A Video Watermarking Procedure Based on XML Documents

  • Franco Frattolillo
  • Salvatore D’Onofrio
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3617)


This paper presents a watermarking procedure for MPEG-2 videos based on the use of XML documents. The procedure enables the copyright owner to insert a distinct watermark identifying the buyer within the distributed videos. To increase the security level of the procedure, the watermark is repeatedly embedded into some selected I-frames in the DCT domain at different frequencies and by exploiting both block classification techniques and perceptual analysis. The embedded watermark is then extracted from a video according to the information contained in a protected XML document associated to the video.


Security Level Watermark Scheme Copyright Protection Watermark Extraction Perceptual Analysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Cox, I., Bloom, J., Miller, M.: Digital Watermarking: Principles & Practice. Morgan Kaufmann, San Francisco (2001)Google Scholar
  2. 2.
    Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Processing Magazine 21, 28–39 (2004)CrossRefGoogle Scholar
  3. 3.
    Trappe, W., Wu, M., et al.: Anti-collusion fingerprinting for multimedia. IEEE Trans. on Signal Processing 41, 1069–1087 (2003)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Lei, C.L., Yu, P.L., et al.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. on Image Proces. 13, 1618–1626 (2004)CrossRefGoogle Scholar
  5. 5.
    Wu, M., Trappe, W., et al.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21, 15–27 (2004)Google Scholar
  6. 6.
    Chung, T.Y., Hong, M.S., et al.: Digital watermarking for copyright protection of MPEG2 compressed video. IEEE Trans. on Consumer Electr. 44, 895–901 (1998)CrossRefGoogle Scholar
  7. 7.
    Wang, Y., Ostermann, J., Zhang, Y.: Video Processing and Communications. Prentice-Hall, Englewood Cliffs (2002)Google Scholar
  8. 8.
    Kim, S.W., Suthaharan, S.: An entropy masking model for multimedia content watermarking. In: Procs of the 37th Hawaii Intl Conference on System Sciences, p. 70182.2. IEEE Computer Society, Los Alamitos (2004) Google Scholar
  9. 9.
    Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Allebach, J.P., Rogowitz, B.E. (eds.) Human Vision, Visual Processing and Digital Display IV, S. Jose, CA, USA. SPIE Procs., vol. 1913, pp. 202–216 (1993)Google Scholar
  10. 10.
    Wolfgang, R.B., et al.: Perceptual watermarks for digital images and video. Procs of the IEEE 87, 1108–1126 (1999)CrossRefGoogle Scholar
  11. 11.
    Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. on Infor. Theory 44, 1897–1905 (1998)zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Franco Frattolillo
    • 1
  • Salvatore D’Onofrio
    • 1
  1. 1.Research Centre on Software Technology, Department of EngineeringUniversity of SannioItaly

Personalised recommendations