A low cost fragile watermarking scheme in H.264/AVC compressed domain |
| |
Authors: | Shi-Jinn Horng Mahmoud E. Farfoura Pingzhi Fan Xian Wang Tianrui Li Jing-Ming Guo |
| |
Affiliation: | 1. School of Information Science and Technology, Southwest Jiaotong University, 610031, Chengdu, People’s Republic of China 2. Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, 106, Taiwan 3. Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, 106, Taiwan
|
| |
Abstract: | H.264/AVC-based products have grown tremendously in social networks; issues of content-based authentication become increasingly important. This paper presents a blind fragile watermarking scheme for content-based H.264/AVC authentication, which enjoys high sensitivity to typical video attacks. A spatiotemporal analysis is exploited to guarantee a minimum impact on perceptual quality and bit-rate increment. The watermark features are extracted from intra/inter prediction modes of intra/inter macroblocks, constituting the content-based Message Authentication Code (MAC) which is embedded/extracted in a Group-of-Pictures GOP-based fashion utilizing the syntactic elements of the Network Application Layer (NAL) units from the compressed bitstream. It’s unnecessary to fully decode a compressed bitstream before the embedding or detection processes. A content-based key is generated to control fragile watermark generation, embedding, extraction, and verification algorithms. Additionally, fragility is ensured by selecting the last nonzero quantized ac residuals for watermark embedding. The embedded watermark can be detected and verified by means of partially decoding intra/inter prediction modes from syntactic elements of the bitstream without the prior knowledge of the original video or complete decoding. Experiment results demonstrate that the performance of the proposed scheme is excellent in terms of bit-rate and perceptual quality. Furthermore, various types of content-preserving and/or content-changing attacks can be detected efficiently. |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |
|