[go: up one dir, main page]

Skip to main content

Apply Semi-fragile Watermarking to Authentication of Compressed Video Data

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

  • 1040 Accesses

Abstract

This paper proposes an effective technique which can detect malicious manipulations under video lossy compressing data (e.g. H.263) and still-image lossy compressing data (e.g. JPEG). A block-classification strategy is used to divide DCT-blocks into the flat-blocks and the normal-blocks. Simple features of the both blocks are embedded invisibly. For later authentication, the watermarked frame is then put back into the compressed bit-streams.

The proposed method can detect and locate alterations of the tampered frame whether it is stored again into original bit-streams or not. This goal is for detecting tamper area and surviving most video lossy compression. Experimental results show that the proposed technique can detect various tampered areas and hence provides an effective image authentication for lossy compressed image and video in DVR (Digital Video Recorder) System.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Li, K.-F., Chen, T.-S., Wu, S.-C.: Image tamper detection and recovery system based on discrete wavelet transformation. In: IEEE Pacific Rim Conference on Communications, Computers and signal Processing, vol. 1, pp. 164–167 (2001)

    Google Scholar 

  2. Wu, M., Liu, B.: Watermarking for Image Authentication. In: Proceedings of IEEE International Conference on Image Processing, Chicago, Illinois, USA, October 4-7, vol. 2, pp. 437–441 (1998)

    Google Scholar 

  3. Chung, T.-Y., Hong, M.-S., Oh, Y.-N., Shin, D.-H., Park, S.-H.: Digital Watermarking for Copyright Protections of MPEG2 Compressed Video. IEEE Trans. on Consumer Electronics 44(3), 895–901 (1998)

    Article  Google Scholar 

  4. Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(13) (2000)

    Google Scholar 

  5. Lin, C.-Y., Chang, S.-F.: Issues and Solutions for Authenticating MPEG Video. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents, EI 1999, San Jose, USA, January 1999, vol. 3657(06) (1999)

    Google Scholar 

  6. Lin, C.-Y., Chang, S.-F.: A Robust Image Authentication Method Surviving JPEG Lossy Compression. In: Proc. IS&T/SPIE, San Jose (January 1998)

    Google Scholar 

  7. Lin, C.-Y., Chang, S.-F.: A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation. CU/CTR Technical Report 486-97-19 (December 1997)

    Google Scholar 

  8. Marvel, L.M., Hartwig, G., Boncelet Jr., C.G.: Compression Compatible Fragile and Semi-Fragile Tamper Detection. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(12) (2000)

    Google Scholar 

  9. Delp, E.J., Podilchuk, C.I., Lin, E.T.: Detection of Image Alterations using Semi- Fragile Watermarks. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(14) (2000)

    Google Scholar 

  10. Memon, N.D., Vora, P., Yeung, M.: Distortion Bound Authentication Techniques. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(15) (2000)

    Google Scholar 

  11. Toyokawa, K., Morimoto, N., Tonegawa, S., Kamijo, K., Koide, A.: Secure Digital Photograph Handling with Watermarking Technique in Insurance Claim Process. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(42) (2000)

    Google Scholar 

  12. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceedings of 1999 IEEE International Conference on Image Processing, October 1999, vol. 3, pp. 792–796 (1999)

    Google Scholar 

  13. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. In: Proc. IEEE Int. Conf. on Image Processing, atabases, San Jose, January 1998, vol. 3, pp. 243–246 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, TY., Wang, DJ., Chiu, CC., Huang, CH. (2005). Apply Semi-fragile Watermarking to Authentication of Compressed Video Data. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_163

Download citation

  • DOI: https://doi.org/10.1007/11552451_163

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics