DOI QR코드

DOI QR Code

Active Video Watermarking Technique for Infectious Information Hiding System

전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법

  • 장봉주 (부경대학교 정보보호협동과정) ;
  • 이석환 (동명대학교 정보보호학과) ;
  • 권기룡 (부경대학교 IT융합응용공학과)
  • Received : 2012.02.23
  • Accepted : 2012.06.15
  • Published : 2012.08.31

Abstract

Most watermarking schemes for video contents protection have been studied to increase watermark's robustness and invisibility against such compressions and many kinds of signal processing after embedding copyright information to the original contents. This paper proposes an active watermarking that infect watermark to contents in the video decoding process using embedded infectious watermark and control signals from a video encoder side. To achieve this algorithm, we design a kernel based watermarking in video encoder side that is possible to recover the original contents and watermark in watermark detection procedure perfectly. And then, by reversible de-watermarking in video decoder side, we design the active watermark infection method using detected watermark and control signal. This means that our system can provide secure re-distributions of video contents without any quality degration and watermark bit error against transcoding or re-encoding processing. By experimental results, we confirmed that the embedded watermark was infected by video contents and codec perfectly without any declines of compression ratio and video quality.

현재까지 대부분의 비디오 콘텐츠에 대한 워터마킹 기법들은 최초의 콘텐츠에 저작권자 정보를 은닉한 후, 압축율 및 각종 신호처리를 공격으로 간주하여 상대적인 강인성과 비가시성을 우수하게 설계하는 것으로서 연구되어왔다. 제안 기법은 워터마크와 제어신호를 전염성을 가진 정보로 간주하고 비디오 인코더에 은닉된 정보를 이용하여 디코더로부터 능동적으로 워터마크를 전염시키는 방법을 제안한다. 제안 기법을 위해 워터마크와 함께 화질제어 및 삽입강도 가변파라미터를 같이 은닉하는 커널 기반 워터마킹을 수행하며, 이것은 인증되지 않은 워터마크에 대해 저화질의 비디오 콘텐츠를 제공할 수 있는 장점을 가진다. 또한 비디오 디코더에서는 워터마크 복호화를 단계에서 저작권자나 사용자가 개입되지 않고 능동적으로 콘텐츠 기반의 워터마킹을 수행하여 변이된 워터마크를 전염시키는 기법으로 트랜스코딩, 재압축 등과 같은 처리에도 워터마크와 화질의 손상 없이 재배포가 가능하도록 한다. 실험결과 워터마크로 인한 압축율 저하나 워터마크의 손상 없이 비디오 콘텐츠와 코덱에 의해 완벽하게 전염됨을 확인하였다.

Keywords

References

  1. M.D. Swanson, B. Zhu, and A.H. Tewfik, "Multiresolution Scene-Based Cideo Water- Marking using Perceptual Models," IEEE J ournal on Selected Areas in Communications, Vol. 16, Issue 4, pp. 540-550, 1998. https://doi.org/10.1109/49.668976
  2. C.V. Serdean, M.A. Ambroze, M. Tomlinson, and J.G. Wade, "DWT-based High-capacity Blind Video Watermarking, Invariant to Geometrical Attacks," IEEE Proc. Vision, Image and Signal Processing, Vol. 150, Issue 1, pp. 51-58, 2003. https://doi.org/10.1049/ip-vis:20030159
  3. Y. Wang and Al. Pearmain, "Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain," IEEE Trans. on Image Processing, Vol. 15, No. 6, pp. 1536-1543, 2006. https://doi.org/10.1109/TIP.2006.873476
  4. Jing Zhang, Anthony T.S. Ho, Gang Qiu, and Pina Marziliano, "Robust Video Watermarking of H.264/AVC," IEEE Trans. Circuits Sys. Video Tech., Vol. 54, No. 2, pp. 205-209, 2007.
  5. 윤지선, 이석환, 송윤철, 장봉주, 권기룡, 김민환, "MPEG-4 스케일러블 비디오 코딩 및 멀티미디어 트랜스코딩에 강인한 블라인드 비디오 워터마킹," 멀티미디어학회논문지, 제11권, 10호, pp. 1347-1358, 2008.
  6. A.M. Alattar, "Reversible Watermark using the Difference Expansion of A Generalized Integer Transform," IEEE Trans. Image Process., Vol. 13, No. 8, pp. 1147-1156, 2004. https://doi.org/10.1109/TIP.2004.828418
  7. B. Yang, M. Schmucker, C. Busch, X. Niu, and S. Sun, "Approaching Optimal Value Expansion for Reversible Watermarking," Proc. of the 7-th Workshops on Multi- media and Security, pp. 95-102, 2004.
  8. B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, "Reversible Image Watermarking by Histogram Modification for Integer DCT Coefficients," Proc. of the IEEE 6th Workshop on Multimedia Signal Processing, pp. 143-146, 2004.
  9. J.M. Zain, L.P. Baldwin, and M. Clarke, "Reversible Watermarking for Authentication of Dicom Images," Proc. of the 26th Annual International Conference of the Engineering in Medicine and Biology Society, pp. 3237-3240, 2004.
  10. Xiao Zeng, Zhen-Yong Chen, Ming Chen, and Zhang Xiong, "Reversible Video Watermarking using Motion Estimation and Prediction error expansion," Journal of Information Science and Engineering, Vol. 27, pp 465-479, 2011.
  11. Zhenyong Chen, Zhang Xiong, and Long Tang, "A Novel Scrambling Scheme for Digital Video Encryption," Proc. of Pacific-Rim Symposium on Image and Video Technology (PSIVT) , pp. 997-1006, 2006.
  12. Zheng Liu and Xue Li, "Motion Vector Encryption in Multimedia Streaming," Proc. of 10Th international Conference of Multimedia Modelling Conference, pp. 64-71, 2004.
  13. B. Furht and D. Kirovski, Multimedia Security Handbook, CRC Press LLC, 2004.
  14. C. Shi and Bharat Bhargava, "A Fast MPEG Video Encryption Algorithm," Proc. of ACM Multimedia, pp. 81-88, 1998.
  15. A. Shamir, "How to share a secret," Proc. of Communications of the ACM, Vol. 2, pp. 612-613, 1979.
  16. Coding of audio-visual objects-Part 2: Visual, ISO/ IEC 14492-2 (MPEG-4 Visual) , ISO/IEC JTC 1, Version 1: 1999, Version 2: 2000, Version 3: 2004.
  17. Advanced Video Coding for Generic Audiovisual Services, ITU-T Rec. H.264 and ISO/ IEC 14496-10 (MPEG-4 AVC) , ITU-T and ISO/ IEC JTC-1, Version 1: 2003, Version 2: 2004, Version 3: 2005, Version 4: 2005,Version 5 and Version 6: 2006, Version 7: 2007.
  18. Jan Bormans and Keith Hill, MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11/N5231, 2002,
  19. H. Schwarz, D. Marpe, and T Wiegand, "Overview of the Scalable Video Coding Extension of the H.264/AVC Standard," IEEE Trns. on Circuits and Systems for Video Technology, Vol. 17, pp. 1103-1120, 2007. https://doi.org/10.1109/TCSVT.2007.905532
  20. http://www.bbc.co.uk/opensource/projects/dirac/, 2011.
  21. http://www.xvid.org/, 2011.
  22. Anthony Vetro, "Transcoding Scalable Coding and Standardized Metadata," 8th International Workshop of Visual Content Processing and Representation, Vol. 2849, pp. 15-16, 2003.
  23. 장봉주, 이석환, 권기룡, "생물학적 바이러스를 이용한 비디오 콘텐츠의 전염성 정보은닉 시스템 모델링," 전자공학회논문지, 제49권 CI 3호, pp. 34-45, 2012.

Cited by

  1. Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure vol.17, pp.8, 2014, https://doi.org/10.9717/kmms.2014.17.8.953
  2. Reversible Watermarking based Video Contents Management and Control technique using Biological Organism Model vol.16, pp.7, 2013, https://doi.org/10.9717/kmms.2013.16.7.841
  3. DNA Watermarking Method based on Random Codon Circular Code vol.16, pp.3, 2013, https://doi.org/10.9717/kmms.2013.16.3.318
  4. Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images vol.18, pp.11, 2015, https://doi.org/10.9717/kmms.2015.18.11.1332
  5. 유한 체상에서의 사전 비밀이미지 공유 기법 vol.16, pp.5, 2013, https://doi.org/10.9717/kmms.2013.16.5.577