Professional Documents
Culture Documents
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 47
Abstract—With the proliferation of digital multimedia content, issues of copyright protection have become more
important in video retrieval system because the copying of digital video does not result in the decrease in quality that
occurs when analog video is copied. One method of copyright protection is to embed a digital code, “watermark”, into
the video sequence. The watermark can then unambiguously identify the copyright holder of the video sequence. In
this paper we propose a new video watermark embedding algorithm that would insert watermarks into video
sequences and also detect if a given video sequence contains a given watermark. The video standard that has been
chosen is the H.264 standard as it offers a significant efficiency improvement over the previous video compression
standards. A couple of tests that can be considered representative for most image manipulations and attacks were
performed. The proposed algorithm has passed all attack tests. The watermarking mechanisms in this paper have
been proved to be robust and efficient to protect the copyright of H.264 coded video within the video retrieval system.
Index Terms— advance video coding, copyright, H.264, video retrieval, watermark.
—————————— ——————————
can be used later to integrate into the H.264 video normal distribution. Steps 3 to 5 are used to
sequences. calculate its mean m and standard deviation σ.
3. Generate M (where M is large) random watermarks,
w1 to wM, with the same amplitude as w.
3.2. Embedding watermark 4. Insert each wi into v and calculate each squared
difference di.
The algorithm that was used to embed the 5. If M was chosen large enough, the sample mean of
watermark in the video sequence is shown below: the values of di is roughly equal to m and the
sample standard deviation is roughly equal to σ.
vi* = vi (1 + αwi) (1) 6. We now have that d is a stochastic variable with a
normal distribution with a known mean m and
Where v is the host video sequence to watermark, and standard deviation σ. This means that we can find a
vi is its i:th transform coefficient. Moreover, v* is the t such that
output watermarked video sequence, and vi* is its i:th P(d ≤ t) = e (4)
coefficient. w is the watermark and wi is its i:th where e is the accepted error probability, and
number. Parameter α is a constant. should be chosen to something very small.
7. The desired threshold is t. For e = 0.01,
t = m -2.33 σ (5)
3.3. Compare watermark
Extract wi* from vi* for every i by using the inverse This testing concerns about testing the basic usage
insertion formula and calculate the total squared of the program. For example, the performances of four
difference d as: basic functions which are generating, inserting,
d = Σ(wi*– wi)2 (2) comparing and threshold calculation are tested. The
Insert w into v to get v** and calculate the total test that was performed was using the following
squared difference d as: methods:
d = Σ(vi** – vi*)2 (3) 1. Two thousand watermarks with amplitude of
100 were generated, by executing the
If the squared difference d is less than some threshold following command for each i in 1 to 2000:
t, the comparison is defined as a match. A way to watermark generate 100 i.txt
generate a threshold is described in section 3.4. 2. The first of these watermarks was inserted
into video0.264 by executing:
watermark insert 1.txt video0.264 video1.264
3.4. Generate threshold 3. A threshold was calculated by executing:
watermark threshold 1.txt video0.264
After calculating the squared difference d using video1.264
formula (2) of section 3.3, the next step is to generate Threshold: 6.2107
the threshold t and determine whether the value of d is 4. The following command was executed for
low enough to be considered as a match. This can be each i in 1 to 2000:
done using the proposed algorithm: watermark compare i.txt video0.264
video1.264
1. Assume that the given watermark w is not the
watermark in the watermarked video sequence v*, The comparison results are shown in Figure 3:
but some other random watermark. This means that
each coefficient wi is a stochastic variable.
2. Since the squared difference d is a sum of many
stochastic variables, it is likely using roughly a
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 5, MAY 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 50
16
15
of 100 was used in this experiment. Fig. 4 compares
the visual difference between the luminance of the
14
13
12
PSNR(dB)
42.0000
41.0000
H.264 Original Watermarked
40.0000
Video H.264 Video Frames
Frames 39.0000
37.0000
0 100 400 800 1200 1600 2000 2400 2800 3200
Amplitude
There are many ways that a pirate can deceive the 1. Generate N watermarks, where N is the
watermark comparison algorithm. One way is to insert number of pirates, by executing the following
some random watermark in addition to the watermark for each i in 1 to N:
already in there. The following test was made: watermark generate 100 i.txt
1. A watermark 1.txt of amplitude 100 was 2. Make a watermark sequence, S.wms that
generated. includes all N watermarks.
2. 1.txt was inserted into video sequence 3. Insert S.wms by executing:
video0.264 to getvideoi.264 watermark insert S.wms video0.264
3. A couple of other watermarks, 2.txt to 6.txt of videoS.264
different amplitudes were generated and each 4. Generate the threshold as follows:
added to video1.264 to get video2.264 to watermark threshold S.wms video0.264
video5.264 videoS.264
4. The following commands was executed for 5. For each i in 1 to N, execute:
each i in 2 to 6: watermark compare i.txt video0.264
watermark compare 1.txt video0.264 videoS.264
videoi.264 6. Count the number of matches in 5.
watermark threshold 1.txt video0.264
videoi.264 Since the test generates a different number of
matches each run, it was repeated three times for each
The results were as follows: number of pirates.
[2] Y. Dai, L. Zhang, Y. Yang, “A new method of [12] J. M. Sanchez, X. Binefa, and J. Vitri, “Shot
MPEG2 video watermarking technology,” IEEE ICCT, partitioning based recognition of tv commercials”
pp. 1845-1847, 2003. Multimedia Tools Appl., 18(3):233–247, 2002.
[3] I. Setyawan, R. L. Lagendijk, “Low bit rate video [13] J. S. Pedro, N. Denis, and S. Domínguez, “Video
watermarking using temporally extended differential retrieval using an edl-based timeline”, In Springer,
energy watermarking (DEW) algorithm,” Proc. editor, Pattern Recognition and Image Analysis,
Security and Watermarking of Multimedia Contents IbPRIA 2005, Estoril, Portugal. Lecture Notes in
III, vol. 4314, pp. 73-44, 2001. Computer Science., volume 3522, pages 401–408,
2005.
[4] F. Deguillaume, G. Csurka, J. O. Ruanaidh, and T.
Pun, “Robust 3D DFT video watermarking,” in [14] Y. Rui, T. S. Huang, and S. Mehrotra, “Exploring
Proceedings of Security and Watermarking of video structure beyond the shots”, Proceedings of the
Multimedia Contents, SPIE, San Jose, vol. 3657, pp. IEEE International Conference on Multimedia
113-124, 1999. Computing and Systems, page 237, Washington, DC,
USA, 1998. IEEE Computer Society.
[5] M. D. Swanson, B. Zhu, “Multiresolution scene-
based video watermarking using perceptual models,” [15] C. Y. Chen, S. Y. Chien, Y. W. Huang, T. C.
IEEE Journal on Selected Areas in Communications, Chen, T. C. Wang, andL.-G. Chen, “Analysis and
vol. 16(4), pp. 540-550, 1998. architecture design of variable block-size motion
estimation for H.264/AVC,” IEEE Trans. Circuits
[6] J. H. Lim, D. J. Kim, H. T. Kim, C. S. Won, Syst. I, Reg. Papers, vol. 53, no. 3, pp. 578–593, Mar.
“Digital Video Watermarking Using 3D-DCT and 2006.
Intra-Cubic Correlation,” Security and Watermarking
of Multimedia Contents 3, Proceedings of SPIE vol. [16] T. Wiegang, G. J. Sullivan, G. Bjøntegaard, and
4314, 2001. A. Luthra, “Overview of the H.264/AVC video coding
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 5, MAY 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 53