Skip to main content

A Collusion-Resistant Video Watermarking Scheme

  • Conference paper
Information Hiding (IH 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4437))

Included in the following conference series:

Abstract

A video watermarking scheme is proposed in this paper using the concept of the secret sharing scheme. The owner’s mark is split into twin shares, where the shares are inserted into the video frames in the spatial domain in a simple manner. The detection algorithm uses a linear function applied to the twin shares to reconstruct the secret. This makes the watermarked video sequence robust against pirate attacks, such as frame averaging and frame swapping. Due to the compatibility of the exploited secret sharing scheme to geometrical distortions, the watermarking system is also robust to this kind of processing schemes. On account of insertion of various marks into different frames, which are linearly related, the watermarked sequence is robust to collusion attack that is a major concern in the field of video watermarking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Doer, G., Dugelay, J.L.: A guide tour of video watermarking. In: Signal processing: Image communications, vol. 18, pp. 263–282. Elsevier Science, North-Holland, Amsterdam (2003)

    Google Scholar 

  2. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  3. Voloshynovskiy, S., Herrigel, A.N.B., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 212–236. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Perona, P., Malik, J.: Scale-space and edge detection using anisotropic diffusion. IEEE Transactions on Pattern Analysis and Machine Intelligence 12(7), 629–639 (1990)

    Article  Google Scholar 

  5. Torkamani-Azar, F., Tait, K.E.: Image recovery using the anisotropic diffusion equation. IEEE Trans. on Image Processing 5(11), 1573–1578 (1996)

    Article  Google Scholar 

  6. Su, K., Kundur, D., Hatzinakos, D.: A novel approach to collusion-resistance video watermarking. In: Proceedings of SPIE Security of Watermarking of Multimedia contents IV. San Jose, CA, pp. 491–502 (2002)

    Google Scholar 

  7. Mobasseri, B.G.: Exploring CDMA for watermarking of digital video. In: Proceedings of the SPIE 3657, pp. 96–102 (1999)

    Google Scholar 

  8. Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on selected areas in communications 16(4), 525–539 (1998)

    Article  Google Scholar 

  9. Houmansadr, A., Ghaemmaghami, S.: A digital image watermarking scheme based on the visual cryptography. In: Proc. 3rd Int’l Symposium on Telecommunications, pp. 843–848 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Houmansadr, A., Ghaemmaghami, S. (2007). A Collusion-Resistant Video Watermarking Scheme. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics