The Digital Video Frame Obfuscation Method in Consideration of Human Visual System for Intellectual Property Protection and Authentication

  • Heehyung Bu
  • Jonghwa Kim
  • Sungho Kim
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 301)


This paper is to propose the digital video frame obfuscation method for intellectual property protection and authentication by using the DC component of an intra frame and the motion vector of an inter frame at digital video encoding. The proposed method is based on characteristics of the HVS (human visual system) which is sensitive at a low frequency and a middle frequency. This method makes a video signal distorted, so that the video is normally displayed only when a suitable authentication signal is used.


Digital video frame obfuscation Intellectual property protection Authentication signal Human visual system 


  1. 1.
    Lee CR (2002) Digital rights management. J TTA 82:91–94Google Scholar
  2. 2.
    Park SH, Choi HJ, Seo YH, Kim DW (2005) Ciphering scheme and hardware implementation for mpeg-based image/video security. J Inst Electron Eng Korea 42(SP 2):27–36Google Scholar
  3. 3.
    Liu F, König H (2010) A survey of video encryption algorithms. Comput Secur 29(1):3–15CrossRefGoogle Scholar
  4. 4.
    Langelaar GC, Lagendijk RL, Biemond J (1998) Real-time labeling of mpeg-2 compressed video. J Vis Commun Image Represent 9(4):256–270CrossRefGoogle Scholar
  5. 5.
    Menezes Alfred J, Van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca RatonzbMATHGoogle Scholar
  6. 6.
    Golomb SW (1967) Shift register sequences. Holden-Day, San FranciscozbMATHGoogle Scholar
  7. 7.
    ISO/IEC 14496-2:2001(2001) Information technology: coding of audio-visual objects—Part2: visual, ISO/IEC JTC1/SC29/WG11Google Scholar
  8. 8.
  9. 9.
    Fibush DK (1997) Practical application of objective picture quality measurements. In: IBC97 pp 123–135, International Broadcast UnionGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Department of Computer EngineeringMokpo National UniversityJeonnamSouth Korea
  2. 2.Department of Computer EngineeringKyungpook National UniversityDeaguSouth Korea

Personalised recommendations