Watermarking-Based Content Authentication of Motion-JPEG Sequences

نویسندگان

  • Weilin Huang
  • Anthony T. S. Ho
  • Vinod Pankajakshan
چکیده

Content authentication has become an important issue for surveillance video. This paper presents a watermarking system based on Discrete Cosine Transform (DCT) for Motion-JPEG video authentication. To protect the integrity of the video object, a content-based watermark is embedded into the frames of the video. Robust watermark and semi-fragile watermark are used for temporal authentication and spatial authentication respectively. For analysis and evaluation, the system trades-off the robustness and the visual quality of the watermarked frames. The results show that the authentication rate almost reaches 100% in temporal authentication and is more than 98% in spatial authentication when the PSNR of watermarked frames is 36dB. It can robust to 55% JPEG compression and additive white Gaussian noise with variance of 0.002.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Comparison of Semifragile Watermarking Methods for Image Authentication

Data authentication is one of the primary requisites in present day communication systems. In image processing, data authentication is implemented by using watermarking techniques. The specific interest in semifragile watermarking algorithms arises from the multitude of practical and commercial applications, where content needs to be strictly protected, but the exact representation during excha...

متن کامل

Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication

We propose a content-based semi-fragile watermarking algorithm for image authentication. In content-based watermarking scheme for authentication, one of the most challenging issues is to define a computable feature vector that can capture the major content characteristics. We identify Zernike moments of the image to generate feature vector and demonstrate its good robustness and discriminative ...

متن کامل

Content based Public Key Watermarking Scheme for Image Verification and Authentication

A semi fragile, public key based digital signature scheme to verify and authenticate digital images is proposed. The scheme computes a content dependent feature value for each block of DCT coefficients of the original image. This feature is signed and then embedded into the selected DCT coefficients of the image as watermark. The technique aims to circumvent the cut and paste attacks by incorpo...

متن کامل

Fragile Watermarking using Chaotic Sequences

In this article we propose a new fragile watermarking algorithm that provides the means to verify the integrity of JPEG images. We begin by presenting the cryptanalysis of CWSA (Chaotic Watermarking Scheme for the Authentication of JPEG Images), an existing fragile watermarking algorithm. We analyse its weaknesses and we propose a new version that is resistant to those attacks, faster and less ...

متن کامل

Perceptible Content Retrieval in DCT Domain and Semi-Fragile Watermarking Technique for Perceptible Content Authentication

Digital watermarking was commenced to copyright protection and ownership verification of multimedia data. However the evolution of the watermark focused on different security aspects of multimedia data such as integrity and authenticity. Fragile and semi-fragile watermarking schemes were introduced to accomplish these requirements. In this paper, we propose semi-fragile watermarking scheme to a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008