Skip to main content

Digital Watermarking for the Authentication of AVS Video Sequences

  • Chapter
Multimedia Video-Based Surveillance Systems

Part of the book series: The Springer International Series in Engineering and Computer Science ((SECS,volume 573))

  • 172 Accesses

Abstract

A problem often raised by the availability of increasingly powerful signal processing tools is the lost of credibility of digital images and video sequences, due to the ease of modifying their content without leaving any visible traces of the modification. Such a problem assumes an outstanding importance in Advanced Video-based Surveillance (AVS) applications, where video sequences virtually have no value as proofs in front of a court of law, since doubts would always exist about the possibility that they had been tampered to intentionally incriminate or exculpate the defendant.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Schneier, “Applied Cryptography”, John Wiley and Sons, 1994.

    Google Scholar 

  2. G. L. Friedman, “The trustworthy digital camera: restoring credibility to the photographic image,” IEEE Trans. Consum. Electron., vol. 39, pp. 905–910, Nov. 1993.

    Article  Google Scholar 

  3. F. Mintzer, G. W. Braudaway, and M. M. Yeung, “Effective and ineffective digital watermarks,” in Proc. ICIP’97, IEEE Int. Conf. on Image Processing, Santa Barbara, CA, October 1997, vol. III, pp. 223–226.

    Google Scholar 

  4. A. Piva, M. Barni, F. Bartolini, V. Cappellini, “Application-driven requirements for digital watermarking technology”, in Technologies for the Information Society: Developments and Opportunities, J.Y. Roger et al. (eds): Proceedings of EMMSEC 98, European Multimedia, Mircoprocessor System and Electronic Commerce Conference and Exhibition, IOS Press, pp.513–520, 28-30 September 1998.

    Google Scholar 

  5. A. Piva, M. Barni, F. Bartolini, V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original images”, Proceedings of ICIP’97, IEEE International Conference on Image Processing, pp. 520–523, Santa Barbara CA, USA, October 26-29, 1997.

    Google Scholar 

  6. S. Craver, N. Memon, B. L. Yeo, M. M. Yeung, “Resolving rightful ownership with invisible watermarking techniques: limitations, attacks and implications”, IEEE Journal of Selected Areas in Communications, vol. 4, no. 16, pp. 573–586, May 1998.

    Article  Google Scholar 

  7. M. D. Swanson, M. Kobayashi, A. H. Tewfik, “Multimedia data-embedding and watermarking technologies”, Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, June 1998.

    Article  Google Scholar 

  8. F. Hartung, M. Kutter, “Multimedia watermarking techniques”, Proceedings of the IEEE, vol. 87, no. 7, pp. 1079–1107, July 1999.

    Article  Google Scholar 

  9. F. Bartolini, M. Barni, V. Cappellini, A. Piva, “Mask building for perceptually hiding frequency embedded watermarks ”, Proceedings of ICIP’98, IEEE International Conference on Image Processing, vol. I, pp. 450–454, October 4-7, Chicago, USA.

    Google Scholar 

  10. R.B. Wolfgang, C. I. Podilchuk, E. J. Delp, “Perceptual watermarks for digital images and video”, Proceedings of the IEEE, vol. 87, no. 7, pp. 1108–1126, July 1999.

    Article  Google Scholar 

  11. M. Barni, F. Bartolini, V. Cappellini, A. Piva, F. Rigacci, “A MAP identification criterion for DCT-based watermarking”, Signal Processing IX, Theories and Applications, Proceedings of EUSIPCO-98, Ninth European Signal Processing Conference, pp. 17–20, Rodos,, Greece, 8-11 September 1998.

    Google Scholar 

  12. A. De Rosa, M. Barni, F. Bartolini, V. Cappellini, A. Piva, “Optimum decoding of nonadditive full frame DFT watermarks”, Proceedings of Third International Workshop on Information Hiding, pp. 159–171, 29 September — 1 October, 1999, Dresden, Germany.

    Google Scholar 

  13. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. IEEE Int. Conf. on Image Processing, Texas, 13-16, Nov. 1994, vol. II, pp. 86–90.

    Google Scholar 

  14. S. Walton, “Image authentication for a slippery new age,” in Dr. Dobb’s Journal of Software Tools for Professional Programmers, vol. 20, April 1995.

    Google Scholar 

  15. L. Xie and G. R. Arce, “A blind wavelet based digital signature for image authentication, ” in Proc. EUSIPCO-98, IX European Signal Proc. Conf., Rodos, Greece, September, 8-11 1998.

    Google Scholar 

  16. J. Hernandez, F. Perez-Gonzalez, J. Rodriguez, G. Nieto, “Performance analysis of a 2D multipulse amplitude modulation scheme for data hiding and watermarking of still images,” IEEE Journ. of Sel. Areas in Commun., vol. 16, no. 4, pp. 510–524, May 1998.

    Article  Google Scholar 

  17. P. Bouthemy, P. Lalande, “Recovery of moving objects masks in an image sequence using local spatio-temporal contextual information”, Optical Engineering, vol.32, no.6, pp.1205–1212, June 1993.

    Article  Google Scholar 

  18. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking, ” Signal Processing, vol. 66, no. 3, pp. 357–372, May 1998.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer Science+Business Media New York

About this chapter

Cite this chapter

Barni, M., Bartolini, F., Cappellini, V., Piva, A. (2000). Digital Watermarking for the Authentication of AVS Video Sequences. In: Foresti, G.L., Mähönen, P., Regazzoni, C.S. (eds) Multimedia Video-Based Surveillance Systems. The Springer International Series in Engineering and Computer Science, vol 573. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-4327-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-4327-5_16

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-6943-1

  • Online ISBN: 978-1-4615-4327-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics