A novel robust video fingerprinting-watermarking hybrid scheme based on visual secret sharing
- 629 Downloads
In this paper, a novel robust Video Fingerprinting-Watermarking Hybrid Scheme (VFWHS) is proposed by applying fingerprinting technique to zero-watermarking algorithm for enhancing the performance of video Digital Rights Management (DRM). In the VFWHS, the content-based feature of the original video is extracted by an improved 3D-DCT fingerprinting algorithm and stored in a video fingerprint database for retrieval, while the watermark-based feature of the watermark image is extracted by a 2D-DCT fingerprinting algorithm for copyright identification. According to the visual secret sharing scheme, a master share is generated from the content-based feature while an ownership share is generated from the master share and the watermark-based feature. The ownership share is then stored in an ownership database. When a video is queried, its content-based features are generated, and a process of similarity measurement is executed to obtain the matched feature with the relevant ownership share. The copyright ownership can be identified by stacking the master share generated from the queried video with the relevant ownership share. Our experimental results demonstrate that the VFWHS can obtain the relevant ownership share precisely for reliable copyright identification in the mass content processing which cannot be achieved by the zero-watermarking algorithms, and provide explicit copyright identification to avoid possible copyright dissension which cannot be achieved by the fingerprinting algorithms.
KeywordsDigital rights management Visual secret sharing Fingerprinting Zero-watermarking 3D-DCT
The authors would like to thanks Mr. Dennis D. Zhu for the kind support and valuable comments on this paper. This work is supported by the 973 Program of China under Grant 2012CB315904; and Shenzhen Engineering Laboratory for Broadband Wireless Network Security.
- 1.Chan CS, Chang CC, Vo HP (2012) A user-friendly image sharing scheme using JPEG-LS median edge predictor. JIHMSP 3(4):340–351Google Scholar
- 11.Lee SJ, Jung SH (2001) A survey of watermarking techniques applied to multimedia. In Proc. of Int. Symp. Industrial electronics (ISIE), pp 272–277Google Scholar
- 13.Lian S, Nikolaidis N, Sencar HT (2010) Content-based video copy detection - a survey. In: Sencar HT, Velastin S, Nikolaidis N, Lian S (eds) Intelligent multimedia analysis for security applications. Springer-Verlag Berlin and Heidelberg GmbH & Co. K, pp 253–273Google Scholar
- 15.Naor M, Shamir A (1995) Visual cryptography. In: advances in cryptology-EUROCRYPT’94, pp 1–12Google Scholar
- 16.Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: Int. Conf. on industrial informatics (INDIN), pp 709–716Google Scholar
- 20.Sun Z, Zhu Y, Liu X, Zhang L (2013) A robust video fingerprinting algorithm based on centroid of spatio-temporal gradient orientations. KSII Trans Internet Inf 7(11):2754–2768Google Scholar
- 23.Wang ZH, Pizzolatti MS, Chang CC (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69Google Scholar