MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
-1/20- MPEG 4, H.264 Compression Standards Presented by Dukhyun Chang
A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC Sourav Bhattacharya ; T. Chattopadhyay ; Arpan.
1 Video Coding Concept Kai-Chao Yang. 2 Video Sequence and Picture Video sequence Large amount of temporal redundancy Intra Picture/VOP/Slice (I-Picture)
2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Adaptive MPEG-2 Video Data Hiding Scheme Anindya Sarkar, Upmanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath Presented by: Anindya Sarkar Vision.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
Comparative study of various still image coding techniques. Harish Bhandiwad EE5359 Multimedia Processing.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Apr. 10, 2003TOSHIBA Corporation 1 Toshiba Video Watermarking Technology HIDE -Human eye Insensitive Digitally Embedded watermark- Apr. 10, 2003 TOSHIBA.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Multiple Image Watermarking Applied to Health Information Management
- By Naveen Siddaraju - Under the guidance of Dr K R Rao Study and comparison between H.264.
Rate-distortion Optimized Mode Selection Based on Multi-channel Realizations Markus Gärtner Davide Bertozzi Classroom Presentation 13 th March 2001.
Figure 1.a AVS China encoder [3] Video Bit stream.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
Video Watermarking Real-time Labeling of MPEG-2 Compressed Video G. C. Langelaar, R. L. Lagendijk, and J. Biemond ITS, ICTG, Delft University of Technology.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17,
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
(B1) What are the advantages and disadvantages of digital TV systems? Hint: Consider factors on noise, data security, VOD etc. 1.
1 Commutative Encryption and Watermarking in Video Compression Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
Reversible Data Hiding in JPEG Images using Ordered Embedding
Increasing Watermarking Robustness using Turbo Codes
Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission Vineeth Shetty Kolkeri EE Graduate,UTA.
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Comparative study of various still image coding techniques.
Spread Spectrum Watermarking
Reversible Data Hiding in JPEG Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Rich QR Codes With Three-Layer Information Using Hamming Code
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS Department Institut Télécom Télécom SudParis Evry - France

Outline  Compressed domain watermarking  A robust compressed-domain watermarking  Conclusion and further work  m-ST-QIM insertion (new perceptual shaping, energy selection criterion)  Detection  Experimental result A contradiction in terms? Between myth and reality! Between myth and reality!

Selection Buy Right Send content Distribution Internet VOD server BOB Justice Context Storage MPEG-4 AVCWatermarking Challenge: Real time, robust watermarking for MPEG-4 AVC Video visual redundancy exploited in order to hide watermark Video visual redundancy eliminated Context: VoD distribution

State-of-the-art panorama D. Zou, and J.A. Bloom H.264/AVC STREAM REPLACEMENT TECHNIQUE FOR VIDEO WATERMARKING  Embedding at the Decoder side A. Golikeri, and R.M. Mersereau Robust digital video watermarking scheme for H.264 advanced videocoding standard”, Journal of Electronic imaging 16,  QIM Mark generation M. Noorkami, P. Nasiopoulos, and Z. J. Wang Compressed ‑ domain video watermarking for H.264, IEEE Intl. Conf. on Image Processing, Vol. 2, September  Perceptual shaping adapted to syntax features ComWat algorithm (May 2010) Less complexity Best robustness Best transparency Large data payload Multi-symbole ComWat algorithm

m-ComWat algorithm: distinctive factors  m-array Quantization Index Modulation method [Chen and Worwell]  Energy selection criteria based on information theory concepts  First perceptual masking mechanism in MPEG-4 AVC Between myth and reality  Mark inserted in AC quantized coefficient at the decoder side

Watermarked block z Selected Host AC block x Key kMessage m Output Input Perceptual shaping Embedding & Block reconstruction Mark generation Block x Block selection YES NO m-ST-QIM Insertion Between myth and reality

Toward an MPEG-4 AVC perceptual mask Between myth and reality DC DCT IDCT DC DCT int 4x4 sub- macroblock IDCT int Perceptual mask 4x4 contrast sensitivity table

Perceptual shaping Between myth and reality Input: x = original t AVC = perceptual mask output: = original

Watermarked block z Selected Host AC block x Key kMessage m Output Input Perceptual shaping Embedding & Block reconstruction Mark generation Block x Energy selection YES NO mST-QIM Insertion Between myth and reality

Embedding & block reconstruction The inserted bit m = 0 Between myth and reality

Embedding & block reconstruction Between myth and reality The inserted bit m = (M-2)/M

Watermarked block z Selected Host AC block x Key kMessage m Output Input Perceptual shaping Embedding & Block reconstruction Mark generation Block x Energy selection YES NO mST-QIM Insertion Between myth and reality

Block selection: energy-based criterion  Additional constraints for transparent MPEG-4 AVC watermarking in: S. Duta, M. Mitrea, F. Preteux, M. Belhaj, “The MPEG-4 AVC domain watermarking transparency”, Proc. SPIE Vol. 6982, April 2008 Between myth and reality Unmarked block energy Marked block energy The mean of energy of unmarked selected blocks The standard deviation of energy of unmarked selected blocks

Mark detection Detection variable Key Quantization step Watermarked block Without attack Between myth and reality Decision Y(m =d) Decision Y(m =d+1)

Mark detection After an attack Detection variable Key Quantization step Attacked block Without attack Between myth and reality Decision Y(m =d) Decision Y(m =d+1)

MEDIEVALS video corpus:  2 h of video in HD and SD  Different compression rate: 1Mo, 5 Mo, 10 Mo  MPEG-4 AVC baseline profile, only level 2, 3 and 4  The watermarking quantization step is chosen according to Golikiri:

Experimental results: transparency embbeding Subjective QualityObjective Quality PSNR60.5 Marked video Original video AAD0.47 PMSE IF SC0.99 NCC0.99 DVQ0.06 Similarity measures Correlation measures Psycho visual measures α =0.84, Δ=160, m=5

Experimental results: robustness TranscodingStirmarkNoise addition embbedingdetection Attack: Noise matrix

embbedingdetection Attack: Noise matrix With energy selection Without energy selection Performance demonstration: Transcoding Attack Number of «-2» detected under condition «-2» was inserted to total number of inserted bits Number of «-2» detected under condition «1» was inserted to total number of inserted bits ,90,02 0,010,05 0,060,870,050,01 000,060,890,040,01 1 0,020,040,90,03 20,020,010,110,040, ,2 0,

embbedingdetection Attack: Noise matrix With energy selection Without energy selection Performance demonstration: Stirmark Attack ,770,110,020,010,09 0,120,690,150,030,01 00,030,140,730,080,02 10,010,040,060,810,08 20,070,020,040,110, ,2 0,

embbedingdetection Attack: Noise matrix With energy selection Without energy selection Performance demonstration: Noise adding Attack

Conclusion  New masking model adapted to MPEG ‑ 4 AVC features  An extension of the first MPEG ‑ 4 AVC robust watermarking method against transcoding (about 6.5% of errors) and geometric attacks (about % of errors)  Quantization watermarking on compressed domain  Information theory modeling attack

Perspectives  Ameliorate the masking model  Technical solution: watermarking system  Estimate the capacity