Abstract
This paper presents a low complexity configurable semi-fragile watermarking scheme for content-based H.264/AVC authentication, which allows content-preserving manipulations such as video transcoding techniques, while it is very sensitive to content-changing and frame manipulations. A low cost spatial analysis is exploited to maximize robustness and lessen the incurred distortion. Invariant features are extracted from intra macroblocks, and frame index timing information constituting the content-based authentication codes are embedded/extracted into Quantized DCT (QDCT) coefficients in a Group of Pictures GOP-based fashion. The embedded watermark can be detected and verified by partially decoding intra and inter macroblocks without the prior knowledge of the original video or complete video decoding. Spatial and temporal tampering can be characterized and localized by comparing the extracted and re-generated feature-based watermarks. Experimental results demonstrate that the performance of the proposed scheme is indeed superb in terms of bit-rate and perceptual quality. Moreover, various types of attacks have been simulated and characterized.
Similar content being viewed by others
References
Ahmad I, Wei X, Sun Y, Zhang Y (2005) Video transcoding: an overview of various techniques and research issues. IEEE Trans Multimed 7(5):793–804
American National Standard for Telecommunications-Digital Transport of One-Way Video Signals-Parameters for Objective Performance Assessment (2003) Standard T1.801.03-003, vol. ANSI
Chen TY, Chen TH, Lin YT, Chang YC, Wang DJ (2008) H.264 video authentication based on semi-fragile watermarking. Proceedings of the 08th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp 659–662
Chen YH, Huang HC (2014) Coevolutionary genetic watermarking for owner identification. . doi:10.1007/s00521-014-1615-z
Furht B, Marques O (2003) Handbook of video databases: design and applications. CRC Press, Boca Raton
Golikeri A, Nasiopoulos P, Wang ZJ (2007) Robust digital video watermarking scheme for H.264 advanced video coding standard. J Electron Imaging 16(4):043008
Horng SJ, Farfoura ME, Fan P, Wang X, Li T, Guo JM (2014) A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimed Tools Appl 72(3):2469-2495
Horowitz M, Joch A, Kossentini F, Hallapuro A (2003) H.264/AVC baseline profile decoder complexity analysis. IEEE Trans Circuits Syst Video Technol 13(7):704–716
Huang HC, Pan JS, Huang YH, Wang FH, Huang KC (2007) Progressive watermarking techniques using genetic algorithms. Circuits Syst Signal Process 26(5):671–687
ISO/IEC 14496-10 and ITU-T Rec. H.264, Advanced video coding (2003)
Kapotas SK, Skodras AN (2009) Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams. J Real-Time Image Proc 4(1):33–41
Kim DW, Choi YG, Kim HS, Yoo JS, Choi HJ, Seo YH (2010) The problems in digital watermarking into intra-frames of H.264/AVC. Image Vis Comput 28(8):1220–1228
Koz A, Alatan AA (2008) Oblivious spatio-temporal watermarking of digital video by exploiting the human visual system. IEEE Trans Circuits Syst Video Technol 18(3):326–337
Kuo WC (2013) Image hiding by square fully exploiting modification directions. J Inf Hiding Multimed Signal Process 4(3):128–137
Li L, Li S, Zhu H, Chu SC, Roddick JF, Pan JS (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimedia Signal Process 4(1):46–56
Lin CY, Chang SF (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153–168
Mansouri A, Aznaveh AM, Torkamani-Azar F, Kurugollu F (2010) A low complexity video watermarking in H.264 compressed domain. IEEE Trans Inf Forensics Secur 5(4):649–657
Noorkami M, Mersereau RM (2007) A framework for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Trans Inf Forensics Secur 2(1):14–23
Noorkami M, Mersereau RM (2008) Digital video watermarking in P-frames with controlled video bit-rate increase. IEEE Trans Inf Forensics Secur 3(3):441–455
Proefrock D, Richter H, Schlauweg M, Mueller E (2005) H.264/AVC video authentication using skipped macroblocks for an erasable watermark. Proc SPIE 5960:1480–1489
Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200
Qiu G, Marziliano P, Ho ATS, He D, Sun Q (2006) A hybrid watermarking scheme for H.264/AVC video. Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), vol. 4, pp 2353–2356
Ramaswamy N, Rao KR (2006) Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. NOSSDAV’06, Newport, Rhode Island, USA
Reference Software JM, J.V.T., version 14.0, http://iphome.hhi.de/suehring/tml/download/
Richardson IE (2004) H.264 and MPEG-4 Video Compression, Wiley
Sun QB, He DJ, Tian Q (2006) A secure and robust authentication scheme for video transcoding. IEEE Trans Circuits Syst Video Technol 16(10):1232–1244
Wang Z, Bovik AC, Sheikh HR, Simoncell EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Xu D, Wang R, Wang J (2011) A novel watermarking scheme for H.264/AVC video authentication. Signal Process Image Commun. doi:10.1016/j.image.2011.04.008
Zhu BB, Swanson MD, Tewfik AH (2004) When seeing isn’t believing. IEEE Signal Process Mag 21(2):40–49
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Farfoura, M.E., Horng, SJ., Guo, JM. et al. Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed Tools Appl 75, 7465–7493 (2016). https://doi.org/10.1007/s11042-015-2672-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2672-8