Advertisement

Traitor Tracing After Visible Watermark Removal

  • Hannes MareenEmail author
  • Johan De Praeter
  • Glenn Van Wallendael
  • Peter Lambert
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11378)

Abstract

Watermarks are often used to protect copyright-protected videos from illegal re-distribution. More specifically, a unique watermark that represents the receiver’s identifier is embedded into the video. In this way, malicious users can be identified when they leak their received version of the video. However, when the watermark is embedded as visible text in the video, it is easy for digital pirates to delete it such that they can no longer be identified. Therefore, copyright owners will benefit from a technique that allows the detection of a visible watermark when it is removed. This paper demonstrates how a visible watermark indirectly generates imperceptible variations over the entire video. As such, these variations in the non-watermarked area can be used as an alternative watermark representation, and thus enable watermark detection even after watermark removal. The experimental results prove that the watermark can be detected as long as the quality of the watermarked video is not significantly reduced, especially if the originally-distributed watermarked video has a high quality. Moreover, the watermark should be embedded into a video with sufficient motion. In conclusion, the proposed technique enables copyright-owners to identify pirates when they illegally distribute visibly-watermarked videos, even when the watermarked area is removed.

Keywords

Video security Visible watermarking Traitor tracing 

References

  1. 1.
    Asikuzzaman, M., Pickering, M.R.: An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. (2017).  https://doi.org/10.1109/TCSVT.2017.2712162CrossRefGoogle Scholar
  2. 2.
    Bossen, F.: Common test conditions and software reference configurations. Technical report, JCTVC-L1100, ITU-T Joint Collaborative Team on Video Coding (JCT-VC), January 2013Google Scholar
  3. 3.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2008)Google Scholar
  4. 4.
    Feng, B., Weng, J., Lu, W.: Improved algorithms for robust histogram shape-based image watermarking. In: Kraetzer, C., Shi, Y.Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 275–289. Springer, Berlin (2017).  https://doi.org/10.1007/978-3-319-64185-0_21CrossRefGoogle Scholar
  5. 5.
    Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)CrossRefGoogle Scholar
  6. 6.
    Hu, Y., Kwong, S., Huang, J.: Using invisible watermarks to protect visibly watermarked images. In: Proceedings of IEEE International Symposium Circuits Systems (ISCAS). vol. 5, pp. V-584–V-587, May 2004Google Scholar
  7. 7.
    Huang, C.H., Wu, J.L.: Inpainting attacks against visible watermarking schemes. In: Proceedings of SPIE, vol. 4314 (2001).  https://doi.org/10.1117/12.435421
  8. 8.
    Huang, C.H., Wu, J.L.: Attacking visible watermarking schemes. In: Proceedings of IEEE International Conference on Multimedia Computing Systems (ICMCS), vol. 6, no. 1, pp. 16–30, Feburary 2004.  https://doi.org/10.1109/TMM.2003.819579CrossRefGoogle Scholar
  9. 9.
    Kankanhalli, M.S., Ramakrishnan, K.R.: Adaptive visible watermarking of images. In: Proceedings of IEEE International Conference on Multimedia Computing Systems (ICMCS), vol. 1, pp. 568–573, July 1999.  https://doi.org/10.1109/MMCS.1999.779263
  10. 10.
    Mareen, H., De Praeter, J., Van Wallendael, G., Lambert, P.: A novel video watermarking approach based on implicit distortions. IEEE Trans. Consum. Electron. 64(3), 250–258 (2018).  https://doi.org/10.1109/TCE.2018.2852258CrossRefGoogle Scholar
  11. 11.
    Mohanty, S.P., Ramakrishnan, K.R., Kankanhalli, M.: A dual watermarking technique for images. In: Proceedings of ACM International Conference on Multimedia, pp. 49–51. ACM, New York (1999).  https://doi.org/10.1145/319878.319891
  12. 12.
    Siddique, H.: Game of thrones fifth season episodes leaked online. The Guardian, 12 April 2015. https://www.theguardian.com/tv-and-radio/2015/apr/12/game-of-thrones-fifth-season-episodes-leaked-online
  13. 13.
    Sullivan, G.J., Ohm, J.R., Han, W.J., Wiegand, T.: Overview of the high efficiency video coding (HEVC) standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649–1668 (2012).  https://doi.org/10.1109/TCSVT.2012.2221191CrossRefGoogle Scholar
  14. 14.
    Tew, Y., Wong, K.: An overview of information hiding in H.264/AVC compressed video. IEEE Trans. Circuits Syst. Video Technol. 24(2), 305–319 (2014).  https://doi.org/10.1109/TCSVT.2013.2276710CrossRefGoogle Scholar
  15. 15.
    Wong, P.W.: A watermark for image integrity and ownership verification. In: Proceedings of IS&TS PICS, pp. 374–379. Society for Imaging Science & Tehnology (1998)Google Scholar
  16. 16.
    Yang, G., Qi, W., Li, X., Guo, Z.: Improved reversible visible watermarking based on adaptive block partition. In: Kraetzer, C., Shi, Y.Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 303–317. Springer, Berlin (2017).  https://doi.org/10.1007/978-3-319-64185-0_23CrossRefGoogle Scholar
  17. 17.
    Zhang, X., Wang, Z.J.: Correlation-and-bit-aware multiplicative spread spectrum embedding for data hiding. In: Proceedings of IEEE International Workshop Information Forensics Security (WIFS), pp. 186–190, November 2013.  https://doi.org/10.1109/WIFS.2013.6707816

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hannes Mareen
    • 1
    Email author
  • Johan De Praeter
    • 1
  • Glenn Van Wallendael
    • 1
  • Peter Lambert
    • 1
  1. 1.Ghent University – imec, IDLab, Department of Electronics and Information SystemsGhentBelgium

Personalised recommendations