A Web Oriented Spread Spectrum Watermarking Procedure for MPEG-2 Videos
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33104
A Web Oriented Spread Spectrum Watermarking Procedure for MPEG-2 Videos

Authors: Franco Frattolillo

Abstract:

In the last decade digital watermarking procedures have become increasingly applied to implement the copyright protection of multimedia digital contents distributed on the Internet. To this end, it is worth noting that a lot of watermarking procedures for images and videos proposed in literature are based on spread spectrum techniques. However, some scepticism about the robustness and security of such watermarking procedures has arisen because of some documented attacks which claim to render the inserted watermarks undetectable. On the other hand, web content providers wish to exploit watermarking procedures characterized by flexible and efficient implementations and which can be easily integrated in their existing web services frameworks or platforms. This paper presents how a simple spread spectrum watermarking procedure for MPEG-2 videos can be modified to be exploited in web contexts. To this end, the proposed procedure has been made secure and robust against some well-known and dangerous attacks. Furthermore, its basic scheme has been optimized by making the insertion procedure adaptive with respect to the terminals used to open the videos and the network transactions carried out to deliver them to buyers. Finally, two different implementations of the procedure have been developed: the former is a high performance parallel implementation, whereas the latter is a portable Java and XML based implementation. Thus, the paper demonstrates that a simple spread spectrum watermarking procedure, with limited and appropriate modifications to the embedding scheme, can still represent a valid alternative to many other well-known and more recent watermarking procedures proposed in literature.

Keywords: Copyright protection, digital watermarking, intellectual property protection.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1071848

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1511

References:


[1] I. Cox, J. Bloom, and M. Miller, Digital Watermarking: Principles & Practice. Morgan Kaufman, 2001.
[2] M. Barni and F. Bartolini, "Data hiding for fighting piracy," IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 28-39, 2004.
[3] M. Wu et al., "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 15-27, 2004.
[4] W. Trappe, M. Wu, et al., "Anti-collusion fingerprinting for multimedia," IEEE Trans. on Signal Processing, vol. 41, no. 4, pp. 1069-1087, 2003.
[5] I. Cox, J. Kilian, et al., "Secure spread spectrum watermarking for multimedia," IEEE Trans. on Signal Processing, vol. 6, no. 12, pp. 1673- 1687, 1997.
[6] F. Hartung, J. Su, and B. Girod, "Spread spectrum watermarking: Malicious attacks and counterattacks," in Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, ser. SPIE Proceedings, vol. 3657, S. Jose, CA, USA, Jan. 1999, pp. 147-158.
[7] C.-Y. Lin, M. Wu, J. Bloom, I. Cox, M. Miller, and Y. Lui, "Rotation, scale and translation resilient watermarking for images," IEEE Trans. on Image Processing, vol. 10, no. 5, pp. 767-782, 2001.
[8] J. Lubin, J. Bloom, and H. Cheng, "Robust, content-dependent, highfidelity watermark for tracking in digital cinema," in Electronic Imaging 2003, Security and Watermarking of Multimedia Contents, ser. SPIE Proceedings, P. W. Wong and E. J. Delp, Eds., vol. 5020, S. Jose, CA, USA, Jan. 2003, pp. 536-545.
[9] H. S. Malvar and D. A. F. Florˆencio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. on Signal Processing, vol. 51, no. 4, pp. 898-905, 2003.
[10] B. Chen and G. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Trans. on Inforormation Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
[11] F. Hartung and B. Girod, "Digital watermarking of raw and compressed video," in Proc. European EOS/SPIE Symposium on Advanced Imaging and Network Technologies, Berlin, Germany, October 1996.
[12] ÔÇöÔÇö, "Digital watermarking of MPEG-2 coded video in the bitstream domain," in Procs of the Int-l Conference on Acoustics, Speech, and Signal Processing, vol. 4, Munich, Germany, 1997, pp. 2621-2624.
[13] F. Hartung and M. Kutter, "Multimedia watermarking techniques," Procs of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
[14] A. Geist, A. Beguelin, J. Dongarra, and others., PVM: Parallel Virtual Machine. A Users- Guide and Tutorial for Networked Parallel Computing. The MIT Press, 1994.
[15] D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. on Information Theory, vol. 44, no. 9, pp. 1897-1905, 1998.
[16] Z. Lei and N. D. Georganas, "Rate adaptation transcoding for precoded video streams," in Procs of the 10th ACM Int-l Conference on Multimedia, Juan-les-Pins, France, 2002, pp. 127-136.
[17] M. Amielh and S. Devillers, "Bitstream syntax description language: Application of xml-schema to multimedia content adaptation," in Procs of the 11th Int-l World Wide Web Conference, Honolulu, Hawaii, USA, 2002.
[18] Y. Wang, J. Ostermann, and Y. Zhang, Video Processing and Communications. Prentice Hall, 2002.
[19] C. I. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525-539, 1998.
[20] A. B. Watson, "DCT quantization matrices visually optimized for individual images," in Human Vision, Visual Processing and Digital Display IV, ser. SPIE Procs, J. P. Allebach and B. E. Rogowitz, Eds., vol. 1913, S. Jose, CA, USA, Feb. 1993, pp. 202-216.
[21] C. Fei, D. Kundur, and R. H. Kwong, "Analysis and design of watermarking algorithms for improved resistance to compression," IEEE Trans. on Image Processing, vol. 13, no. 2, pp. 126-144, 2004.
[22] R. Liu and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Trans. on Multimedia, vol. 4, no. 1, pp. 121- 128, 2002.