Abstract
This paper proposes an effective technique which can detect malicious manipulations under video lossy compressing data (e.g. H.263) and still-image lossy compressing data (e.g. JPEG). A block-classification strategy is used to divide DCT-blocks into the flat-blocks and the normal-blocks. Simple features of the both blocks are embedded invisibly. For later authentication, the watermarked frame is then put back into the compressed bit-streams.
The proposed method can detect and locate alterations of the tampered frame whether it is stored again into original bit-streams or not. This goal is for detecting tamper area and surviving most video lossy compression. Experimental results show that the proposed technique can detect various tampered areas and hence provides an effective image authentication for lossy compressed image and video in DVR (Digital Video Recorder) System.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Li, K.-F., Chen, T.-S., Wu, S.-C.: Image tamper detection and recovery system based on discrete wavelet transformation. In: IEEE Pacific Rim Conference on Communications, Computers and signal Processing, vol. 1, pp. 164–167 (2001)
Wu, M., Liu, B.: Watermarking for Image Authentication. In: Proceedings of IEEE International Conference on Image Processing, Chicago, Illinois, USA, October 4-7, vol. 2, pp. 437–441 (1998)
Chung, T.-Y., Hong, M.-S., Oh, Y.-N., Shin, D.-H., Park, S.-H.: Digital Watermarking for Copyright Protections of MPEG2 Compressed Video. IEEE Trans. on Consumer Electronics 44(3), 895–901 (1998)
Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(13) (2000)
Lin, C.-Y., Chang, S.-F.: Issues and Solutions for Authenticating MPEG Video. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents, EI 1999, San Jose, USA, January 1999, vol. 3657(06) (1999)
Lin, C.-Y., Chang, S.-F.: A Robust Image Authentication Method Surviving JPEG Lossy Compression. In: Proc. IS&T/SPIE, San Jose (January 1998)
Lin, C.-Y., Chang, S.-F.: A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation. CU/CTR Technical Report 486-97-19 (December 1997)
Marvel, L.M., Hartwig, G., Boncelet Jr., C.G.: Compression Compatible Fragile and Semi-Fragile Tamper Detection. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(12) (2000)
Delp, E.J., Podilchuk, C.I., Lin, E.T.: Detection of Image Alterations using Semi- Fragile Watermarks. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(14) (2000)
Memon, N.D., Vora, P., Yeung, M.: Distortion Bound Authentication Techniques. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(15) (2000)
Toyokawa, K., Morimoto, N., Tonegawa, S., Kamijo, K., Koide, A.: Secure Digital Photograph Handling with Watermarking Technique in Insurance Claim Process. In: SPIE International Conf. on Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, USA, January 2000, vol. 3971(42) (2000)
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceedings of 1999 IEEE International Conference on Image Processing, October 1999, vol. 3, pp. 792–796 (1999)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. In: Proc. IEEE Int. Conf. on Image Processing, atabases, San Jose, January 1998, vol. 3, pp. 243–246 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, TY., Wang, DJ., Chiu, CC., Huang, CH. (2005). Apply Semi-fragile Watermarking to Authentication of Compressed Video Data. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_163
Download citation
DOI: https://doi.org/10.1007/11552451_163
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28895-4
Online ISBN: 978-3-540-31986-3
eBook Packages: Computer ScienceComputer Science (R0)