Abstract
A problem often raised by the availability of increasingly powerful signal processing tools is the lost of credibility of digital images and video sequences, due to the ease of modifying their content without leaving any visible traces of the modification. Such a problem assumes an outstanding importance in Advanced Video-based Surveillance (AVS) applications, where video sequences virtually have no value as proofs in front of a court of law, since doubts would always exist about the possibility that they had been tampered to intentionally incriminate or exculpate the defendant.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B. Schneier, “Applied Cryptography”, John Wiley and Sons, 1994.
G. L. Friedman, “The trustworthy digital camera: restoring credibility to the photographic image,” IEEE Trans. Consum. Electron., vol. 39, pp. 905–910, Nov. 1993.
F. Mintzer, G. W. Braudaway, and M. M. Yeung, “Effective and ineffective digital watermarks,” in Proc. ICIP’97, IEEE Int. Conf. on Image Processing, Santa Barbara, CA, October 1997, vol. III, pp. 223–226.
A. Piva, M. Barni, F. Bartolini, V. Cappellini, “Application-driven requirements for digital watermarking technology”, in Technologies for the Information Society: Developments and Opportunities, J.Y. Roger et al. (eds): Proceedings of EMMSEC 98, European Multimedia, Mircoprocessor System and Electronic Commerce Conference and Exhibition, IOS Press, pp.513–520, 28-30 September 1998.
A. Piva, M. Barni, F. Bartolini, V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original images”, Proceedings of ICIP’97, IEEE International Conference on Image Processing, pp. 520–523, Santa Barbara CA, USA, October 26-29, 1997.
S. Craver, N. Memon, B. L. Yeo, M. M. Yeung, “Resolving rightful ownership with invisible watermarking techniques: limitations, attacks and implications”, IEEE Journal of Selected Areas in Communications, vol. 4, no. 16, pp. 573–586, May 1998.
M. D. Swanson, M. Kobayashi, A. H. Tewfik, “Multimedia data-embedding and watermarking technologies”, Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, June 1998.
F. Hartung, M. Kutter, “Multimedia watermarking techniques”, Proceedings of the IEEE, vol. 87, no. 7, pp. 1079–1107, July 1999.
F. Bartolini, M. Barni, V. Cappellini, A. Piva, “Mask building for perceptually hiding frequency embedded watermarks ”, Proceedings of ICIP’98, IEEE International Conference on Image Processing, vol. I, pp. 450–454, October 4-7, Chicago, USA.
R.B. Wolfgang, C. I. Podilchuk, E. J. Delp, “Perceptual watermarks for digital images and video”, Proceedings of the IEEE, vol. 87, no. 7, pp. 1108–1126, July 1999.
M. Barni, F. Bartolini, V. Cappellini, A. Piva, F. Rigacci, “A MAP identification criterion for DCT-based watermarking”, Signal Processing IX, Theories and Applications, Proceedings of EUSIPCO-98, Ninth European Signal Processing Conference, pp. 17–20, Rodos,, Greece, 8-11 September 1998.
A. De Rosa, M. Barni, F. Bartolini, V. Cappellini, A. Piva, “Optimum decoding of nonadditive full frame DFT watermarks”, Proceedings of Third International Workshop on Information Hiding, pp. 159–171, 29 September — 1 October, 1999, Dresden, Germany.
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. IEEE Int. Conf. on Image Processing, Texas, 13-16, Nov. 1994, vol. II, pp. 86–90.
S. Walton, “Image authentication for a slippery new age,” in Dr. Dobb’s Journal of Software Tools for Professional Programmers, vol. 20, April 1995.
L. Xie and G. R. Arce, “A blind wavelet based digital signature for image authentication, ” in Proc. EUSIPCO-98, IX European Signal Proc. Conf., Rodos, Greece, September, 8-11 1998.
J. Hernandez, F. Perez-Gonzalez, J. Rodriguez, G. Nieto, “Performance analysis of a 2D multipulse amplitude modulation scheme for data hiding and watermarking of still images,” IEEE Journ. of Sel. Areas in Commun., vol. 16, no. 4, pp. 510–524, May 1998.
P. Bouthemy, P. Lalande, “Recovery of moving objects masks in an image sequence using local spatio-temporal contextual information”, Optical Engineering, vol.32, no.6, pp.1205–1212, June 1993.
M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking, ” Signal Processing, vol. 66, no. 3, pp. 357–372, May 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer Science+Business Media New York
About this chapter
Cite this chapter
Barni, M., Bartolini, F., Cappellini, V., Piva, A. (2000). Digital Watermarking for the Authentication of AVS Video Sequences. In: Foresti, G.L., Mähönen, P., Regazzoni, C.S. (eds) Multimedia Video-Based Surveillance Systems. The Springer International Series in Engineering and Computer Science, vol 573. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-4327-5_16
Download citation
DOI: https://doi.org/10.1007/978-1-4615-4327-5_16
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-6943-1
Online ISBN: 978-1-4615-4327-5
eBook Packages: Springer Book Archive