Advertisement

Secret Sharing Based Video Watermark Algorithm for Multiuser

  • Shangqin Xiao
  • Hefei Ling
  • Fuhao Zou
  • Zhengding Lu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5450)

Abstract

A novel video watermark algorithm based on Shamir secret sharing scheme for multiusers is proposed. It divides the field of the host video signal into multisegments, and then splits the original watermark into corresponding number shares with the Shamir’s secret sharing algorithm. Each share of the watermark is embedded into the corresponding segment of the host video signal. In this scheme, only the user that has sufficient authorization can reveal the genuine watermark directly; other users could obtain shadow watermarks merely. Experimental results show the proposed watermarking scheme can offer good video quality and is robust against various degree attacks.

Keywords

Video watermarking Secret Sharing Robustness Shadow Watermark 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Delaigle, J.F., Devleeschouwer, C.: Human visual system features enabling watermarking. In: Proc of ICME 2002, Multimedia and Expo, vol. 2, pp. 489–492 (2002)Google Scholar
  2. 2.
    Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66(3), 283–302 (1998)CrossRefzbMATHGoogle Scholar
  3. 3.
    Simitopoulos, D., Tsaftaris, S.A.: Compressed-domain video watermarking of MPEG streams. In: Proc. of ICME 2002. Multimedia and Expo, vol. 1, pp. 569–572 (2002)Google Scholar
  4. 4.
    He, D., Sun, Q.: A RST resilient object-based video watermarking scheme. In: Proc of ICIP 2004. Image Processing, vol. 2, pp. 737–740 (2004)Google Scholar
  5. 5.
    Inoue, H., Miyazaki, A., Araki, T., Katsura, T.: A digital watermark method using the wavelet transform for video data. Circuits and Systems 4, 247–250 (1999)Google Scholar
  6. 6.
    Ejima, M., Miyazaki, A.: A wavelet-based watermarking for digital images and video. Image Processing 3, 678–681 (2000)Google Scholar
  7. 7.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Wang, S., Zheng, D., et al.: An Image Quality Evaluation Method Based on Digital Watermarking. Circuits and Systems for Video Technology 17(1), 98–105 (2007)CrossRefGoogle Scholar
  9. 9.
    Gaobo, Y.: Sun Xingming A Genetic Algorithm based Video Watermarking in the DWT Domain. Computational Intelligence and Security 2, 1209–1212 (2006)Google Scholar
  10. 10.
    Wu, Y.: Nonlinear collusion attack on a watermarking scheme for buyer authentication. Multimedia, IEEE Transactions 8(3), 626–629 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Shangqin Xiao
    • 1
  • Hefei Ling
    • 1
  • Fuhao Zou
    • 1
  • Zhengding Lu
    • 1
  1. 1.Department of Computer ScienceHuazhong University of Science and TechnologyWuhanChina

Personalised recommendations