Browse > Article
http://dx.doi.org/10.9717/kmms.2012.15.8.1017

Active Video Watermarking Technique for Infectious Information Hiding System  

Jang, Bong-Joo (부경대학교 정보보호협동과정)
Lee, Suk-Hwan (동명대학교 정보보호학과)
Kwon, Ki-Ryong (부경대학교 IT융합응용공학과)
Publication Information
Abstract
Most watermarking schemes for video contents protection have been studied to increase watermark's robustness and invisibility against such compressions and many kinds of signal processing after embedding copyright information to the original contents. This paper proposes an active watermarking that infect watermark to contents in the video decoding process using embedded infectious watermark and control signals from a video encoder side. To achieve this algorithm, we design a kernel based watermarking in video encoder side that is possible to recover the original contents and watermark in watermark detection procedure perfectly. And then, by reversible de-watermarking in video decoder side, we design the active watermark infection method using detected watermark and control signal. This means that our system can provide secure re-distributions of video contents without any quality degration and watermark bit error against transcoding or re-encoding processing. By experimental results, we confirmed that the embedded watermark was infected by video contents and codec perfectly without any declines of compression ratio and video quality.
Keywords
Infectious Information Hiding; Active video Watermarking; video Redistribution; copyright protection;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M.D. Swanson, B. Zhu, and A.H. Tewfik, "Multiresolution Scene-Based Cideo Water- Marking using Perceptual Models," IEEE J ournal on Selected Areas in Communications, Vol. 16, Issue 4, pp. 540-550, 1998.   DOI
2 C.V. Serdean, M.A. Ambroze, M. Tomlinson, and J.G. Wade, "DWT-based High-capacity Blind Video Watermarking, Invariant to Geometrical Attacks," IEEE Proc. Vision, Image and Signal Processing, Vol. 150, Issue 1, pp. 51-58, 2003.   DOI
3 Y. Wang and Al. Pearmain, "Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain," IEEE Trans. on Image Processing, Vol. 15, No. 6, pp. 1536-1543, 2006.   DOI
4 Jing Zhang, Anthony T.S. Ho, Gang Qiu, and Pina Marziliano, "Robust Video Watermarking of H.264/AVC," IEEE Trans. Circuits Sys. Video Tech., Vol. 54, No. 2, pp. 205-209, 2007.
5 윤지선, 이석환, 송윤철, 장봉주, 권기룡, 김민환, "MPEG-4 스케일러블 비디오 코딩 및 멀티미디어 트랜스코딩에 강인한 블라인드 비디오 워터마킹," 멀티미디어학회논문지, 제11권, 10호, pp. 1347-1358, 2008.   과학기술학회마을
6 A.M. Alattar, "Reversible Watermark using the Difference Expansion of A Generalized Integer Transform," IEEE Trans. Image Process., Vol. 13, No. 8, pp. 1147-1156, 2004.   DOI
7 B. Yang, M. Schmucker, C. Busch, X. Niu, and S. Sun, "Approaching Optimal Value Expansion for Reversible Watermarking," Proc. of the 7-th Workshops on Multi- media and Security, pp. 95-102, 2004.
8 B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, "Reversible Image Watermarking by Histogram Modification for Integer DCT Coefficients," Proc. of the IEEE 6th Workshop on Multimedia Signal Processing, pp. 143-146, 2004.
9 J.M. Zain, L.P. Baldwin, and M. Clarke, "Reversible Watermarking for Authentication of Dicom Images," Proc. of the 26th Annual International Conference of the Engineering in Medicine and Biology Society, pp. 3237-3240, 2004.
10 Xiao Zeng, Zhen-Yong Chen, Ming Chen, and Zhang Xiong, "Reversible Video Watermarking using Motion Estimation and Prediction error expansion," Journal of Information Science and Engineering, Vol. 27, pp 465-479, 2011.
11 Zhenyong Chen, Zhang Xiong, and Long Tang, "A Novel Scrambling Scheme for Digital Video Encryption," Proc. of Pacific-Rim Symposium on Image and Video Technology (PSIVT) , pp. 997-1006, 2006.
12 Zheng Liu and Xue Li, "Motion Vector Encryption in Multimedia Streaming," Proc. of 10Th international Conference of Multimedia Modelling Conference, pp. 64-71, 2004.
13 B. Furht and D. Kirovski, Multimedia Security Handbook, CRC Press LLC, 2004.
14 C. Shi and Bharat Bhargava, "A Fast MPEG Video Encryption Algorithm," Proc. of ACM Multimedia, pp. 81-88, 1998.
15 A. Shamir, "How to share a secret," Proc. of Communications of the ACM, Vol. 2, pp. 612-613, 1979.
16 Coding of audio-visual objects-Part 2: Visual, ISO/ IEC 14492-2 (MPEG-4 Visual) , ISO/IEC JTC 1, Version 1: 1999, Version 2: 2000, Version 3: 2004.
17 Advanced Video Coding for Generic Audiovisual Services, ITU-T Rec. H.264 and ISO/ IEC 14496-10 (MPEG-4 AVC) , ITU-T and ISO/ IEC JTC-1, Version 1: 2003, Version 2: 2004, Version 3: 2005, Version 4: 2005,Version 5 and Version 6: 2006, Version 7: 2007.
18 Jan Bormans and Keith Hill, MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11/N5231, 2002,
19 H. Schwarz, D. Marpe, and T Wiegand, "Overview of the Scalable Video Coding Extension of the H.264/AVC Standard," IEEE Trns. on Circuits and Systems for Video Technology, Vol. 17, pp. 1103-1120, 2007.   DOI   ScienceOn
20 http://www.bbc.co.uk/opensource/projects/dirac/, 2011.
21 http://www.xvid.org/, 2011.
22 Anthony Vetro, "Transcoding Scalable Coding and Standardized Metadata," 8th International Workshop of Visual Content Processing and Representation, Vol. 2849, pp. 15-16, 2003.
23 장봉주, 이석환, 권기룡, "생물학적 바이러스를 이용한 비디오 콘텐츠의 전염성 정보은닉 시스템 모델링," 전자공학회논문지, 제49권 CI 3호, pp. 34-45, 2012.   과학기술학회마을