Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1161366.1161386acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Assessing motion-coherency in video watermarking

Published: 26 September 2006 Publication History

Abstract

Motion coherent watermarking has been recently proposed as a means to combat temporal frame averaging along the motion axis (MC-TFA). The fundamental idea consists in exploiting motion-compensation primitives to force a physcal point of the scene to always carry the same watermark sample wherever it is projected in the video. However, for a given watermarking system, there is no simple tool to assess whether the produced watermark is motion-coherent or not. Today, this assessment relies on a computationally expensive procedure, namely (i) embed a watermark, (ii) perform the MC-TFA attack, (iii) check for the presence of the watermark. Therefore, the goal of this article is to provide the community with an efficient and accurate oracle which reports whether a video sequence contains any non-motion coherent component or not. This is done in practice by looking at the statistics of the difference between a frame and a motion predicted version of it.

References

[1]
U. Budhia and D. Kundur. Digital video steganalysis exploiting collusion sensitivity. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense III, volume 5403 of Proceedings of SPIE, pages 210--221, April 2004.
[2]
F. Cayre, C. Fontaine, and T. Furon. Watermarking security: Theory and practice. IEEE Transactions on Signal Processing, Supplement on Secure Media, 53(10):3976--3987, October 2005.
[3]
S.-J. Choi and J. Woods. Motion-compensated 3-D subband coding of video. IEEE Transactions on Image Processing, 8(2):155--167, February 1999.
[4]
G. Doërr and J.-L. Dugelay. A guide tour of video watermarking. Signal Processing: Image Communication, Special Issue on Technologies for Image Security, 18(4):263--282, April 2003.
[5]
G. Doërr and J.-L. Dugelay. New intra-video collusion attack using mosaicing. In Proceedings of the IEEE International Conference on Multimedia and Expo, volume II, pages 505--508, July 2003.
[6]
G. Doërr and J.-L. Dugelay. Secure background watermarking based on video mosaicing. In Security, Steganography and Watermarking of Multimedia Contents VI, volume 5306 of Proceedings of SPIE, pages 304--314, January 2004.
[7]
G. Doërr and J.-L. Dugelay. Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media, 52(10):2955--2964, October 2004.
[8]
Ö. Harmanci and K. Mihçak. Motion picture watermarking via quantization of pseudo-random linear statistics. In Visual Communications and Image Processing Conference, volume 5960 of Proceedings of SPIE, pages 1142--1150, July 2005.
[9]
F. Hartung and B. Girod. Watermarking of uncompressed and compressed video. Signal Processing, 66(3):283--301, May 1998.
[10]
T. Kalker, G. Depovere, J. Haitsma, and M. Maes. A video watermarking system for broadcast monitoring. In Security and Watermarking of Multimedia Contents, volume 3657 of Proceedings of SPIE, pages 103--112, January 1999.
[11]
L. Pérez-Freire, P. Comesaña, and F. Pérez-González. Information-theoretic analysis of security in side-informed data hiding. In Proceedings of the Seventh International Workshop on Information Hiding, volume 3727 of LNCS, pages 131--145, June 2005.
[12]
V. Rohatgi and E. Saleh. An Introduction to Probability and Statistics. Wiley-Interscience, 2000.
[13]
A. Secker and D. Taubman. Lifting-based invertible motion adaptive transform (LIMAT) framework for highly scalable video compression. IEEE Transactions on Image Processing, 12(12):1530--1542, December 2003.
[14]
K. Su, D. Kundur, and D. Hatzinakos. A novel approach to collusion resistant video watermarking. In Security and Watermarking of Multimedia Contents IV, volume 4675 of Proceedings of SPIE, pages 491--502, January 2002.
[15]
Vinod P. and P. K. Bora. Motion-compensated inter-frame collusion attack on video watermarking and a countermeasure. IEE Proceedings - Information Security, 153(2):61--73, June 2006.
[16]
S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun. Optimal adaptive diversity watermarking with channel state estimation. In Security and Watermarking of Multimedia Contents III, volume 4314 of Proceedings of SPIE, pages 673--685, January 2001.
[17]
Y. Wang, J. Osterman, and Y.-Q. Zhang. Video Processing and Communications. Prentice-Hall, 2001.
[18]
S. Winkler, E. Gelasca, and T. Ebrahimi. Towards perceptual metrics for video watermark evaluation. In Applications of Digital Image Processing, volume 5203 of Proceedings of SPIE, pages 371--378, August 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '06: Proceedings of the 8th workshop on Multimedia and security
September 2006
244 pages
ISBN:1595934936
DOI:10.1145/1161366
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. motion coherency
  2. oracle
  3. video watermarking

Qualifiers

  • Article

Conference

MM&Sec '06
Sponsor:
MM&Sec '06: Multimedia and Security Workshop
September 26 - 27, 2006
Geneva, Switzerland

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2018)2D+t wavelet domain video watermarkingAdvances in Multimedia10.1155/2012/9734182012(6-6)Online publication date: 13-Dec-2018
  • (2012)Blind robust watermarking mechanism based on maxima curvature of 3d motion dataProceedings of the 14th international conference on Information Hiding10.1007/978-3-642-36373-3_8(110-124)Online publication date: 15-May-2012
  • (2011)A video steganalytic algorithm against motion-vector-based steganographySignal Processing10.1016/j.sigpro.2011.02.01291:8(1901-1909)Online publication date: 1-Aug-2011
  • (2010)Video watermarking using motion compensated 2D+t+2D filteringProceedings of the 12th ACM workshop on Multimedia and security10.1145/1854229.1854254(127-136)Online publication date: 9-Sep-2010
  • (2010)Blind robust watermarking of 3d motion dataACM Transactions on Multimedia Computing, Communications, and Applications10.1145/1671954.16719566:1(1-32)Online publication date: 22-Feb-2010

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media