Skip to main content
Log in

Low complexity semi-fragile watermarking scheme for H.264/AVC authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a low complexity configurable semi-fragile watermarking scheme for content-based H.264/AVC authentication, which allows content-preserving manipulations such as video transcoding techniques, while it is very sensitive to content-changing and frame manipulations. A low cost spatial analysis is exploited to maximize robustness and lessen the incurred distortion. Invariant features are extracted from intra macroblocks, and frame index timing information constituting the content-based authentication codes are embedded/extracted into Quantized DCT (QDCT) coefficients in a Group of Pictures GOP-based fashion. The embedded watermark can be detected and verified by partially decoding intra and inter macroblocks without the prior knowledge of the original video or complete video decoding. Spatial and temporal tampering can be characterized and localized by comparing the extracted and re-generated feature-based watermarks. Experimental results demonstrate that the performance of the proposed scheme is indeed superb in terms of bit-rate and perceptual quality. Moreover, various types of attacks have been simulated and characterized.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Ahmad I, Wei X, Sun Y, Zhang Y (2005) Video transcoding: an overview of various techniques and research issues. IEEE Trans Multimed 7(5):793–804

    Article  Google Scholar 

  2. American National Standard for Telecommunications-Digital Transport of One-Way Video Signals-Parameters for Objective Performance Assessment (2003) Standard T1.801.03-003, vol. ANSI

  3. Chen TY, Chen TH, Lin YT, Chang YC, Wang DJ (2008) H.264 video authentication based on semi-fragile watermarking. Proceedings of the 08th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp 659–662

  4. Chen YH, Huang HC (2014) Coevolutionary genetic watermarking for owner identification. . doi:10.1007/s00521-014-1615-z

  5. Furht B, Marques O (2003) Handbook of video databases: design and applications. CRC Press, Boca Raton

    Google Scholar 

  6. Golikeri A, Nasiopoulos P, Wang ZJ (2007) Robust digital video watermarking scheme for H.264 advanced video coding standard. J Electron Imaging 16(4):043008

    Article  Google Scholar 

  7. Horng SJ, Farfoura ME, Fan P, Wang X, Li T, Guo JM (2014) A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimed Tools Appl 72(3):2469-2495

  8. Horowitz M, Joch A, Kossentini F, Hallapuro A (2003) H.264/AVC baseline profile decoder complexity analysis. IEEE Trans Circuits Syst Video Technol 13(7):704–716

    Article  Google Scholar 

  9. Huang HC, Pan JS, Huang YH, Wang FH, Huang KC (2007) Progressive watermarking techniques using genetic algorithms. Circuits Syst Signal Process 26(5):671–687

    Article  MATH  Google Scholar 

  10. ISO/IEC 14496-10 and ITU-T Rec. H.264, Advanced video coding (2003)

  11. Kapotas SK, Skodras AN (2009) Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams. J Real-Time Image Proc 4(1):33–41

    Article  Google Scholar 

  12. Kim DW, Choi YG, Kim HS, Yoo JS, Choi HJ, Seo YH (2010) The problems in digital watermarking into intra-frames of H.264/AVC. Image Vis Comput 28(8):1220–1228

    Article  Google Scholar 

  13. Koz A, Alatan AA (2008) Oblivious spatio-temporal watermarking of digital video by exploiting the human visual system. IEEE Trans Circuits Syst Video Technol 18(3):326–337

    Article  Google Scholar 

  14. Kuo WC (2013) Image hiding by square fully exploiting modification directions. J Inf Hiding Multimed Signal Process 4(3):128–137

    Google Scholar 

  15. Li L, Li S, Zhu H, Chu SC, Roddick JF, Pan JS (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimedia Signal Process 4(1):46–56

    Google Scholar 

  16. Lin CY, Chang SF (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153–168

    Article  MathSciNet  Google Scholar 

  17. Mansouri A, Aznaveh AM, Torkamani-Azar F, Kurugollu F (2010) A low complexity video watermarking in H.264 compressed domain. IEEE Trans Inf Forensics Secur 5(4):649–657

    Article  MATH  Google Scholar 

  18. Noorkami M, Mersereau RM (2007) A framework for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Trans Inf Forensics Secur 2(1):14–23

    Article  Google Scholar 

  19. Noorkami M, Mersereau RM (2008) Digital video watermarking in P-frames with controlled video bit-rate increase. IEEE Trans Inf Forensics Secur 3(3):441–455

    Article  Google Scholar 

  20. Proefrock D, Richter H, Schlauweg M, Mueller E (2005) H.264/AVC video authentication using skipped macroblocks for an erasable watermark. Proc SPIE 5960:1480–1489

    Google Scholar 

  21. Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200

    Article  Google Scholar 

  22. Qiu G, Marziliano P, Ho ATS, He D, Sun Q (2006) A hybrid watermarking scheme for H.264/AVC video. Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), vol. 4, pp 2353–2356

  23. Ramaswamy N, Rao KR (2006) Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. NOSSDAV’06, Newport, Rhode Island, USA

  24. Reference Software JM, J.V.T., version 14.0, http://iphome.hhi.de/suehring/tml/download/

  25. Richardson IE (2004) H.264 and MPEG-4 Video Compression, Wiley

  26. Sun QB, He DJ, Tian Q (2006) A secure and robust authentication scheme for video transcoding. IEEE Trans Circuits Syst Video Technol 16(10):1232–1244

    Article  Google Scholar 

  27. Wang Z, Bovik AC, Sheikh HR, Simoncell EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  28. Xu D, Wang R, Wang J (2011) A novel watermarking scheme for H.264/AVC video authentication. Signal Process Image Commun. doi:10.1016/j.image.2011.04.008

    Google Scholar 

  29. Zhu BB, Swanson MD, Tewfik AH (2004) When seeing isn’t believing. IEEE Signal Process Mag 21(2):40–49

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahmoud E. Farfoura.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farfoura, M.E., Horng, SJ., Guo, JM. et al. Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed Tools Appl 75, 7465–7493 (2016). https://doi.org/10.1007/s11042-015-2672-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2672-8

Keywords

Navigation