DOI QR코드

DOI QR Code

Invisible Watermarking for Improved Security of Digital Video Application

디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹

  • Seo, Jung-Hee (Dept. of Computer Engineering, Tongmyong University) ;
  • Park, Hung-Bog (Dept. of Computer Engineering, Pukyong National University)
  • Received : 2011.08.01
  • Accepted : 2011.08.29
  • Published : 2011.10.31

Abstract

Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

디지털 비디오 워터마킹의 성능은 디지털 비디오에서 많은 정보를 은닉하는 방법에 대한 평가이다. 그러므로 디지털 컨텐츠에 대한 주파수 영역의 고화질의 동영상에 많은 비트의 데이터를 저장하는 방법이 요구되고 있다. 따라서 본 논문은 워터마크 요소 중 강인성과 비시각성 사이의 절충을 통해서 동영상의 프레임에 대해 휘도 성분을 추출한 후 웨이블릿 변환을 수행하여 LH와 HL 부대역에 워터마크를 내장하고 비시각적인 워터마크 기반의 강인한 워터마크를 통해 향상된 워터마크의 보안성을 위한 워터마크 시스템을 설계한다. 워터마크의 보안성에 대한 성능의 분석은 통계적인 방법을 사용하여 비시각적인 워터마킹에서의 다양한 공격에 대한 강인성을 평가한다. 실험 결과에 따르면 노이즈 추가, 손실 압축, Low-Pass 필터링과 같은 일반적인 신호 처리를 수행하여 워터마크 강인성과 비시 각성을 평가하였고, 다양한 공격에 대한 워터마크의 보안성을 검증할 수 있었다.

Keywords

References

  1. Anthony Huggett and Clive Stubbings, "Invisible Watermarking for Digital Video Applications and Challenges," Secure Images and Image Authen tication, IET Conferences, pp. 9/1 - 9/6, 2000.
  2. Petrovic R., Tehranchi B., Winograd J.M., "Security of Copy-Control Watermark," Telecommunications in Modern Satellite, Cable and Broadcasting Services, pp. 117 - 126, IEEE Conferences, 2007.
  3. Min Wu, Hong Heather Yu, Alex Gelman, "Multi-level Data Hiding for Digital Image and Video," in Proc. Photonics East Conference on Multimeida Systems and Applications, Vol. 3845, Boston, Ma, 1999.
  4. Hung-Bog Park, Jung-Hee Seo, "Multi-Level Wate rmarking for Image of Multimedia Contents," Journal of The Korean Institute of Maritime Information & Communication Sciences, Vol. 10, No. 11, pp. 1946-1953, 2006.
  5. Raghavendra K., Chetan K.R. "A Blind and Robust Watermakring Scheme with Scrambled Watermark for Video Authentication," Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference on, pp. 1-6, 2009.
  6. Preda R.O., Vizireanu, D.N, "Blind Watermarking Capacity Analysis for MPEG2 Coded Video," Telecommunications in Modern Satellite, Cable and Broadcasting Services, IEEE Conferences ,pp. 465-468, 2007.
  7. Stankovic S., Orovic I., Zaric N, "An Application of Multidimensional Time-Frequency Analysis as a Base for the Unified Watermarking Approach," IEEE Trans. on Iamge Processing, Vol. 19, No. 3, pp. 736-745, March 2010. https://doi.org/10.1109/TIP.2009.2033624
  8. Zhang Guannan, Wang Shuxun, Nian Guijun, "A Blind Watermarking Algorithm Based on DWT for Color Image," Communications, 2004 and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings. The 2004 Joint Conference of the 10th Asia-Pacific Conference on , Vol. 2, pp. 634-638, 2004.
  9. Jang Hee-Seon, Shin Hyun-Chul, Lee Hyun-Chang, "Performance Analysis of DoS Security Algorithm for Multimedia Contents Services," Journal of the Korean Society of Computer and Information, Vol. 15, No. 4, pp. 19-25, 2010. https://doi.org/10.9708/jksci.2010.15.4.019
  10. Hefei Ling, Liyun Wang, Fuhao Zou, Zhengding Lu, Ping Li, "Robust video watermarking based on affine invariant regions in the compressed domain," Signal Processing 91, pp. 1863-1875, 2011. https://doi.org/10.1016/j.sigpro.2011.02.009