Skip to main content

Watermarking Streaming Video: The Temporal Synchronization Problem

  • Chapter
Optical and Digital Techniques for Information Security

Part of the book series: Advanced Sciences and Technologies for Security Applications ((ASTSA,volume 1))

  • 693 Accesses

Summary

This chapter examines the problems with temporal synchronization in video watermarking and describes a new method for efficient synchronization and resynchronization. In our method, efficient synchronization is achieved by designing temporal redundancy in the structure of the watermark. Temporal redundancy allows the watermark detector to establish and maintain synchronization without performing an extensive search in the watermark key space. Our method does not use synchronization templates that may be subject to attack and increase the visibility of the watermark. Another advantage of our technique is that the watermark structure is video-dependent, which enhances security.

The technique is implemented using a spatial-domain watermark on uncompressed video and a finite state machine watermark key generator. The implementation illustrates the effectiveness of using temporal redundancy for synchronization, and is shown to be resilient to desynchronization attacks such as frame dropping, frame insertion, local frame transposition, and frame averaging. Our method for synchronization is independent of the embedding method and can be used with a wide class of watermark embedding and detection techniques, including those for other time-varying signals such as digital audio.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., 66(3):283–301 (1998).

    Article  MATH  Google Scholar 

  2. I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., 6(12):1673–1687 (1997).

    Article  ADS  Google Scholar 

  3. R. Wolfgang, C. Podilchuk, and E. Delp, “Perceptual watermarks for digital images and video,” Proc. IEEE 87(7):1108–1112 (1999).

    Article  Google Scholar 

  4. F. Petitcolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems,” Proceedings of the Second International Workshop in Information Hiding, April 14–17, 1998, pp. 218–238.

    Google Scholar 

  5. G. Braudaway and F. Mintzer, “Automatic recovery of invisible image watermarks from geometrically distorted images,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 24–26, 2000, pp. 74–81.

    ADS  Google Scholar 

  6. E.T. Lin, C.I. Podilchuk, T. Kalker, and E. J. Delp, “Streaming video and rate scalable compression: What are the challenges for watermarking?,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents III, San Jose, CA, January 22–25, 2001, pp. 116–127.

    Google Scholar 

  7. E. Lin, G. Cook, P. Salama, and E. Delp, “An overview of security issues in streaming video,” Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV, April 2–4, 2001, pp. 345–348.

    Google Scholar 

  8. A. Eskicioglu and E. Delp, “An overview of multimedia content protection in consumer electronics devices,” Signal Process. Image Commun., 16:681–699 (2001).

    Article  Google Scholar 

  9. I. Cox, M. Miller, and J. Bloom, Digital Watermarking, (Morgan Kauffman Publishing, San Fransisco, 2002).

    MATH  Google Scholar 

  10. F. Deguillaume, G. Csurka, J. O’Ruanaidh, and T. Pun, “Robust 3D DFT video watermarking,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, January 25–27, 1999, pp. 113–124.

    ADS  Google Scholar 

  11. A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, “The watermark template attack,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, January 22–25, 2001, pp. 394–405.

    ADS  Google Scholar 

  12. T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A video watermarking system for broadcast monitoring,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, January 25–27, 1999, pp. 103–112.

    ADS  Google Scholar 

  13. M. Holliman, W. Macy, and M. Yeung, “Robust frame-dependent video watermarking,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 24–26, 2000, pp. 186–197.

    ADS  Google Scholar 

  14. B. Mobasseri and A. Evans, “Content-dependent video authentication by self-watermarking in color space,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, January 22–25, 2001, pp. 35–44.

    ADS  Google Scholar 

  15. G. Langelaar and R. Lagendijk, “Optimal differential energy watermarking of DCT encoded images and video,” IEEE Trans. Image Process., 10(1):148–158 (2001).

    Article  MATH  ADS  Google Scholar 

  16. E. Lin and E. Delp, “Temporal Synchronization in Video Watermarking-Further Studies,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara, CA, January, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Delp, E.J., Lin, E.T. (2005). Watermarking Streaming Video: The Temporal Synchronization Problem. In: Javidi, B. (eds) Optical and Digital Techniques for Information Security. Advanced Sciences and Technologies for Security Applications, vol 1. Springer, New York, NY . https://doi.org/10.1007/0-387-25096-4_7

Download citation

Publish with us

Policies and ethics