Summary
This chapter examines the problems with temporal synchronization in video watermarking and describes a new method for efficient synchronization and resynchronization. In our method, efficient synchronization is achieved by designing temporal redundancy in the structure of the watermark. Temporal redundancy allows the watermark detector to establish and maintain synchronization without performing an extensive search in the watermark key space. Our method does not use synchronization templates that may be subject to attack and increase the visibility of the watermark. Another advantage of our technique is that the watermark structure is video-dependent, which enhances security.
The technique is implemented using a spatial-domain watermark on uncompressed video and a finite state machine watermark key generator. The implementation illustrates the effectiveness of using temporal redundancy for synchronization, and is shown to be resilient to desynchronization attacks such as frame dropping, frame insertion, local frame transposition, and frame averaging. Our method for synchronization is independent of the embedding method and can be used with a wide class of watermark embedding and detection techniques, including those for other time-varying signals such as digital audio.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., 66(3):283–301 (1998).
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., 6(12):1673–1687 (1997).
R. Wolfgang, C. Podilchuk, and E. Delp, “Perceptual watermarks for digital images and video,” Proc. IEEE 87(7):1108–1112 (1999).
F. Petitcolas, R. Anderson, and M. Kuhn, “Attacks on copyright marking systems,” Proceedings of the Second International Workshop in Information Hiding, April 14–17, 1998, pp. 218–238.
G. Braudaway and F. Mintzer, “Automatic recovery of invisible image watermarks from geometrically distorted images,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 24–26, 2000, pp. 74–81.
E.T. Lin, C.I. Podilchuk, T. Kalker, and E. J. Delp, “Streaming video and rate scalable compression: What are the challenges for watermarking?,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents III, San Jose, CA, January 22–25, 2001, pp. 116–127.
E. Lin, G. Cook, P. Salama, and E. Delp, “An overview of security issues in streaming video,” Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV, April 2–4, 2001, pp. 345–348.
A. Eskicioglu and E. Delp, “An overview of multimedia content protection in consumer electronics devices,” Signal Process. Image Commun., 16:681–699 (2001).
I. Cox, M. Miller, and J. Bloom, Digital Watermarking, (Morgan Kauffman Publishing, San Fransisco, 2002).
F. Deguillaume, G. Csurka, J. O’Ruanaidh, and T. Pun, “Robust 3D DFT video watermarking,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, January 25–27, 1999, pp. 113–124.
A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, “The watermark template attack,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, January 22–25, 2001, pp. 394–405.
T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A video watermarking system for broadcast monitoring,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, January 25–27, 1999, pp. 103–112.
M. Holliman, W. Macy, and M. Yeung, “Robust frame-dependent video watermarking,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 24–26, 2000, pp. 186–197.
B. Mobasseri and A. Evans, “Content-dependent video authentication by self-watermarking in color space,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, January 22–25, 2001, pp. 35–44.
G. Langelaar and R. Lagendijk, “Optimal differential energy watermarking of DCT encoded images and video,” IEEE Trans. Image Process., 10(1):148–158 (2001).
E. Lin and E. Delp, “Temporal Synchronization in Video Watermarking-Further Studies,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara, CA, January, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Delp, E.J., Lin, E.T. (2005). Watermarking Streaming Video: The Temporal Synchronization Problem. In: Javidi, B. (eds) Optical and Digital Techniques for Information Security. Advanced Sciences and Technologies for Security Applications, vol 1. Springer, New York, NY . https://doi.org/10.1007/0-387-25096-4_7
Download citation
DOI: https://doi.org/10.1007/0-387-25096-4_7
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-20616-5
Online ISBN: 978-0-387-25096-0
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)