Abstract
Straightforward adaptations of results for still images watermarking have led to non-secure video watermarking algorithms. The very specific nature of digital video has indeed to be considered so that robustness and security issues are handled efficiently. As a result, a novel video watermarking scheme is presented in this paper: security is achieved by using a smooth time-dependent strength and payload is encoded in the phase difference between several signals transmitted along non-interfering communication channels. Moreover, temporal synchronization can be done in a blind manner on the detector side. The proposed scheme is finally proven to be secure against traditional intra-video collusion attacks and robust against MPEG compression.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Katzenbeisser, S., Petitcolas, F.: Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood (1999)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)
Doërr, G., Dugelay, J.-L.: A guide tour of video watermarking. Signal Processing: Image Communication 18(4), 263–282 (2003)
Bloom, J., Cox, I., Kalker, T., Linnartz, J.-P., Miller, M., Traw, C.: Copy protection for DVD video. Proceedings of the IEEE 87(7), 1267–1276 (1999)
Haitsma, J., Kalker, T.: A watermarking scheme for digital cinema. In: Proceedings of the IEEE International Conference on Image Processing, vol. 2, pp. 487–489 (2001)
Bloom, J.: Security and rights management in digital cinema. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. IV, pp. 712–715 (2003)
Griwodz, C., Merkel, O., Dittmann, J., Steinmetz, R.: Protecting VoD the easier way. In: Proceedings of the ACM Multimedia Conference, pp. 21–28 (1998)
Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A video watermarking system for broadcast monitoring. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 103–112 (1999)
Jordan, F., Kutter, M., Ebrahimi, T.: Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. In: JTC1/SC29/WG11 MPEG97/M2281, ISO/IEC (1997)
Langelaar, G., Lagendijk, R., Biemond, J.: Real-time labelling of MPEG-2 compressed video. Journal of Visual Communication and Image Representation 9(4), 256–270 (1998)
Deguillaume, F., Csurka, G., Ó Ruanaidh, J., Pun, T.: Robust 3D DFT video watermarking. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 113–124 (1999)
Swanson, M., Zhu, B., Tewfik, A.: Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications 16(4), 540–550 (1998)
Su, K., Kundur, D., Hatzinakos, D.: A novel approach to collusion resistant video watermarking. In: Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents IV, pp. 491–502 (2002)
Doërr, G., Dugelay, J.-L.: Switching between orthogonal watermarks for enhanced security against collusion in video. Technical Report RR-03-080, Eurécom Institute (2003)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66(3), 283–301 (1998)
Pickholtz, R., Schilling, D., Millstein, L.: Theory of spread spectrum communications - a tutorial. IEEE Transactions on Communications 30(5), 855–884 (1982)
Mobasseri, B.: Exploring CDMA for watermarking of digital video. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 96–102 (1999)
Voloshynovskiy, S., Herrigel, A., Baumgärtner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (2000)
Voloshynovskiy, C., Pereira, S., Herrigel, A., Baumgärtner, N., Pun, T.: Generalized watermarking attack based on watermark estimation and perceptual remodulation. In: Proceedings of SPIE 3971, Security and Watermarking of Multimedia Contents II, pp. 358–370 (2000)
Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, Heidelberg (1993)
Cox, I., Miller, M.: Preprocessing media to facilitate later insertion of a watermark. In: Proceedings of the International Conference on Digital Signal Processing, vol. 1, pp. 67–70 (2002)
Kutter, M., Petitcolas, F.: A fair benchmark for image watermarking systems. In: Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 226–239 (1999)
Zhao, H., Wu, M., Wang, Z., Liu, K.: Non-linear collusion attacks on independent fingerprints for multimedia. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. V, pp. 664–667 (2003)
Doërr, G., Dugelay, J.-L.: New intra-video collusion attack using mosaicing. In: Proceedings of the IEEE International Conference on Multimedia and Expo., vol. II, pp. 505–508 (2003)
Kutter, M.: Watermarking resisting to translation, rotation and scaling. In: Proceedings of SPIE 3528, Multimedia Systems and Applications, pp. 423–431 (1998)
Herrigel, A., Voloshynovskiy, S., Rytsar, Y.: The watermark template attack. In: Proceedings of SPIE 4314, Security and Watermarking of Multimedia Contents III, pp. 394–405 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Doërr, G., Dugelay, JL. (2004). Secure Video Watermarking via Embedding Strength Modulation. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-24624-4_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21061-0
Online ISBN: 978-3-540-24624-4
eBook Packages: Springer Book Archive