Shirmohammadi, Shervin
    Semsarzadeh, Mehdi
    Zhao, Jiying
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2014, 63 (05) : 1057 - 1072
  • [6] Low complexity semi-fragile watermarking scheme for H.264/AVC authentication
    Farfoura, Mahmoud E.
    Horng, Shi-Jinn
    Guo, Jing-Ming
    Al-Haj, Ali
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (13) : 7465 - 7493
  • [7] An adaptive watermarking scheme for e-government document images
    Horng, Shi-Jinn
    Rosiyadi, Didi
    Fan, Pingzhi
    Wang, Xian
    Khan, Muhammad Khurram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 3085 - 3103
  • [8] A low cost fragile watermarking scheme in H.264/AVC compressed domain
    Horng, Shi-Jinn
    Farfoura, Mahmoud E.
    Fan, Pingzhi
    Wang, Xian
    Li, Tianrui
    Guo, Jing-Ming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2469 - 2495
  • [9] A blind image copyright protection scheme for e-government
    Horng, Shi-Jinn
    Rosiyadi, Didi
    Li, Tianrui
    Takao, Terano
    Guo, Minyi
    Khan, Muhammad Khurram
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (07) : 1099 - 1105
  • [10] Jadhav Anita, 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC), P140, DOI 10.1109/ICESC.2014.29