Advertisement

Watermarking Streaming Video: The Temporal Synchronization Problem

  • Edward J. Delp
  • Eugene T. Lin
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA, volume 1)

Summary

This chapter examines the problems with temporal synchronization in video watermarking and describes a new method for efficient synchronization and resynchronization. In our method, efficient synchronization is achieved by designing temporal redundancy in the structure of the watermark. Temporal redundancy allows the watermark detector to establish and maintain synchronization without performing an extensive search in the watermark key space. Our method does not use synchronization templates that may be subject to attack and increase the visibility of the watermark. Another advantage of our technique is that the watermark structure is video-dependent, which enhances security.

The technique is implemented using a spatial-domain watermark on uncompressed video and a finite state machine watermark key generator. The implementation illustrates the effectiveness of using temporal redundancy for synchronization, and is shown to be resilient to desynchronization attacks such as frame dropping, frame insertion, local frame transposition, and frame averaging. Our method for synchronization is independent of the embedding method and can be used with a wide class of watermark embedding and detection techniques, including those for other time-varying signals such as digital audio.

Keywords

Side Information Queue Size Watermark Embedder Watermark Technique Frame Average 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., 66(3):283–301 (1998).zbMATHCrossRefGoogle Scholar
  2. [2]
    I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., 6(12):1673–1687 (1997).CrossRefADSGoogle Scholar
  3. [3]
    R. Wolfgang, C. Podilchuk, and E. Delp, “Perceptual watermarks for digital images and video,” Proc. IEEE 87(7):1108–1112 (1999).CrossRefGoogle Scholar
  4. [4]
    F. Petitcolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems,” Proceedings of the Second International Workshop in Information Hiding, April 14–17, 1998, pp. 218–238.Google Scholar
  5. [5]
    G. Braudaway and F. Mintzer, “Automatic recovery of invisible image watermarks from geometrically distorted images,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 24–26, 2000, pp. 74–81.ADSGoogle Scholar
  6. [6]
    E.T. Lin, C.I. Podilchuk, T. Kalker, and E. J. Delp, “Streaming video and rate scalable compression: What are the challenges for watermarking?,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents III, San Jose, CA, January 22–25, 2001, pp. 116–127.Google Scholar
  7. [7]
    E. Lin, G. Cook, P. Salama, and E. Delp, “An overview of security issues in streaming video,” Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV, April 2–4, 2001, pp. 345–348.Google Scholar
  8. [8]
    A. Eskicioglu and E. Delp, “An overview of multimedia content protection in consumer electronics devices,” Signal Process. Image Commun., 16:681–699 (2001).CrossRefGoogle Scholar
  9. [9]
    I. Cox, M. Miller, and J. Bloom, Digital Watermarking, (Morgan Kauffman Publishing, San Fransisco, 2002).zbMATHGoogle Scholar
  10. [10]
    F. Deguillaume, G. Csurka, J. O’Ruanaidh, and T. Pun, “Robust 3D DFT video watermarking,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, January 25–27, 1999, pp. 113–124.ADSGoogle Scholar
  11. [11]
    A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, “The watermark template attack,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, January 22–25, 2001, pp. 394–405.ADSGoogle Scholar
  12. [12]
    T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A video watermarking system for broadcast monitoring,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, January 25–27, 1999, pp. 103–112.ADSGoogle Scholar
  13. [13]
    M. Holliman, W. Macy, and M. Yeung, “Robust frame-dependent video watermarking,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 24–26, 2000, pp. 186–197.ADSGoogle Scholar
  14. [14]
    B. Mobasseri and A. Evans, “Content-dependent video authentication by self-watermarking in color space,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, January 22–25, 2001, pp. 35–44.ADSGoogle Scholar
  15. [15]
    G. Langelaar and R. Lagendijk, “Optimal differential energy watermarking of DCT encoded images and video,” IEEE Trans. Image Process., 10(1):148–158 (2001).zbMATHCrossRefADSGoogle Scholar
  16. [16]
    E. Lin and E. Delp, “Temporal Synchronization in Video Watermarking-Further Studies,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara, CA, January, 2003.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • Edward J. Delp
    • 1
  • Eugene T. Lin
    • 1
  1. 1.School of Electrical and Computer EngineeringPurdue UniversityWest LafayetteUSA

Personalised recommendations