DOI QR코드

DOI QR Code

Development of Video Watermark System for Low-specification System as Android Platforms

저 사양 안드로이드 기반 동영상 보안을 위한 워터마크 시스템 개발

  • 황선철 (인덕대학교 방송영상미디어과)
  • Received : 2014.06.10
  • Accepted : 2014.07.23
  • Published : 2014.07.31

Abstract

This paper describes a method to insert and detect watermark or fingerprint to/from videos in low-computing powered system as Android platforms. Fingerprint, which is a kind of watermark, has features such as patterns that contain information. The inserting frame numbers in video-stream and the positions in a picture were chosen from the encrypted user ID to insert the watermarks. The used encrypt algorithm is the HIGHT algorithm which was developed for low-computing powered systems by KISA(Korean Internet & Security Agency). Subtracting an inferred picture from the previous picture was used to extract a candidate feature. Median filtering was used to get rid of noise and stabilize the candidate feature. New algorithm that reduces calculating steps of the median filtering was developed and applied for low-specification systems. The stabilized features were accumulated over 150 times and calculated by correlation coefficient method to recognize the patterns. We examined 22 videos and successfully detected the patterns from 21 videos. The correlation coefficient r values that we examined through this study exceeded over 0.79 more than the threshold (0.7).

본 논문에서는 안드로이드 플랫폼과 같은 낮은 사양의 시스템에서 처리속도에 부담을 주지 않고 공간영역에서 워터마크의 삽입 및 검출 알고리즘을 제안하고자 한다. 워터마크는 사용자의 정보를 암호화하여 삽입하는 핑거프린트의 형태로 삽입되며 노출 위험을 피하기 위해 사용자 ID를 블록 암호화하여 의사 난수화하고 이를 토대로 워터마크의 삽입위치, 크기 및 삽입 프레임 번호에 변화를 주는 방법을 사용하였다. 또한 동영상의 특징상 많은 프레임이 존재하므로 이런 특징을 적극 활용하여 검출 결과를 안정화한 후 적분을 통하여 검출 가능성을 높였다. 본 연구에서 제시한 워터마크의 삽입 및 검출은 제한된 조건하에서도 높은 검출율을 얻을 수 있었다. 또한 검출 결과를 시각적으로 보여주기 위한 결과에서도 비교적 선명한 결과를 얻을 수 있었다. 상관계수 r 연산에 의한 결과도 움직임이 많은 경우 0.87, 중간의 경우 0.79, 움직임 적은 경우 0.84라는 높은 결과를 얻을 수 있어서 0.7 이상인 경우 확정적인 것을 참고하면 높은 검출 결과를 얻게 되었다. 워터마크 기호 영상 추출 단계에서 성공율 95.45%의 결과를 얻었으며 이 결과 영상에 상관계수 r 연산을 적용하면 99% 이상 검출 결과를 얻을 수 있었다. 향후 다양한 공격에 대비한 알고리즘의 보완을 통해 상품화의 단계를 지향하고 있으며 이를 통해 영상 관제 시스템과 지적 재산권 보호 시스템에 적용할 예정이다.

Keywords

References

  1. A. Kejariwal, "Watermarking," IEEE POTENTIALS, pp.37-40, Oct/Nov. 2003
  2. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on IMAGE PROCESSING, Vol. 6, No. 12, pp.1673-1687, Dec. 1997 https://doi.org/10.1109/83.650120
  3. I.J. Cox, M.L. Miller and J.A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, 2002
  4. I.J. Cox, T. Kalker, H. Lee et. al, Digital watermarking: third international workshop, IWDW 2004, Seoul, Korea, Oct. 30-Nov. 1, 2004 : revised selected papers, 2004
  5. Sarabjeet Singh, "Digital Watermarking Trends, " International Journal of Research in Computer Science, Vol.1, No.1, pp.55-61, Sep. 2011 https://doi.org/10.7815/ijorcs.11.2011.005
  6. W. Lu, H. Lu, F. Chung, "Feature based watermarking using watermark template match," Applied Mathematics and Computation, Vol.177, pp.377-386, June 2006 https://doi.org/10.1016/j.amc.2005.11.015
  7. A. Giannoula, N. V. Boulgouris, D. Hatzinakos, and K. N. Plataniotis, "Watermark Detection for Noisy Interpolated Images," EEE Trans. on Circuits and Systems-II: Express Briefs, Vol.53, No.5, pp.359-363, May 2006 https://doi.org/10.1109/TCSII.2006.870213
  8. A.Z. Tirkel, C.F. Osborne, T.E. Hall, "Image and watermark registration," Signal Processing, Vol.66, pp.373-383, May 1998 https://doi.org/10.1016/S0165-1684(98)00016-4
  9. Jiwu Huang, Yun Q. Shi, and Yi Shi, "Embedding Image Watermarks in DC Components," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 10, No. 6, pp.974-979, Sep. 2000 https://doi.org/10.1109/76.867936
  10. Seon-Cheol Hwang, "Coded Watermark Detecting Algorithm using a Blind Detecting Method Without Original Videos," The Transactions of the Korean Institute of Electrical Engineers. P, Vol.59P No.4, pp. 395-400, Dec. 2010
  11. D. Tsolis, S. Nikolopoulos, L. Drossos, S. Sioutas, T. Papatheodorou, "Applying robust multibit watermarks to digital images," Journal of Computational and Applied Mathematics, Vol.227, pp.213-220, May 2009 https://doi.org/10.1016/j.cam.2008.07.035
  12. C. Hsu and J. Wu, "Hidden Digital Watermarks in Images," IEEE Trans. on IMAGE PROCESSING, Vol. 8, No. 1, pp.58-68, Jan. 1999 https://doi.org/10.1109/83.736686
  13. X. Guihua and Y. Shenglin, "Spread Spectrum Watermark Detection in DRT-Domain," Journal of Electronics, Vol.24, No.6, pp.782-786, Nov. 2007
  14. P. Kumar Dhar and I. Echizen, "Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio Data," 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 181-184, Oct. 14-16, 2011
  15. S. Pereira and T. Pun, "Robust Template Matching for Affine Resistant Image Watermarks," IEEE Trans. on IMAGE PROCESSING, Vol. 9, No. 6, pp.1123-1129, Jun. 2000 https://doi.org/10.1109/83.846253
  16. D. Kirovski, H. Malvar, and Y. Yacobi, "A Dual Watermark-Fingerprint System," IEEE Multimedia, pp.59-73, July-September 2004 https://doi.org/10.1109/MMUL.2004.1
  17. M. Hsieh, D. Tseng, and Y. Huang, "Hiding Digital Watermarks Using Multiresolution Wavelet Transform," IEEE Trans. on INDUSTRIAL ELECTRONICS, Vol. 48, No. 5, pp.875-882, Oct. 2001 https://doi.org/10.1109/41.954550
  18. Christine I. Podilchuk and Edward J. Delp, "Digital Watermarking: Algorithms and Applications," IEEE Signal Processing Magazine, pp.33-46, July 2001
  19. F. Hartung, and M. Kutter, "Multimedia Watermarking Techniques," Proceedings of the IEEE, Vol. 87, No. 7, pp.1079-1107, Jul. 1999 https://doi.org/10.1109/5.771066
  20. M. Hasnaoui, M. Mitrea, "Multi-symbol QIM video watermarking," Signal Processing: Image Communication, Vol.29, pp.107-127, Jan. 2014 https://doi.org/10.1016/j.image.2013.07.007