Browse > Article
http://dx.doi.org/10.5909/JEB.2011.16.3.394

UCI Embedder: A Real-time Broadcast-Content-Identifier Watermarking System for Broadcast Content Distribution Services  

Kim, Youn-Hee (Electronics and Telecommunications Research Institute, Broadcasting & Telecommunications Media Research Department)
Kim, Hyun-Tae (CK&B Co., Ltd. Research Institute)
Lee, Joo-Young (Electronics and Telecommunications Research Institute, Broadcasting & Telecommunications Media Research Department)
Nam, Je-Ho (Electronics and Telecommunications Research Institute, Broadcasting & Telecommunications Media Research Department)
Publication Information
Journal of Broadcast Engineering / v.16, no.3, 2011 , pp. 394-402 More about this Journal
Abstract
We introduce the standard content identifier Universal Content Identifier (UCI) and a watermarking system that embeds UCI for the broadcast content distribution services. Our proposed UCI embedder is designed in consideration of integrating with the previously established broadcast system and protecting the illegal distribution of broadcast contents. Our goal is that when broadcast content is transmitted, 28 byte UCI is embedded imperceptibly in the content itself in real-time and the embedded UCI is successfully extracted not only in the typical format used in the broadcast content distribution service but also in the illegally distributed broadcast contents. Usually the illegally distributed contents are modified from the original by changing resolutions, frame rates, or adjusting colors. In this paper, we present a watermarking scheme that embeds 28 byte UCI in broadcast content in real-time while keeping the visual quality high and the embedded watermark robust enough to survive through the various modification. The experimental results show that the embedded UCI remains in the various modified versions of content and that the visual degradation by embedding is not noticeable.
Keywords
Content Identifier; Watermarking; Broadcast Content Protection; Real-time Watermarking;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M. Wu and B. Liu, "Watermarking for image authentication," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 437-441.
2 D. Kundur and D. Hatzinakos, "Towards a telltale watermarking technique for tamper-proofing," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 409-413.   DOI
3 Liehua Xie and G.R. Arce, "Joint wavelet compression and authentication watermarking," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 427-431.   DOI
4 TTA KICS.OT-10.0058, "Universal Content Identifier (Standard on Digital Content Identification: Universal Content Identifier)," December 2008.
5 IETF RFC4179, S Kang, "Using Universal Content Identifier (UCI) as Uniform Resource Names (URN)," http://www.ietf.org/rfc/rfc4179.txt?number=4179), September 2005.
6 Yoonsik Uhm, Zion Hwang, Minsoo Lee, Jaehoon Nah, Hwangjun Song, and Sehyun Park, "Content Protective Multi-Agent Platform for MsMu Service and Pattern-Based Content Management," ETRI Journal, vol. 32, no. 5, October 2010, pp. 665-675.   DOI   ScienceOn
7 I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, vol. 6, no. 12, 1997, pp. 1673-1687.   DOI   ScienceOn
8 Conting service, http://www.conting.co.kr.
9 M. Kutter, "Watermarking resisting to translation, rotation and scaling", in Proceedings of SPIE: Multimedia systems and applications, vol. 3528, Boston, USA, November, 1998, pp. 423-431.
10 DeckLink, http://www.blackmagic-design.com/products/decklinkhdextreme.
11 ITU-R Recommendation BT.500-7: Methodology for the subjective assessment of the quality of television pictures.
12 M. M.Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1997, pp. 680-683.   DOI
13 T. A. Z. Van Schyndel, R G and C. F. Osborne, "A digital watermark," in Proceedings of IEEE International Conference on Image Processing, vol. 2, November 1994, pp. 86-90.   DOI
14 R. Wolfgang and E. Delp, "A watermark for digital images," in Proceedings of IEEE International Conference on Image Processing, vol. 3, September 1996, pp. 219-222.   DOI
15 P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no. 10, October 2001, pp. 1593-1601.   DOI   ScienceOn
16 J. Fridrich, M. G. and Arnold C.Baldoza, "New fragile authentication watermark for images," in Proceedings of IEEE International Conference on Image Processing, September 2000, pp. 446-449.   DOI