Spatial synchronization using watermark key structure (original) (raw)

Temporal Synchronization in Video Watermarking

IEEE Transactions on Signal Processing, 2004

One of the challenges for blind watermark detection is synchronization. Synchronization is the process of identifying the coordinates of an embedded watermark and is crucial in successful watermark detection. If the detector's input is watermarked but synchronization fails, then the embedded watermark will not be detected. In this paper, temporal synchronization for blind video watermark detection is examined by developing new models for watermark embedding and detection. The structure of the watermark, and specifically its key schedule, dramatically affects the ease of synchronization. The new embedder models the construction of the watermark by using a state machine key generator. The key generator can produce time-invariant, time-independent, and time-periodic key schedules as special cases. The watermark detector uses a queue and a state predictor to perform a search to establish and maintain temporal synchronization. These models are general and can be applied to many symmetric blind video watermarking techniques. It is shown that a watermark without temporal redundancy in its key schedule is vulnerable to attacks such as frame dropping and transposition. Using the models, a watermark more resilient against temporal synchronization attacks is designed by adding temporal redundancy in the watermark construction. Experimental results from an implementation of the models are presented.

Synchronization-insensitive video watermarking using structured noise pattern

SPIE Proceedings, 2002

For most watermarking methods, preserving the synchronization between the watermark embedded in a digital data (image, audio or video) and the watermark detector is critical to the success of the watermark detection process. Many digital watermarking attacks exploit this fact by disturbing the synchronization of the watermark and the watermark detector, and thus disabling proper watermark detection without having to actually remove the watermark from the data. Some techniques have been proposed in the literature to deal with this problem. Most of these techniques employ methods to reverse the distortion caused by the attack and then try to detect the watermark from the repaired data. In this paper, we propose a watermarking technique that is not sensitive to synchronization. This technique uses a structured noise pattern and embeds the watermark payload into the geometrical structure of the embedded pattern.

Time-Variant Watermarks for Digital Videos

Digital Watermarking for Digital Media

Watermarks provide a means of embedding information into digital videos that can be used for a variety of purposes, such as establishing ownership, tracing origin of copies, and so forth. We outline an approach that permits a significant increase in the amount of information that can be accommodated in a watermark, namely time-variant watermarks. The approach is formulated assuming the video is represented in an MPEG format. Implementation issues of time-variant watermarks are discussed, as are their advantages over the usual time-invariant watermarks, with emphasis on defeating attacks using filtering, cropping, resizing, and other standard methods used to defeat watermarks, such as changing existing frames, as well as new attacks, such as removing, repeating, or permuting frames.

Comparative Study of Spatial Watermarking of Various Video formats

At the forefront of the information world it is all available in the shape of digital media. Digital watermarking has been introduced to provide authentication owners and copy right protection. Digital video watermarking is the process of embedding a digital code in the digital video sequences. Digital video watermarking is nothing but a sequence of consecutive still images. Over recent years applications based on video, pay-per-view, video-on-demand, video broadcasting are becoming more and more popular, which yield requirements to increase safety in the delivery of video. In this paper, the concept of digital video watermarking, its terminology, principle, properties, applications, and classification is introduced i.e. the detailed technique of watermarking such as Spatial Domain Watermarks (Correlation-Based Techniques, Least Significant Bit Modification), Frequency Domain Watermarks (Discrete Cosine Transform, Discrete Wavelet Transform). We have taken three video codec i.e. MPEG, IV 50, MJPG of respective video formats MPEG2, H.261 and AVI, which has been watermarked using BITGET video watermarking technique and comparative study among different video formats has been done to provide chaotic map and the efficient video format for watermarking which withstand on the essential ingredients such as fidelity, robustness, use of keys, blind detection, capacity and speed, statistical imperceptibility, low error probability, real-time detector complexity.

Digital Image Watermarking Resilient to Local Desynchronization Attacks

2015

New opportunities have been explored in social, business, entertainment and scientific fields due to the development of high speed computer networks and that of, internet in particular. Absurdly, the cause for the development is apprehensive because of the use of digital formatted data. Digital media has several advantages over analog media such as easy editing high fidelity copying and high quality. Software products which hide information within digital audio, images and video files have been introduced to address these growing concerns. Digital watermarking is one of the data hiding techniques. The watermarking is the process of embedding a signal in to other signal robustly and invisibly at the same time, the embedded signal is called watermark and the other signal is called cover or host signal. In this paper we are presents a brief overview of digital image watermarking techniques in time and transform domain, advantages of transform (frequency) domain over time domain techniq...

A Watermark Algorithm Against De-Synchronization Attacks

2016

In this paper, a robust method to the ability of the watermark to resist against attacks is proposed for hiding information into images. The proposed method is blind because the original image is not required at the decoder to recover the embedded data. The robustness of the watermarking scheme is inspired by using a PJND (Pyramidal Just Noticeable Difference) model and the message is inserted into these DoG (Difference of Gaussians) [1, 2]. Our proposal takes into account three main characteristics of Human Visual System, namely: contrast sensitivity, luminance adaptation and contrast marking. Therefore, it not only provides an invisible and robust watermarking but also optimizes watermarking capacity. The performance of the proposed technique is evaluated by a series of experiments with different input images. In terms of transparency, besides using the subjective experiments, eight objective metrics are calculated in comparison with other methods such as PSNR, MSSIM, SVDm, etc. O...

Screen-Cam Robust Image Watermarking with Feature-Based Synchronization

Applied Sciences

The screen-cam process, which is taking pictures of the content displayed on a screen with mobile phones or cameras, is one of the main ways that image information is leaked. However, traditional image watermarking methods are not resilient to screen-cam processes with severe distortion. In this paper, a screen-cam robust watermarking scheme with a feature-based synchronization method is proposed. First, the distortions caused by the screen-cam process are investigated. These distortions can be summarized into the five categories of linear distortion, gamma tweaking, geometric distortion, noise attack, and low-pass filtering attack. Then, a local square feature region (LSFR) construction method based on a Gaussian function, modified Harris–Laplace detector, and speeded-up robust feature (SURF) orientation descriptor is developed for watermark synchronization. Next, the message is repeatedly embedded in each selected LSFR by an improved embedding algorithm, which employs a non-rotati...

Robust digital watermarking in videos based on geometric transformations

Proceedings of the international conference on Multimedia - MM '10, 2010

In the efforts to fight piracy of high-valued media content, forensic digital watermarking as a passive content security scheme is a potential alternative to current, restrictive approaches like DRM. In this paper, we present a novel watermarking scheme for videos based on affine geometric transformations. Frames can be modified in an imperceptible manner by applying a small rotation, translation, or zooming, which can be detected later on by comparison with the originals. To compensate geometric distortions that have been introduced while a video travels down legal as well as illegal distribution chains, a spatio-temporal synchronization is performed using our video registration toolkit application. To evaluate our approach, we compare it with several other schemes regarding the robustness against common attacks, including camcorder capture.

Towards the construction of a benchmark for video watermarking systems: Temporal desynchronization attacks

2010 53rd IEEE International Midwest Symposium on Circuits and Systems, 2010

Although several digital watermarking schemes have emerged as a solution to traditional copyright protection technologies, only a few benchmark suites, specialized in still images and audio, have been presented to measure the robustness and performance of these schemes. The aim of this paper is to single out the particularities in the way of evaluating the performance of video watermarking systems to generate a video watermarking benchmark framework specialized in temporal desynchronization attacks. In this way, this paper presents the most important temporal desynchronization attacks and performance measures for video watermarking systems.

Time-Variant Watermarking of MPEG-Compressed Digital Videos

Clei Electronic Journal, 2005

Watermarks allow one to embed information into digital videos in a way that is imperceptible to the viewer. This information can be used to establish ownership, trace origin of copies, and verify the integrity of the video. Watermarking may be compared to injecting additional energy; to ensure that this injection remains unnoticeable, it should be as small as possible. We outline an approach that permits a significant increase of the amount of information that can be accommodated in a watermark without any increase in the complexity of the process, namely timevariant watermarks. Since data compression is an important aspect in storing and distributing digital videos, we formulate our approach assuming the video is represented in an MPEG format. We discuss implementation issues of time-variant watermarks, with special emphasis on their advantages over the usual timeinvariant watermarks. We comment on defeating attacks using filtering, cropping, resizing, and other standard methods used to defeat watermarks, such as changing existing frames, as well as new attacks, such as removing, repeating or permuting frames.