首页 | 本学科首页   官方微博 | 高级检索  
     


A low cost fragile watermarking scheme in H.264/AVC compressed domain
Authors:Shi-Jinn Horng  Mahmoud E. Farfoura  Pingzhi Fan  Xian Wang  Tianrui Li  Jing-Ming Guo
Affiliation:1. School of Information Science and Technology, Southwest Jiaotong University, 610031, Chengdu, People’s Republic of China
2. Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, 106, Taiwan
3. Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, 106, Taiwan
Abstract:H.264/AVC-based products have grown tremendously in social networks; issues of content-based authentication become increasingly important. This paper presents a blind fragile watermarking scheme for content-based H.264/AVC authentication, which enjoys high sensitivity to typical video attacks. A spatiotemporal analysis is exploited to guarantee a minimum impact on perceptual quality and bit-rate increment. The watermark features are extracted from intra/inter prediction modes of intra/inter macroblocks, constituting the content-based Message Authentication Code (MAC) which is embedded/extracted in a Group-of-Pictures GOP-based fashion utilizing the syntactic elements of the Network Application Layer (NAL) units from the compressed bitstream. It’s unnecessary to fully decode a compressed bitstream before the embedding or detection processes. A content-based key is generated to control fragile watermark generation, embedding, extraction, and verification algorithms. Additionally, fragility is ensured by selecting the last nonzero quantized ac residuals for watermark embedding. The embedded watermark can be detected and verified by means of partially decoding intra/inter prediction modes from syntactic elements of the bitstream without the prior knowledge of the original video or complete decoding. Experiment results demonstrate that the performance of the proposed scheme is excellent in terms of bit-rate and perceptual quality. Furthermore, various types of content-preserving and/or content-changing attacks can be detected efficiently.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号