Countermeasures for unintentional and intentional video watermaking attacks

被引:13
作者
Deguillaume, F [1 ]
Csurka, G [1 ]
Pun, T [1 ]
机构
[1] Univ Geneva, CUI, CH-1211 Geneva, Switzerland
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II | 2000年 / 3971卷
关键词
video watermarking; watermarking attacks; Bayesian approach;
D O I
10.1117/12.384989
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copyring/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but Short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.
引用
收藏
页码:346 / 357
页数:12
相关论文
共 21 条
[1]  
[Anonymous], MULT SEC WORKSH ACM
[2]  
COS I, 1996, P IEEE INT C IM PROC, P243
[3]   Can invisible watermarks resolve rightful ownerships? [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, M .
STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES V, 1997, 3022 :310-321
[4]  
CSURKA G, 1999, 3 INT WORKSH INF HID
[5]  
DEGUILLAUME F, 1999, IS T SPIE EL IM 99 S
[6]   Spreading codes for direct sequence CDMA and wideband CDMA cellular networks [J].
Dinan, EH ;
Jabbari, B .
IEEE COMMUNICATIONS MAGAZINE, 1998, 36 (09) :48-54
[7]   Watermarking of uncompressed and compressed video [J].
Hartung, F ;
Girod, B .
SIGNAL PROCESSING, 1998, 66 (03) :283-301
[8]   Performance analysis of a 2-D multipulse amplitude modulation scheme for data hiding and watermarking of still images [J].
Hernandez, JR ;
Perez-Gonzalez, F ;
Rodriguez, JM ;
Nieto, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :510-524
[9]  
KUTTER M, 1999, THESIS EPFL LAUSANNE
[10]  
MILANESE R, 1997, SPIE P DALL TX NOV, V3229