International Journal of Electronics and Communications (AEÜ)

Size: px
Start display at page:

Download "International Journal of Electronics and Communications (AEÜ)"

Transcription

1 Int. J. Electron. Commun. (AEÜ) 66 (2012) Contents lists available at SciVerse ScienceDirect International Journal of Electronics and Communications (AEÜ) jou rn al h omepage: A real-time dual watermarking algorithm of H.264/AVC video stream for Video-on-Demand service He Yingliang, Yang Gaobo, Zhu Ningbo College of Computer and Communication, Hunan University, Changsha, China a r t i c l e i n f o Article history: Received 23 June 2010 Accepted 19 August 2011 Keywords: Video watermarking H.264/AVC Video-on-Demand CDMA a b s t r a c t A real-time dual watermarking algorithm of H.264/AVC compressed video is proposed for Video-on- Demand (VOD) service. The copyright information and user information are modulated by CDMA spreading strategies as watermark. At the encoder side, copyright information is embedded into the first non-zero coefficient of Intra 4 4 coded blocks in the luminance components of I frames. An effective error compensation mechanism is simultaneously introduced into the embedding process, which strictly restricts the distortion caused by quantization and watermark embedding within a step size of quantization. At the server side, a XOR based mapping rule is utilized for watermark embedding because the number of non-zero coefficients after quantization is quite less in P frames. Every two bits of the private user information is mapped to three non-zero coefficients of P frames. Experimental results on test sequences demonstrate that the proposed approach has just slight influence on bit rate and PSNR with real-time performance for VOD services, and achieves the dual purposes of copyright protection and pirate tracking Elsevier GmbH. All rights reserved. 1. Introduction Digital watermarking has recently been used as a complementary protection mechanism enabling pirated contents to be tracked back to the authorized user from which they originated [1]. Compared with traditional encryption solution, video watermarking technique can protect the copyright by embedding both ownerspecific and user-specific information (watermark) into the digital media. Since the watermark can only be detected or removed by the originator, it can be used to identify the copyright owner and to track the illegal distributor. In fact, video watermarking techniques can be exploited for different purposes. For example, digital watermarks are typically used in copy control applications to prevent unauthorized copying. In broadcast monitoring application, the watermark can verify the video being broadcast. Digital fingerprints can be embedded into a video to trace back a malicious user. Watermarking based content authentication schemes can judge whether the media content has been altered and even locate the modified positions. In recent years, multi-purpose video watermarking techniques have Corresponding author at: College of Computer and Communication, Hunan University, Lushan Road, Changsha, Hunan , China. Tel.: address: gbyang hunu@hotmail.com (G. Yang). been proposed to integrate two or three above schemes to achieve multiple objectives [2]. Video-on-Demand (VOD) has been widely used to provide an alternative channel to conventional TV. IEEE , the recently proposed wireless broadband access standard (WiMax), has significant support for VOD services [3]. Meanwhile, copyright protection of digital media has become a major concern for content providers who support large scale VOD systems [4]. Copyright owners (e.g., movie studios) do not want to risk their material potentially being pirated after it is digitally transmitted, unless there is reliable content protection such as video watermarking. In the VOD service system, video is distributed from a centralized location like the local central office. A customer can signal the network to select a movie, and the network will start transmission within a reasonable time. Different from conventional video watermarking, copyright protection for VOD service should meet others specific requirements. First, real-time performance is very important. Since VOD servers usually use compression techniques to reduce the storage and bandwidth requirements, it is impractical to firstly decode the video bit-stream, and then embed a watermark, and finally re-encode it. An alternative approach is to embed the watermark directly in compressed domain. Second, for different users, the watermarked video should be different so as to trace back a malicious user. Third, the influence of the bit rate changes caused by watermarking during the transmission of video streams should be considered since video is usually transmitted to users via networks with varying bandwidth /$ see front matter 2011 Elsevier GmbH. All rights reserved. doi: /j.aeue

2 306 Y. He et al. / Int. J. Electron. Commun. (AEÜ) 66 (2012) Fig. 1. System overview of the proposed approach. To the best of our knowledge, although the idea of compresseddomain video watermarking [5] is not new, video watermarking schemes specifically designed for VOD services, are few publicly reported. Wang [6] et al. proposed a real-time video watermarking scheme based on a parallel MPEG-2 engine. It embeds subscriber-specific watermark signature to the 8 8 DCT blocks of compressed video stream. Its main contribution lies in the buffer sharing mechanism with a dynamic allocation algorithm to significantly reduce the memory demand within this parallel watermarking software. The watermark algorithm is robust against various temporal attacks, and can provide satisfactory performance for large scale video distribution networks. However, it cannot realize blind detection and the demand for buffer size is great. The latest video coding standard H.264/AVC is expected to be more widely used in the future instead of MPEG-2 because of its higher compression efficiency. However, new features such as variable block size motion estimation/compensation, directional spatial prediction in intra-coded frame and context-adaptive entropy coding have been adopted in H.264/AVC. These features bring new challenges because of less redundancy existed in video stream compressed with H.264/AVC. Zhang et al. [7] proposed a robust video watermarking scheme for H.264/AVC, which can survive transcoding process and strong common signal processing attacks. Maneli et al. [8] proposed a framework for robust watermarking of H.264-encoded video with controllable detection performance. The Watson visual model is exploited for a 4 4 DCT block to obtain a larger payload and a greater robustness while minimizing visual distortion. Spyridon et al. [9] proposed a new method for data hiding in H.264/AVC streams, which exploits the IPCM encoded macroblocks during the intra prediction stage in order to hide the desired data. However, all these approaches are not proposed for VOD services and cannot achieve pirate tracking. Therefore, it is worthy of investigation to devise a new video watermarking scheme for H.264/AVC based VOD services. Dual video watermarking, which embeds two different watermarks to resist different types of attacks and complement each other, is suitable for VOD services. In this paper, a real-time dual video watermarking algorithm is proposed for H.264/AVC bitstream in VOD streaming application. Copyright information as well as private user information is modulated as watermark by code division multiple access (CDMA) technique because of its excellent performance in spread spectrum. At the encoder side, copyright information is embedded into the first non-zero coefficient of the Intra 4 4 coded blocks in the luminance component of I frames. To decrease the visual distortion caused by quantization and watermarking, an effective error compensation mechanism is introduced in the embedding process. At the side of sever, a XOR based mapping rule is exploited for watermark embedding in P frames. Every two bits of the private user information is mapped to three non-zero coefficients of P frames. The proposed approach can accomplish the dual purposes of copyright protection and pirate tracking for VOD services. The rest paper is organized as follows: Section 2 briefly describes the block diagram of VOD system with real-time watermarking embedding. In Section 3, the proposed dual watermarking is discussed in detail. Experimental results are illustrated in Section 4. Section 5 concludes this paper. 2. System overview Our watermark embedding algorithm is intended to use at the local video distributor who directly delivers video to the end users (subscribers). In such systems, a common video content must be watermarked to distinguish between different versions being delivered to many subscribers [5]. The system framework of the proposed approach is illustrated in Fig. 1. In WiMax (or other access networks), video is transported from a content storage facility to the head end, which further distributes the content to subscribers. In this architecture, video stream is watermarked during the encoder process with copyright information in digitalize producer studio, and then is stored in local storage stations. At the head end, the video stream is embedded with watermark signature for a specific subscriber. Since the input to head end from local storage station is compressed video, the user-specific watermark information is embedded directly in compressed domain, without fully decoding the input compressed video and re-encoding it for watermark signature embedding. Finally, the video with dual watermarks is sent out to different subscribers via WiMax downlink. Since different video streams that contain the same copyright information and unique subscribe information as watermark are provided for different users, the source of illegal copies as legal evidence can be identified by the watermark extraction and verification process when needed. For the H.264/AVC video coding standard, its high compression efficiency presents a major challenge for any video watermarking approach specifically designed for it. For example, unlike previous coding standards MPEG-2 and MPEG-4, the residual macroblocks in H.264/AVC intra coded frames are obtained by spatial prediction within a frame. Therefore, the intra coded frames consist mainly of residual data. After quantization, the majority of these residual

3 Y. He et al. / Int. J. Electron. Commun. (AEÜ) 66 (2012) BER of extracted watermark P frame I frame PSNR of video frames P frame I frame BER (%) N PSNR (db) N Fig. 2. The impact of length of the spread spectrum sequences N for Stefan sequence attacked by re-encoding (Left: the bit error rate of the extracted watermark; right: the average PSNR value between the original video frames and the watermarked ones). coefficients are near to zero, which makes it extremely difficult to embed watermark information without degrading the video quality and increasing the bit rate. In the above system, to meet with the copyright protection requirements of VOD service, the dual watermarking algorithm is specifically devised by taking the characteristics of H.264/AVC into consideration. For the copyright watermark, it is directly embedded into compressed video stream before the satellite uplink, which greatly reduces the computational complexity. Moreover, the coded block pattern (CBP) parameter is utilized to avoid watermark being embedded into those blocks with all zero coefficients, so as to guarantee only slight change of bitrate. For the user-specific watermarking, unique user information for each subscriber is directly embedded in compressed domain to achieve real-time performance, and XOR based mapping rule is exploited to lower the burden of bandwidth. 3. Proposed watermark schemes 3.1. Watermark pre-processing by CDMA The appeal of spread spectrum in watermarking is understandable. Digital video, by virtue of its time-space property, fits the direct sequence spread spectrum more readily. CDMA is an application of direct sequence spread spectrum. The application of CDMA to watermarking seems obvious. The goal is to use near-orthogonal watermarks. The advantages of CDMA lies in that it combines multiple signals that overlap in both time and frequency yet remain separable. The separability is achieved by first projecting individual messages onto near-orthogonal PN sequences prior to carrier modulation. Owing to the near-orthogonal sequences of CDMA spread spectrum strategy, the robustness and imperceptibility of the watermarking can be strengthened simultaneously [10]. To improve the robustness of dual-watermarking system, both copyright information and user-specific information are modulated by CDMA technique as watermark before embedding. Assuming the dual-watermark modulated by BPSK is arranged as the matrix form B = [b ij ] 1 i N1,1 j M, and the generated Gold sequences set can be denoted as G = {g k (n)} 1 k M,1 n N, where g k (n) {+1, 1} and M,N represent the number and length of the spread spectrum sequences, respectively. We obtain the matrix of information encoded by CDMA C = [C ij ] 1 i N1,1 j N as follows C = B GZ M i.e. C ij = b ik g k (j) k=1 Since C is an integral matrix, it must be translated into the binary representation before watermark embedding. The actual watermark after binary representation is supposed to be W. At the receiver, Ŵ is the estimated watermark extracted from W, which can be restructured as Ĉ = [Ĉ ij ] 1 i N1,1 j N. In the rest of this section, we will discuss the details of the decoding procedure of CDMA and its affection to robustness separately. (1) Without errors occurring in the extraction process With this assumption, we can get Ĉ = [Ĉ ij ] 1 i N1,1 j N = [C ij ] 1 i N1,1 j N = C, and can utilize the correlation detection to reconstruct the original watermark. N O ˆB = Ĉ G T = C G T = B G G T = B... (2) O N M M where ˆB = [ˆb ij ] 1 i N1,1 j M. Formula (2) is directly obtained from the orthogonal property of the Gold sequences. Obviously, the original watermark can be extracted as follows: if ˆb ij > 0, i.e. b ij > 0, then ŵ ij = w ij = 0; otherwise ŵ ij = w ij = 1. So, the original watermark can be completely recovered. (2) With some errors in the extraction process Without loss of generality, it is often regarded that white Gaussian noise exists in the extraction process for ŵ ij = w ij = 1, that is Ĉ ij = C ij + n, where n is a Gaussian random variable with zero mean and variance 2, i.e. n N(0, 2 ). So the bit error ratio (BER) of watermark after correlation detection is: P CDMA e = P(ˆb ij < 0 b ij = +1) P(b ij = +1) + P(ˆb ij > 0 b ij (1)

4 308 Y. He et al. / Int. J. Electron. Commun. (AEÜ) 66 (2012) = 1) P(b ij = 1) (3) For the sake of simplicity, supposing P(b ij = +1) = P(b ij = 1) = 1/2, then Eq. (3) can be simplified as: P CDMA e = 1 2 [P(ˆb ij < 0 b ij = +1) + P(ˆb ij > 0 b ij = 1)] (4) Considering the relationship between ˆB = [ˆb ij ] 1 i N1,1 j M and Ĉ = [Ĉ ij ] 1 i N1,1 j N, we can draw the conclusion that ˆb ij N( N b ij, 2 ). When b ij = +1, ˆb ij N( N, 2 ), otherwise, ˆb ij N( N, 2 ). Then, Eq. (4) can be rewritten as: [ Pe CDMA = e (x 2 N) 2 2 dx e (x+ 2 N) 2 2 dx ] = Q ( N ) where Q (x) = (1/ + 2) e (t2 /2) dt, Q(x) is monotonically x decreasing because Q (x) = (e (x2 /2) / 2) < 0. On the other hand, the BER of watermark information without pre-processing by CDMA is P e = Q (1/ 2). Apparently, Pe CDMA is smaller than P e, which means that the introduction of CDMA can strengthen the robustness of watermarking algorithm. Moreover, the larger the N, the smaller the Pe CDMA. Nevertheless, the video quality will become worse and PSNR will be lower along with the increasing of N. Therefore, it is important to choose an appropriate N. Fig. 2 illustrates the influence of N to the robustness and imperceptibility of the watermarking. In the following, N is selected to 16 by experiment, which is compatible with the result of Fig Watermark embedding process of copyright information The Integer Transform (IT), a derivative of the 4 4 DCT, has been adopted in H.264/AVC standard for coding image blocks in residual data. The low-frequency coefficients of transformed residue are of high energy and their relative sizes are stable. Therefore, the low-frequency coefficients are utilized for watermark embedding. The coded block pattern (CBP) parameter in the H.264/AVC coder specifies which 8 8 block has non-zero coefficients. If the CBP parameter of a block is zero, it represents that all its DCT coefficients are zero. Therefore, CBP can be utilized to avoid watermark embedded into those blocks with all zero coefficients, and thus the change of bitrate by watermark embedding can be guaranteed to be minor. Copyright information is embedded into the coefficients of I frame after quantization. Let I L be the luminance component of I frame after quantization and len be the bits in the watermark to be embedded, the embedding process is as follows. (5) Fig. 3. Raster-scan order. If appropriate T is determined, these I4 blocks can be represented with a set V, V = {I4 1, I4 2, I4 3 I4 num } Step 2: Compute the quantization errors H.264/AVC adopts some new coding features to decrease the visual distortion, which is mainly caused by the rounding operation of quantization. Let F be the transform coefficients and FQ be the coefficients after quantization, the forward quantization operation is represented as: ( F ) FQ = round QP where QP is quantization step size and round(*) is the rounding operation. The inverse quantization is represented as follows: F = FQ QP (7) where F is the recovered coefficient by inverse quantization. Apparently, the error E caused by quantization can be defined as: E = F F (8) Watermark embedding may increase this kind of error because it usually modifies the DCT coefficients, which will further degrade the visual quality. Therefore, an error compensation mechanism is essential to decrease the errors caused by quantization and watermark embedding. During watermark embedding, an error function is defined for the first non-zero coefficient in the ith I4 block as follows: E(I4 i (1)) = abs(f(i4 i (1))) abs(f (I4 i (1))) (1 i num) (9) It is generally believed that the smaller is abs(e), the less it degrades the visual quality. (6) Step 1: finding the most appropriate T A statistics is made to those I4 blocks if they satisfy the following two requirements: First, its CBP does not equal zero. Second, the first non-zero coefficient is larger than T. The scanning order of DCT coefficients is illustrated in Fig. 3. Supposing num is the number of these I4 block. Obviously, the size of T can be used to adjust the embedding capacity, which should be adaptively determined. For different video sequences, it is determined in an iterative way on the basis of a pre-defined initial value by experience. The iterative process is defined as follows: (1) if num len then T = T 1; (2) Re-count num; go to (1) until num > len Step 3: watermark embedding and error compensation Most of the elements I4 i (1) in V are the DC coefficients. It is generally believed that they are more preferable to be embedded with watermark than AC components. However, if watermark is only embedded into DC components, it cannot resist collusion attack. In this paper, the DC coefficients as well as the low frequency AC coefficients are utilized for watermark embedding. Moreover, their absolute values are relatively large, which guarantees the relative changes of these coefficients by watermark embedding will be small. If the watermark bit to be embedded equals 1, I4 i (1) is modulated to be even according to the error compensation mechanism. Similarly, if the watermark bit be 1, I4 i (1) is modulated to be odd. Let sign(*) be the sign function and I4 i (1) w be the

5 Y. He et al. / Int. J. Electron. Commun. (AEÜ) 66 (2012) Fig. 4. The visual impact before and after watermarking. watermarked I4 i (1), the process of watermark embedding is illustrated as follows: embedding. H.264/AVC allows tree-structured partitioning motion estimation with 1/4 pixel accuracy for luminance components to if W1 = 1 abs(i4 i (1)) + 1, if I4 i (1) mod2 = 1&E(I4 i (1)) 0 I4 i (1) w abs(i4 = sign(i4 i (1)) i (1)) + 1, if I4 i (1) mod2 = 1&abs(I4 i (1)) = T + 1&E(I4 i (1)) < 0 abs(i4 i (1)) 1, if I4 i (1) mod2 = 1&abs(I4 i (1)) > T + 1&E(I4 i (1)) < 0 abs(i4 i (1)), else if W1 = 1 abs(i4 i (1)) + 1, if I4 i (1) mod2 = 0&E(I4 i (1)) 0 I4 i (1) w abs(i4 = sign(i4 i (1)) i (1)) + 1, if I4 i (1) mod2 = 0&abs(I4 i (1)) = T + 1&E(I4 i (1)) < 0 abs(i4 i (1)) 1, if I4 i (1) mod2 = 0&abs(I4 i (1)) > T + 1&E(I4 i (1)) < 0 abs(i4 i (1)), else If abs(f(i4 i (1))) is larger than abs(f (I4 i (1))), it reflects that the decimal part which is less than 0.5 is omitted. In this instance, if it needs to be modified because of watermark embedding, subtracting one from abs(i4 i (1)) will further enlarge the visual distortion. Actually, the copyright information embedding algorithm adds 1 to abs(i4 i (1)) to compensate this kind of errors and makes abs(f(i4 i (1))) less than abs(f (I4 i (1))). Though there are still errors in E(I4 i (1)), the absolute value of error is very small. The change of original data is less than a step size of quantization, and it is about one half of step size under ideal circumstances. On the contrary, when abs(f(i4 i (1))) is less than abs(f (I4 i (1))), abs(i4 i (1)) should decrease one as abs(i4 i (1)) > T + 1 and augment one as abs(i4 i (1)) > T + 1, which guarantees the first non-zero coefficient is larger than T. Therefore, the quantization error can be well compensated during the process of watermark embedding Watermark embedding process for user-specific information To protect the copyright and trace the origin of piracy, different user-specific watermark information should be embedded for different subscriber. At the server of VOD, the first P frame of every GOP in the H.264/AVC stream is selected for watermark achieve higher compression efficiency, which makes the non-zero coefficients of residue rather less. To decrease the change of bitrate as less as possible, watermark is usually embedded into the nonzero coefficients. However, the lack of the non-zero coefficients will influence the watermark capacity ultimately. To solve this problem, matrix coding is exploited to map two bits of watermark to every three non-zero coefficients and only one coefficient is necessary to be modified trivially. Supposing every authorized user is assigned with a legal ID, such as the number of his/her personal identification card. Obviously, this kind of ID can be distinguished from each other, and further be used as watermark to trace the illegal distribution. The watermark embedding process details as follows: Step 1: selection of candidate block for watermark embedding Supposing P L be the luminance component of the first P frame in every GOP, the number of I4 blocks after integer transform will be W P H P /16 if P L is of size W P H P. Let P4 i (1 i W P H P /16) be an I4 block, the candidate blocks for watermark embedding should meet the following two requirements simultaneously: (1) its CBP does not equal 0; (2) there are at least three non-zero DCT coefficients.

6 310 Y. He et al. / Int. J. Electron. Commun. (AEÜ) 66 (2012) x bit/frame psnr (db) without watermark 1.37 watermarking with compensation watermarking without compensation 1.36 watermarking algorithm in [5] frame (a) bitrate change of I frame without watermark watermarking with compensation watermarking without compensation watermarking algorithm in [5] frame (b) PSNR change of I frame 2 x bit/frame without watermark 0.8 with watermark frame (c) bitrate change of P frame psnr (db) without watermark with watermark frame (d) PSNR change of P frame Fig. 5. The bitrate and PSNR before and after watermarking Step 2: map rule for watermark embedding Every two bits of watermark is embedded into a candidate I4 block. Let P4 i (1), P4 i (2) and P4 i (3) be the first three non-zero coefficients as the scan order illustrated in Fig. 2, and a, b and c be the remainder of them when they are divided by 2, respectively. The mapping rule is defined as follows: if W2(i) = 00 (i = 1, 2,, length(w2)/2) 3.4. Watermark extraction process The watermark extraction process corresponds to the dual of the embedding process. The watermarked H.264/AVC stream is partially decoded to obtain the DCT coefficients of I and P frames after quantization. For each I frame, the value of T is first determined as it does in watermark embedding. If the first non-zero coefficient of I4 block is larger than T, this block can be assured to have watermark ( W2 ) if W2(i) = 00 (i = 1, 2,, length 2 P4 i (1) w = P4 i (1) P4 i (2) w = P4 i (2) P4 i (3) w = P4 i (3) if a b = 0 b c = 0 P4 i (1) w = P4 i (1) P4 i (2) w = P4 i (2) P4 i (3) w = P4 i (3) ± 1 if a b = 0 b c = 1 P4 i (1) w = P4 i (1) ± 1 P4 i (2) w = P4 i (2) P4 i (3) w = P4 i (3) if a b = 1 b c = 0 P4 i (1) w = P4 i (1) P4 i (2) w = P4 i (2) ± 1 P4 i (3) w = P4 i (3) if a b = 1 b c = 1 (10) where is logical XOR operation, and length(w2) denotes the length of the watermark W2. It should accord to the sign of P4 i (l)(l = 1,2,3) to select ±, which ensures the change of the video to be minor and does meet the requirement of imperceptibility. It is done in the similar way for the rest three occasions; therein the watermark bits to be embedded are 01, 10 or 11. Apparently, there are no computation-intensive operations in the above watermark embedding process. Furthermore, only partial decoding of input video stream is needed. Therefore, the requirement for buffer size is low and it can meet the real-time performance. in it. Let I4 i (1) w be the first non-zero coefficients of I4 block, the copyright information detection process describes as follows: if I4 i (1) w > T { W1 = 0 if I4 i (1) w mod 2 = 0 W1 = 1 else (11) For the first P frame in every GOP, if there are at least three nonzero coefficients in P4 block, it indicates that there are two bits of user-specific information mapped into this block. Let P4 i (1) w,

7 Y. He et al. / Int. J. Electron. Commun. (AEÜ) 66 (2012) Table 1 The comparison of bitrate and PSNR for various video sequences. 0 (I) 1 (P) 8 (I) 9 (P) 12 (I) 13 (P) Container Original frame PSNR BIT Watermarked frame PSNR BIT Stefan Original frame PSNR BIT Watermarked frame PSNR BIT Bus Original frame PSNR BIT Watermarked frame PSNR BIT P4 i (2) w and P4 i (3) w be the first three non-zero coefficients, a, b and c be the remainder of them divided by 2 respectively. The userspecific information detection process is as follows: Let a = P4 i (1) w mod 2, b = P4 i (2) w mod 2 and c = P4 i (3) w mod 2 W2 = 00 if a b = 0&b c = 0 W2 = 01 if a b = 0&b c = 1 (12) W2 = 10 if a b = 1&b c = 0 W2 = 11 if a b = 1&b c = 1 As discussed above, the extraction process does not require the participation of the original video stream and can be accomplished blindly. 4. Experimental results and discussion In order to verify the performance of the proposed approach, it has been tested on several video sequences with different motion complexity, such as Paris, Foreman, Stefan and Bus (in CIF format, 300 frames, GOP = IPPP, QP = 28). Foreman sequence is of moderate motion complexity and Paris is of nearly still background and small foreground motions, whereas Stefan and Bus sequences represent the acutely moving sequences. The original video streams are obtained by the H.264/AVC reference software version JM10.0, and the watermarking algorithm is integrated with the H.264/AVC coder Analysis of visual quality, bitrate and PSNR after watermark embedding To confirm the imperceptibility of the watermark embedding algorithm, we randomly extract some frames and compare the video frames before and after watermarking. Fig. 4 illustrates the experimental results for Paris sequence. Among them, (a) and (b) are the original I frame and P frame without watermark, and they denote the 21st and 50th frame of original sequence respectively. (c) and (d) are the corresponding watermarked frame of (a) and (b). There is no obvious difference of visual quality between the original frame and watermarked one, which mainly benefits from the mechanism of quantization error compensation for the copyright watermarking in I frame, and matrix coding based XOR embedding for the user-specific watermarking in P frame. The bitrate and PSNR of the former 60 watermarked frames of Paris sequence are given in Fig. 5. The same results of [6] are also used for comparison. From (a) and (c), it can be concluded that there are only very slight bitrate increase after watermark embedding. When quantization error compensation is used, it is just about 0.09% percent of bitrate increase for I frame, which is smaller than the work in [6]. For P frame, it is only about 0.15% percent of bitrate increase. The PSNR degradations for I and P frames by watermark embedding are about db and 0.07 db respectively, as illustrated in (b) and (d). Especially, the PSNR improves about 0.14 db compared with the work in [6], and the mechanism of quantization error compensation can improve the PSNR about 0.05 db on average. Table 1 describes the PSNR and bitrate for other three video sequences. For all of these sequences, the dual-watermark information is only embedded into six frames as listed in the first row of this table. Obviously, the average PSNR of these I frames degrades less than 0.1 db and the increase of bitrate is less than 0.2% on average. In addition, for the P frames, the average changes of PSNR and bitrate are also so trivial that it can guarantee the visual quality after watermark embedding. Therefore, our dual-watermarking algorithm is of high transparency Robustness analysis To further evaluate the performance of the proposed approach, the similarity between the original and extracted watermarks and BER (Bit Error Rate) of watermark are computed as follows: M N i=1 j=1 Sim = I(i, j) Î(i, j) M (13) N M N i=1 j=1 I2 (i, j) i=1 j=1î2 (i, j) M N i=1 j=1 BER = I(i, j) Î(i, j) 100% (14) M N where I and Î are the original watermark and the extracted watermark, respectively, and M, N are the size of watermark information. The higher the Sim is, or the less the BER is, the more the robust of the proposed approach is. When Sim = 1 or BER = 0, it reflects that there is no difference between the original watermark and the extracted one. In real-time video watermarking applications, we should consider the re-encoding attack during transmission and other kinds

8 312 Y. He et al. / Int. J. Electron. Commun. (AEÜ) 66 (2012) Table 2 The similarity of original watermark and extracted watermark. (Sim BER(%)) Foreman Stefan Bus I frame P frame I frame P frame I frame P frame No attacks (1 0) (1 0) (1 0) (1 0) (1 0) (1 0) Random noise 2 = 2 ( ) (1 0) ( ) (1 0) ( ) (1 0) 2 = 4 ( ) ( ) ( ) ( ) ( ) (1 0) Filtering Median ( ) (1 0) ( ) ( ) ( ) (1 0) Average ( ) ( ) ( ) ( ) ( ) ( ) Re-encoding R = 4 Mbps ( ) ( ) ( ) ( ) ( ) ( ) R = 2 Mbps ( ) ( ) ( ) ( ) ( ) ( ) Collusion attack ( ) ( ) ( ) ( ) ( ) ( ) Package dropping ratio = 5% ( ) ( ) ( ) ( ) ( ) ( ) ratio = 10% ( ) ( ) ( ) ( ) ( ) ( ) of attacks such as frame dropping, frame re-ordering, etc. To verify the robustness of the proposed approach, performance tests are conducted for the most common signal processing and reencoding attacks in video streaming. All of the experimental results are summarized in Table 2. For attacks such as adding random noise and filtering, Sim is larger than 0.92, and BER is less than 8.9%, which is owing to the introduction of CDMA for pre-processing. For the re-encoding attack with different constant bit rates, Sim is larger than 0.78, which is also acceptable for both copyright protection and pirate tracking. Since watermark information is repeatedly embedded into I frame and the first P frame of every GOP, the watermark information in multiple GOP can be gathered to rebuild watermark. Moreover, it is quite flexible to select the watermark embedding position for both I and P frames. Since user-specific watermark information is embedded into different positions of P frame, it makes the proposed approach robust to collusion attack and frame dropping, which is also verified in Table Complexity analyses From the above discussions, it is easily gained that the dual watermark embedding processes can be accomplished with simple operations. Actually, for the copyright watermark embedding, it only needs the manipulation of module-2 and comparison, and merely module-2 for the embedding of user-specific watermark. Furthermore, the input video stream does not need to be completely decoded for watermark embedding, which can meet with the real-time requirement of VOD systems. Assuming the length of embedding watermark bit is L, in the worst-case complexity, analysis can be submitted to O-notation, which refers to asymptotic upper bound of process. Based on this idea, we derive the complexity of the proposed embedding approaches is O(L), which indicates the complexity is linear with the length of the watermark bits. 6. Conclusions and future work In this paper, a dual watermarking algorithm is proposed for VOD services. Since the proposed approach does not need the full decoding of input H.264/AVC video stream, it is of low computational complexity and can meet the requirement of real time performance for VOD applications. In recent years, peer-to-peer (P2P) networks offer a tempting solution to the scalability problems of VOD streaming. A P2P VOD service is more challenging to design than a P2P live streaming system because, in addition to providing low start up delays, the system should also allow users arriving at arbitrary times to watch the video. The lack of synchronization among users reduces the block sharing opportunities and increases the complexity of the block transmission algorithms. Future research will focus on the watermarking of VOD service on P2P networks. Acknowledgements This work is supported in part by National Natural Science Foundation of China under grant , Key Project of Hunan Provincial Natural Science Foundation under grant 11JJ2053, and Special Pro-phase Project on National Basic Research Program of China under grant 2010CB References [1] Doërr G, Dugelay JL. A guide tour of video watermarking. Signal Processing: Image Communication 2003;18(4): [2] Wang Y, Lu Z, Fan L, Zheng Y. Robust dual watermarking algorithm for AVS video. Signal Processing: Image Communication 2009;24: [3] Do TT, Hua KA, Tantaoui MA. Robust video-on-demand streaming in peer-topeer environments. Computer Communications 2008;31: [4] Abdelhamid N, Sean M, Liam M. Analysis of a large-scale VOD architecture for broadband operators: a P2P-based solution. IEEE Communications Magazine 2008;4:7 55. [5] Ye D, Zou C, Dai Y, Wang Z. A new adaptive watermarking for realtime MPEG videos. Applied Mathematics and Computation 2007;185: [6] Wang J, Liu JCL, Masilela M. A real-time video watermarking system with buffer sharing for video-on-demand service. Computers and Electrical Engineering 2009;35: [7] Zhang J, Anthony Tony H, Gang Q, Pina M. Robust video watermarking of H.264/AVC. IEEE Transactions on Circuits and Systems II: Express Briefs 2007;54(2): [8] Maneli N, Russell M, Mersereau. A framework for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Transactions on Information Forensics and Security 2007;2(1): [9] Spyridon KK, Athanassios NS. Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams. Journal of Real-Time Image Processing 2009;4: [10] Zhang F, Li J, et al. A multiple copyright identification watermarking algorithm based on code division multiple access. High Technology Letters 2008;14(4):

H.264/AVC Video Watermarking Algorithm Against Recoding

H.264/AVC Video Watermarking Algorithm Against Recoding Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com H.264/AVC Video Watermarking Algorithm Against Recoding Rangding Wang, Qian Li, Lujian Hu, Dawen Xu College of Information

More information

Block-based Watermarking Using Random Position Key

Block-based Watermarking Using Random Position Key IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong

More information

Tampering Detection in Compressed Digital Video Using Watermarking

Tampering Detection in Compressed Digital Video Using Watermarking Tampering Detection in Compressed Digital Video Using Watermarking Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao School of Electrical Engineering and Computer Science (EECS),

More information

Advanced Video Coding: The new H.264 video compression standard

Advanced Video Coding: The new H.264 video compression standard Advanced Video Coding: The new H.264 video compression standard August 2003 1. Introduction Video compression ( video coding ), the process of compressing moving images to save storage space and transmission

More information

Chapter 10. Basic Video Compression Techniques Introduction to Video Compression 10.2 Video Compression with Motion Compensation

Chapter 10. Basic Video Compression Techniques Introduction to Video Compression 10.2 Video Compression with Motion Compensation Chapter 10 Basic Video Compression Techniques 10.1 Introduction to Video Compression 10.2 Video Compression with Motion Compensation 10.3 Search for Motion Vectors 10.4 H.261 10.5 H.263 10.6 Further Exploration

More information

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port

More information

Digital Video Processing

Digital Video Processing Video signal is basically any sequence of time varying images. In a digital video, the picture information is digitized both spatially and temporally and the resultant pixel intensities are quantized.

More information

streams cannot be decoded properly, which would severely affect the quality of reconstructed video. Therefore, error resilience is utilized to solve

streams cannot be decoded properly, which would severely affect the quality of reconstructed video. Therefore, error resilience is utilized to solve 3rd International Conference on Multimedia Technology(ICMT 2013) Video Error Resilience Scheme using Reversible Data Hiding Technique for Intra- Frame in H.264/AVC Ranran Li, Rangding Wang 1 Abstract.

More information

Week 14. Video Compression. Ref: Fundamentals of Multimedia

Week 14. Video Compression. Ref: Fundamentals of Multimedia Week 14 Video Compression Ref: Fundamentals of Multimedia Last lecture review Prediction from the previous frame is called forward prediction Prediction from the next frame is called forward prediction

More information

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 11, November 2011 pp. 6359 6367 A CAVLC-BASED VIDEO WATERMARKING SCHEME

More information

10.2 Video Compression with Motion Compensation 10.4 H H.263

10.2 Video Compression with Motion Compensation 10.4 H H.263 Chapter 10 Basic Video Compression Techniques 10.11 Introduction to Video Compression 10.2 Video Compression with Motion Compensation 10.3 Search for Motion Vectors 10.4 H.261 10.5 H.263 10.6 Further Exploration

More information

A NOVEL SCANNING SCHEME FOR DIRECTIONAL SPATIAL PREDICTION OF AVS INTRA CODING

A NOVEL SCANNING SCHEME FOR DIRECTIONAL SPATIAL PREDICTION OF AVS INTRA CODING A NOVEL SCANNING SCHEME FOR DIRECTIONAL SPATIAL PREDICTION OF AVS INTRA CODING Md. Salah Uddin Yusuf 1, Mohiuddin Ahmad 2 Assistant Professor, Dept. of EEE, Khulna University of Engineering & Technology

More information

Efficient MPEG-2 to H.264/AVC Intra Transcoding in Transform-domain

Efficient MPEG-2 to H.264/AVC Intra Transcoding in Transform-domain MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Efficient MPEG- to H.64/AVC Transcoding in Transform-domain Yeping Su, Jun Xin, Anthony Vetro, Huifang Sun TR005-039 May 005 Abstract In this

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

An Efficient Mode Selection Algorithm for H.264

An Efficient Mode Selection Algorithm for H.264 An Efficient Mode Selection Algorithm for H.64 Lu Lu 1, Wenhan Wu, and Zhou Wei 3 1 South China University of Technology, Institute of Computer Science, Guangzhou 510640, China lul@scut.edu.cn South China

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Mesh Based Interpolative Coding (MBIC)

Mesh Based Interpolative Coding (MBIC) Mesh Based Interpolative Coding (MBIC) Eckhart Baum, Joachim Speidel Institut für Nachrichtenübertragung, University of Stuttgart An alternative method to H.6 encoding of moving images at bit rates below

More information

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong

More information

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode Jia-Ji Wang1, Rang-Ding Wang1*, Da-Wen Xu1, Wei Li1 CKC Software Lab, Ningbo University, Ningbo, Zhejiang 3152,

More information

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate

More information

JPEG 2000 vs. JPEG in MPEG Encoding

JPEG 2000 vs. JPEG in MPEG Encoding JPEG 2000 vs. JPEG in MPEG Encoding V.G. Ruiz, M.F. López, I. García and E.M.T. Hendrix Dept. Computer Architecture and Electronics University of Almería. 04120 Almería. Spain. E-mail: vruiz@ual.es, mflopez@ace.ual.es,

More information

OVERVIEW OF IEEE 1857 VIDEO CODING STANDARD

OVERVIEW OF IEEE 1857 VIDEO CODING STANDARD OVERVIEW OF IEEE 1857 VIDEO CODING STANDARD Siwei Ma, Shiqi Wang, Wen Gao {swma,sqwang, wgao}@pku.edu.cn Institute of Digital Media, Peking University ABSTRACT IEEE 1857 is a multi-part standard for multimedia

More information

A Quantized Transform-Domain Motion Estimation Technique for H.264 Secondary SP-frames

A Quantized Transform-Domain Motion Estimation Technique for H.264 Secondary SP-frames A Quantized Transform-Domain Motion Estimation Technique for H.264 Secondary SP-frames Ki-Kit Lai, Yui-Lam Chan, and Wan-Chi Siu Centre for Signal Processing Department of Electronic and Information Engineering

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,

More information

One-pass bitrate control for MPEG-4 Scalable Video Coding using ρ-domain

One-pass bitrate control for MPEG-4 Scalable Video Coding using ρ-domain Author manuscript, published in "International Symposium on Broadband Multimedia Systems and Broadcasting, Bilbao : Spain (2009)" One-pass bitrate control for MPEG-4 Scalable Video Coding using ρ-domain

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

A Novel Deblocking Filter Algorithm In H.264 for Real Time Implementation

A Novel Deblocking Filter Algorithm In H.264 for Real Time Implementation 2009 Third International Conference on Multimedia and Ubiquitous Engineering A Novel Deblocking Filter Algorithm In H.264 for Real Time Implementation Yuan Li, Ning Han, Chen Chen Department of Automation,

More information

Reduced Frame Quantization in Video Coding

Reduced Frame Quantization in Video Coding Reduced Frame Quantization in Video Coding Tuukka Toivonen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information Engineering P. O. Box 500, FIN-900 University

More information

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri MPEG MPEG video is broken up into a hierarchy of layer From the top level, the first layer is known as the video sequence layer, and is any self contained bitstream, for example a coded movie. The second

More information

VIDEO COMPRESSION STANDARDS

VIDEO COMPRESSION STANDARDS VIDEO COMPRESSION STANDARDS Family of standards: the evolution of the coding model state of the art (and implementation technology support): H.261: videoconference x64 (1988) MPEG-1: CD storage (up to

More information

Combined Copyright Protection and Error Detection Scheme for H.264/AVC

Combined Copyright Protection and Error Detection Scheme for H.264/AVC Combined Copyright Protection and Error Detection Scheme for H.264/AVC XIAOMING CHEN, YUK YING CHUNG, FANGFEI XU, AHMED FAWZI OTOOM, *CHANGSEOK BAE School of Information Technologies, The University of

More information

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD Robust Lossless Image Watermarking in Integer Domain using SVD 1 A. Kala 1 PG scholar, Department of CSE, Sri Venkateswara College of Engineering, Chennai 1 akala@svce.ac.in 2 K. haiyalnayaki 2 Associate

More information

Video Watermarking Algorithm for H.264 Scalable Video Coding

Video Watermarking Algorithm for H.264 Scalable Video Coding 56 Lu et al.: Video Watermarking Algorithm for H.264 Scalable Video Coding Video Watermarking Algorithm for H.264 Scalable Video Coding Jianfeng Lu,Li Li and Zhenhua Yang Institute of computer Graphics

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

System Modeling and Implementation of MPEG-4. Encoder under Fine-Granular-Scalability Framework

System Modeling and Implementation of MPEG-4. Encoder under Fine-Granular-Scalability Framework System Modeling and Implementation of MPEG-4 Encoder under Fine-Granular-Scalability Framework Literature Survey Embedded Software Systems Prof. B. L. Evans by Wei Li and Zhenxun Xiao March 25, 2002 Abstract

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

CMPT 365 Multimedia Systems. Media Compression - Video

CMPT 365 Multimedia Systems. Media Compression - Video CMPT 365 Multimedia Systems Media Compression - Video Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Introduction What s video? a time-ordered sequence of frames, i.e.,

More information

Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video

Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video R.Hemanth Kumar Final Year Student, Department of Information Technology, Prathyusha Institute of Technology

More information

CHAPTER-5 WATERMARKING OF COLOR IMAGES

CHAPTER-5 WATERMARKING OF COLOR IMAGES CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.

More information

Chapter 11.3 MPEG-2. MPEG-2: For higher quality video at a bit-rate of more than 4 Mbps Defined seven profiles aimed at different applications:

Chapter 11.3 MPEG-2. MPEG-2: For higher quality video at a bit-rate of more than 4 Mbps Defined seven profiles aimed at different applications: Chapter 11.3 MPEG-2 MPEG-2: For higher quality video at a bit-rate of more than 4 Mbps Defined seven profiles aimed at different applications: Simple, Main, SNR scalable, Spatially scalable, High, 4:2:2,

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn

More information

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)

International Journal of Emerging Technology and Advanced Engineering Website:   (ISSN , Volume 2, Issue 4, April 2012) A Technical Analysis Towards Digital Video Compression Rutika Joshi 1, Rajesh Rai 2, Rajesh Nema 3 1 Student, Electronics and Communication Department, NIIST College, Bhopal, 2,3 Prof., Electronics and

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

2014 Summer School on MPEG/VCEG Video. Video Coding Concept

2014 Summer School on MPEG/VCEG Video. Video Coding Concept 2014 Summer School on MPEG/VCEG Video 1 Video Coding Concept Outline 2 Introduction Capture and representation of digital video Fundamentals of video coding Summary Outline 3 Introduction Capture and representation

More information

Video Coding Using Spatially Varying Transform

Video Coding Using Spatially Varying Transform Video Coding Using Spatially Varying Transform Cixun Zhang 1, Kemal Ugur 2, Jani Lainema 2, and Moncef Gabbouj 1 1 Tampere University of Technology, Tampere, Finland {cixun.zhang,moncef.gabbouj}@tut.fi

More information

Complexity Reduced Mode Selection of H.264/AVC Intra Coding

Complexity Reduced Mode Selection of H.264/AVC Intra Coding Complexity Reduced Mode Selection of H.264/AVC Intra Coding Mohammed Golam Sarwer 1,2, Lai-Man Po 1, Jonathan Wu 2 1 Department of Electronic Engineering City University of Hong Kong Kowloon, Hong Kong

More information

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Jeffrey S. McVeigh 1 and Siu-Wai Wu 2 1 Carnegie Mellon University Department of Electrical and Computer Engineering

More information

An Implementation of Multiple Region-Of-Interest Models in H.264/AVC

An Implementation of Multiple Region-Of-Interest Models in H.264/AVC An Implementation of Multiple Region-Of-Interest Models in H.264/AVC Sebastiaan Van Leuven 1, Kris Van Schevensteen 1, Tim Dams 1, and Peter Schelkens 2 1 University College of Antwerp Paardenmarkt 92,

More information

Scalable Video Watermarking. Peter Meerwald June 25, 2007

Scalable Video Watermarking. Peter Meerwald June 25, 2007 Scalable Video Watermarking Peter Meerwald June 25, 2007 Watermarking Watermarking is imperceptible embedding of information into multimedia data [Cox02a] Applications: copyright protection, data authentication,

More information

Optimal Estimation for Error Concealment in Scalable Video Coding

Optimal Estimation for Error Concealment in Scalable Video Coding Optimal Estimation for Error Concealment in Scalable Video Coding Rui Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrical and Computer Engineering University of California Santa Barbara,

More information

Zonal MPEG-2. Cheng-Hsiung Hsieh *, Chen-Wei Fu and Wei-Lung Hung

Zonal MPEG-2. Cheng-Hsiung Hsieh *, Chen-Wei Fu and Wei-Lung Hung International Journal of Applied Science and Engineering 2007. 5, 2: 151-158 Zonal MPEG-2 Cheng-Hsiung Hsieh *, Chen-Wei Fu and Wei-Lung Hung Department of Computer Science and Information Engineering

More information

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING

H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING Dekun Zou * and Jeffrey A Bloom ** * Technicolor Corporate Research dekun.zou@technicolor.com ABSTRACT This paper describes a watermarking method

More information

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Region Based Even Odd Watermarking Method With Fuzzy Wavelet Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,

More information

Reduced 4x4 Block Intra Prediction Modes using Directional Similarity in H.264/AVC

Reduced 4x4 Block Intra Prediction Modes using Directional Similarity in H.264/AVC Proceedings of the 7th WSEAS International Conference on Multimedia, Internet & Video Technologies, Beijing, China, September 15-17, 2007 198 Reduced 4x4 Block Intra Prediction Modes using Directional

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P SIGNAL COMPRESSION 9. Lossy image compression: SPIHT and S+P 9.1 SPIHT embedded coder 9.2 The reversible multiresolution transform S+P 9.3 Error resilience in embedded coding 178 9.1 Embedded Tree-Based

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with

More information

Block-Matching based image compression

Block-Matching based image compression IEEE Ninth International Conference on Computer and Information Technology Block-Matching based image compression Yun-Xia Liu, Yang Yang School of Information Science and Engineering, Shandong University,

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

Sign-up Sheet posted outside of my office HFH 1121

Sign-up Sheet posted outside of my office HFH 1121 Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Fast Implementation of VC-1 with Modified Motion Estimation and Adaptive Block Transform

Fast Implementation of VC-1 with Modified Motion Estimation and Adaptive Block Transform Circuits and Systems, 2010, 1, 12-17 doi:10.4236/cs.2010.11003 Published Online July 2010 (http://www.scirp.org/journal/cs) Fast Implementation of VC-1 with Modified Motion Estimation and Adaptive Block

More information

LECTURE VIII: BASIC VIDEO COMPRESSION TECHNIQUE DR. OUIEM BCHIR

LECTURE VIII: BASIC VIDEO COMPRESSION TECHNIQUE DR. OUIEM BCHIR 1 LECTURE VIII: BASIC VIDEO COMPRESSION TECHNIQUE DR. OUIEM BCHIR 2 VIDEO COMPRESSION A video consists of a time-ordered sequence of frames, i.e., images. Trivial solution to video compression Predictive

More information

4G WIRELESS VIDEO COMMUNICATIONS

4G WIRELESS VIDEO COMMUNICATIONS 4G WIRELESS VIDEO COMMUNICATIONS Haohong Wang Marvell Semiconductors, USA Lisimachos P. Kondi University of Ioannina, Greece Ajay Luthra Motorola, USA Song Ci University of Nebraska-Lincoln, USA WILEY

More information

Implementation and analysis of Directional DCT in H.264

Implementation and analysis of Directional DCT in H.264 Implementation and analysis of Directional DCT in H.264 EE 5359 Multimedia Processing Guidance: Dr K R Rao Priyadarshini Anjanappa UTA ID: 1000730236 priyadarshini.anjanappa@mavs.uta.edu Introduction A

More information

Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding

Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding 2009 11th IEEE International Symposium on Multimedia Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding Ghazaleh R. Esmaili and Pamela C. Cosman Department of Electrical and

More information

A low cost fragile watermarking scheme in H.264/AVC compressed domain

A low cost fragile watermarking scheme in H.264/AVC compressed domain DOI 10.1007/s11042-013-1561-2 A low cost fragile watermarking scheme in H.264/AVC compressed domain Shi-Jinn Horng & Mahmoud E. Farfoura & Pingzhi Fan & Xian Wang & Tianrui Li & Jing-Ming Guo # Springer

More information

Video Compression Standards (II) A/Prof. Jian Zhang

Video Compression Standards (II) A/Prof. Jian Zhang Video Compression Standards (II) A/Prof. Jian Zhang NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2009 jzhang@cse.unsw.edu.au Tutorial 2 : Image/video Coding Techniques Basic Transform coding Tutorial

More information

A COST-EFFICIENT RESIDUAL PREDICTION VLSI ARCHITECTURE FOR H.264/AVC SCALABLE EXTENSION

A COST-EFFICIENT RESIDUAL PREDICTION VLSI ARCHITECTURE FOR H.264/AVC SCALABLE EXTENSION A COST-EFFICIENT RESIDUAL PREDICTION VLSI ARCHITECTURE FOR H.264/AVC SCALABLE EXTENSION Yi-Hau Chen, Tzu-Der Chuang, Chuan-Yung Tsai, Yu-Jen Chen, and Liang-Gee Chen DSP/IC Design Lab., Graduate Institute

More information

ISSN: An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding

ISSN: An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding Ali Mohsin Kaittan*1 President of the Association of scientific research and development in Iraq Abstract

More information

ADAPTIVE JOINT H.263-CHANNEL CODING FOR MEMORYLESS BINARY CHANNELS

ADAPTIVE JOINT H.263-CHANNEL CODING FOR MEMORYLESS BINARY CHANNELS ADAPTIVE JOINT H.263-CHANNEL ING FOR MEMORYLESS BINARY CHANNELS A. Navarro, J. Tavares Aveiro University - Telecommunications Institute, 38 Aveiro, Portugal, navarro@av.it.pt Abstract - The main purpose

More information

Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding

Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding Jung-Ah Choi and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 261 Cheomdan-gwagiro, Buk-gu, Gwangju, 500-712, Korea

More information

Welcome Back to Fundamentals of Multimedia (MR412) Fall, 2012 Chapter 10 ZHU Yongxin, Winson

Welcome Back to Fundamentals of Multimedia (MR412) Fall, 2012 Chapter 10 ZHU Yongxin, Winson Welcome Back to Fundamentals of Multimedia (MR412) Fall, 2012 Chapter 10 ZHU Yongxin, Winson zhuyongxin@sjtu.edu.cn Basic Video Compression Techniques Chapter 10 10.1 Introduction to Video Compression

More information

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Real-Time Video Streaming Using Randomized Expanding Reed-Solomon Code Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Abstract Forward error correction (FEC) codes are widely

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Improved H.264/AVC Requantization Transcoding using Low-Complexity Interpolation Filters for 1/4-Pixel Motion Compensation

Improved H.264/AVC Requantization Transcoding using Low-Complexity Interpolation Filters for 1/4-Pixel Motion Compensation Improved H.264/AVC Requantization Transcoding using Low-Complexity Interpolation Filters for 1/4-Pixel Motion Compensation Stijn Notebaert, Jan De Cock, and Rik Van de Walle Ghent University IBBT Department

More information

FAST SPATIAL LAYER MODE DECISION BASED ON TEMPORAL LEVELS IN H.264/AVC SCALABLE EXTENSION

FAST SPATIAL LAYER MODE DECISION BASED ON TEMPORAL LEVELS IN H.264/AVC SCALABLE EXTENSION FAST SPATIAL LAYER MODE DECISION BASED ON TEMPORAL LEVELS IN H.264/AVC SCALABLE EXTENSION Yen-Chieh Wang( 王彥傑 ), Zong-Yi Chen( 陳宗毅 ), Pao-Chi Chang( 張寶基 ) Dept. of Communication Engineering, National Central

More information

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,

More information

Multimedia Systems Video II (Video Coding) Mahdi Amiri April 2012 Sharif University of Technology

Multimedia Systems Video II (Video Coding) Mahdi Amiri April 2012 Sharif University of Technology Course Presentation Multimedia Systems Video II (Video Coding) Mahdi Amiri April 2012 Sharif University of Technology Video Coding Correlation in Video Sequence Spatial correlation Similar pixels seem

More information

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 7, NO. 2, APRIL 1997 429 Express Letters A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation Jianhua Lu and

More information

In the name of Allah. the compassionate, the merciful

In the name of Allah. the compassionate, the merciful In the name of Allah the compassionate, the merciful Digital Video Systems S. Kasaei Room: CE 315 Department of Computer Engineering Sharif University of Technology E-Mail: skasaei@sharif.edu Webpage:

More information

Professor, CSE Department, Nirma University, Ahmedabad, India

Professor, CSE Department, Nirma University, Ahmedabad, India Bandwidth Optimization for Real Time Video Streaming Sarthak Trivedi 1, Priyanka Sharma 2 1 M.Tech Scholar, CSE Department, Nirma University, Ahmedabad, India 2 Professor, CSE Department, Nirma University,

More information

High Efficiency Video Coding. Li Li 2016/10/18

High Efficiency Video Coding. Li Li 2016/10/18 High Efficiency Video Coding Li Li 2016/10/18 Email: lili90th@gmail.com Outline Video coding basics High Efficiency Video Coding Conclusion Digital Video A video is nothing but a number of frames Attributes

More information

Image and Video Watermarking

Image and Video Watermarking Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Video Watermarking Algorithm Based on the Human Visual System Properties A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,

More information