DCT-BASED WATERMARKING FOR VIDEO

Similar documents
Image and Video Watermarking

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Data Hiding in Video

A Robust Image Hiding Method Using Wavelet Technique *

Copy Protection for Multimedia Data based on Labeling Techniques

ECE 417 Guest Lecture Video Compression in MPEG-1/2/4. Min-Hsuan Tsai Apr 02, 2013

Image Error Concealment Based on Watermarking

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

A blind Wavelet-Based Digital Watermarking for Video

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Blind Wavelet-Based Digital Watermarking for Video

AN AUDIO WATERMARKING SCHEME ROBUST TO MPEG AUDIO COMPRESSION

Robust Image Watermarking based on DCT-DWT- SVD Method

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Sign-up Sheet posted outside of my office HFH 1121

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

REAL-TIME VIDEO WATERMARKING FOR COPYRIGHT PROTECTION BASED ON HUMAN PERCEPTION

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV

IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Video Compression An Introduction

DATA hiding [1] and watermarking in digital images

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Block-based Watermarking Using Random Position Key

Digital Video Processing

Robust DWT Based Technique for Digital Watermarking

VIDEO WATERMARKING USING DCT AND DWT TRANSFORMS

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A new predictive image compression scheme using histogram analysis and pattern matching

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

2014 Summer School on MPEG/VCEG Video. Video Coding Concept

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation

Towards a Telltale Watermarking Technique for Tamper-Proofing

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

A new robust watermarking scheme based on PDE decomposition *

DIGITAL WATERMARKING OF VIDEO USING DCT AND EXTRACTION FROM ATTACKED FRAMES

Automatic Video Caption Detection and Extraction in the DCT Compressed Domain

Multimedia Security: So What s the Big Deal?

Part 1 of 4. MARCH

JPEG 2000 vs. JPEG in MPEG Encoding

Lecture 5: Compression I. This Week s Schedule

Fundamentals of Video Compression. Video Compression

QR Code Watermarking Algorithm based on Wavelet Transform

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Digital Watermarking Using 2-DCT

Low Cost Spatial Watermarking

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm

A Reversible Data Hiding Scheme for BTC- Compressed Images

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Compression of Stereo Images using a Huffman-Zip Scheme

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Tampering Detection in Compressed Digital Video Using Watermarking

Audio Watermarking using Empirical Mode Decomposition

Image Steganography (cont.)

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication

DCT Domain Video Watermarking Technique for AVI Video

Wireless Communication

VIDEO AND IMAGE PROCESSING USING DSP AND PFGA. Chapter 3: Video Processing

Zonal MPEG-2. Cheng-Hsiung Hsieh *, Chen-Wei Fu and Wei-Lung Hung

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Combined Hashing/Watermarking Method for Image Authentication

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Digital Image Watermarking Using DWT Based DCT Technique

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

System Modeling and Implementation of MPEG-4. Encoder under Fine-Granular-Scalability Framework

Audio-coding standards

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Comparison of Digital Water Marking methods

Image Watermarking Based On Wavelet Packet Transform With Best Tree

Improved Qualitative Color Image Steganography Based on DWT

Video Compression Standards (II) A/Prof. Jian Zhang

THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Transcription:

206 EEE Transactions on Consumer Electronics, Vol. 44, No. 1, FEBRUARY 1998 DCT-BASED WATERMARKNG FOR VDEO Chiou-Ting Hsu and Ja-Ling Wu1a2 Communication and Multimedia Lab. Department of Computer Science and nformation Engineering National Taiwan University Taipei, Taiwan Department of nformation Engineering National Chi-Nan University Puli, Nantou, 545, Taiwan E-mail: candy@cmlab.csie.ntu.edu.tw ABSTRACT n this paper, an MPEG-based technique for embedding digital watermarks into digital video is proposed. Watermarking technique has been proposed as a method to hide secret information into the signals so as to discourage unauthorized copying or attest the origin of the media. n the proposed method, we take advantage of prediction types of MPEG bitstreams to embed watermarks into both intraframe and non-intraframe with different residual masks. The experimental results show that the proposed watermarking technique results almost invisible difference between the watermarked frames and the original frames, and also robust to cropping operations and MPEG compression., NTRODUCTON As the computers are more and more integrated via the network, the distribution of digital media is becoming faster, easier, and requiring less effort to make exact copies. One of the major impediment is the lack of effective intellectual property protection of digital media to discourage unauthorized copying and distribution. n analog world, a painting is signed by the artist to attest the copyright, an identity card is stamped by the steel seal to avoid forgery, and the paper money are identified by the embossed portrait. Such kind of hand-written signatures, seals or watermarks have been used from ancient times as a way to identify the source, creator of a document or a picture. For example, a priceless painting of the eleventh-century in National Palace Museum named Travelers on a Mountain Path had not been identified as the genuine work of Fan Kuan until Fan s signature is found between the woods behind a group of travelers of the painting []. However, in the digital world, digital technology for manipulating images has make it difficult to distinguish the visual truth [2]. Besides, the characteristics of digitization bring significant changes in copyright issues, such as: ease of replication, ease of transmission and plasticity of digital media, which creates an urgent need to intellectual property protection on the digitally recorded information [3]. n face of the challenges derived from the characteristics of digital media and internet revolution, digital watermarking has been proposed as a way to claim the ownership of the source and the owner himself. The watermark must be embedded into the media so that the watermarked signal is undetectable by the user. Moreover, the watermark should be: mperceptible The watermark should be imperceptible so as not to affect the viewing experience of the image or the audio quality of the original signal. Undeletable The watermark must be difficult or even impossible to remove by a hacker, at least without obviously degrading the original signal. Contributed Paper Manuscript received January 12, 1998 0098 3063/98 $10.00 1998 EEE Authorized licensed use limited to: National Taiwan University. Downloaded on March 20, 2009 at 00:22 from EEE Xplore. Restrictions apply.

Hsu and Wu: DCT-Based Watermarking for Video 207 Statistically Undetectable A pirate should not be able to detect the watermark by comparing several watermarked signals belonging to the same author. Robust to Lossy Data Compression The watermark should be survive the lossy compression techniques like JPEG and MPEG which are commonly used for transmission and storage. Robust to Signal Manipulation and Processing Operations The watermark should still be retrievable even if common signal processing operation arc applied, such as signal enhancement, geometric image operations, noise, filtering, etc. 0 Unambiguous Retrieval of the watermark should be unambiguously identify the owner, and the accuracy of identification should degrade gracefully in the face of attack. Several watermarking techniques for text, image and audio data have been developed. The watermarking techniques for text are applied to either an image representation of the document or to a document format file. The watermarking can be achieved by altering the text formatting, or by altering certain characteristics of textual elements (e.g., characters). Three methods have been proposed for applying watermarking to text images: line-shift coding, word-shift coding and feature coding, which can be used either separately or jointly [4]. Of course, the watermark can be defeated by retyping all the text in the document. There are several different methods [S-81 to enable image watermarking in the spatial domain. One disadvantage of spatial domain watermarks-besides the trade-off between invisibility and robustnescis that a common picture-cropping operation can eliminate the watermark [9]. The simplest watermarking method in spatial domain is to just flip the least significant bit (LSB) of chosen pixels in an image. A uniform distributed pseudo random number generator is used to map these bits onto a path of randomly selected, pixel locations within the limit of the image. At each location the LSB of the pixel value is forced to match the value of the corresponding watermark bit [5]. However, this works well only if the image will not be subject to any modification, such as color modification done by an image editor or lossy compression. mage watermarking can be applied in the transform domain [ 10-121. These methods are similar to spatial domain watermarking in that the values of selected frequencies can be altered. Because high frequencies wil be lost by compression or scaling, the watermark signal is applied to lower frequencies, or better yet, applied adaptively to frequencies containing important elements of the original picture. Upon inverse transformation, watermarks applied to frequency domain will be dispersed over the entire spatial image, so these methods are not as susceptible to defeat by cropping as the spatial technique. However, the trade-off between invisibility and robustness is greater here. n [13], a digital watermarking approach for audio signals is proposed. n this method, the watermark is generated by filtering a PN-sequence with a filter that approximates the frequency masking characteristics of the Human Auditory System (HAS). t is then weighted in the time domain to account for temporal masking. n this paper, we present a DCT-based watermarking technique for video sequences. n most of the video coding standards (such as H.261, MPEG-1 and MPEG-2), the hybrid motion compensation/discrete cosine transform (MC/DCT) coding method is commonly used. Based on the DCT-based image watermarking technique [ 1 11, applying the same watermarking method into the Authorized licensed use limited to: National Taiwan University. Downloaded on March 20, 2009 at 00:22 from EEE Xplore. Restrictions apply.

208 EEE Transactions on Consumer Electronics, Vol. 44, No. 1, FEBRUARY 1998 intraframe and embedding the watermark into the non-intrafraine by extending the residual mask into temporal domain (i.e. 3-D residual pattern) could achieve a robust video watermarking which could survive the attack of MPEG compression. This paper is organized as follows. A brief background about MPEG is described in Section 2. The video watermarking techniques for both intraframe and non-intrafiame are described in Section 3. Section 4 shows the experimental results. Finally, Section 5 concludes the paper. 2. MPEG CODNG STANDARD The MPEG-1 (Moving Picture Expert Group) [14] video compression standard is in a hybrid DCT/DPCM block-based s'cheme. Three types of pictures are considered: ntraframe (-frame), forward-predicted frame (P-frame), and bidirectional predictediinterpolated frame (B-frame), which are described as follows [ 151: Since video is a sequence of still images, it is possible to compress a video signal using techniques similar to JPEG. Such methods of compression are called intraframe coding techniques, where each frame of video is individually and independently compressed. ntraframe coding exploits the spatial redundancy that exists between adjacent pixels of a frame. A frame is first divided into 8 X 8 blocks of pixels, and the 2-D DCT is then applied independently to each block. This operation results in an 8 X 8 block of DCT coefficients in which most of the energy in the original block is typically concentrated on a few low-frequency coefficients. A quantizer is applied to each DCT coefficient that sets many of them to zero. This quantization is responsible for lossy nature of the compression algorithm. Compression is achieved by storing only the coefficients that survive the quantization operation and by entropy coding their location information and amplitudes. Temporal redundancy results from a high degree of correlation between adjacent frames. n computing the frame-to-frame difference, a blockbased motion compensation approach is adopted for P-frame. A block of pixels (target block) in the frame to be encoded is matched with a set of blocks of the same size in the previous frame (reference frame). The block in the reference frame that best matches the target block is used as the prediction for the latter. This best-matching block is associated with a motion vector that described the displacement between it and the target block. The motion vector is also encoded along with the prediction error. The prediction error is encoded using the DCT-based intraframe encoding technique. n bidirectional prediction, some of the video frames are encoded using two reference frames, one in the past and one in the future. A block in those frames can be predicted by another block from the past reference frame (forward prediction), or from the future reference frame (backward prediction), or by average of the two blocks (interpolation). Frames that are bidirectionally predicted are never themselves used as reference frames. A video sequence is divided into a series of COPS (Group of Pictures), where each GOP contains an -frame followed by an arrangement of P-frames and B-frames. Figure 1 shows an example of a GOP structure. 3. WATERMARKNG APPROACHES The DCT-based watermarking method [ 111 has been developed for image watermarking which could survive several kinds of image processings and lossy compression. n order to extend the watermarking technique into video sequences, the concept of temporal prediction exploited in MPEG is considered. For intrafi-ame, the same techniques of image watermarking is applied, while for non-intraframe, the residual mask, which is used in image watermarking to obtain the spatial neighboring relationship, is extended to temporal domain according to the type of prediction coding. n the proposed method, the GOP structure

Hsu and Wu: DCT-Based Watermarking for Video 209 exploited in the MPEG compressing coding is assumed to be known in advance. Based on the GOP structure, the watermarking technique for intraframe and non-intraframe are described in detail as below. 3.1 Watermarking for intraframe -frame is encoded without reference to any other images. n considering the JPEG-like coding technique, a DCT-based watermarking method is developed to provide a invisible watermark and also survive the lossy compression. The human eyes are more sensitive to noise in lower frequency range than its higher frequency counterpart, while the energy of most natural images are concentrated on the lower frequency range, and therefore, the quantization table applied in lossy compression always reflects the human visual system which is less sensitive to quantization noise at higher frequencies. n order to invisibly embed the watermark and to survive the lossy data compression, a reasonable trade-off is to embed the watermark into the middle-frequency range of the image. Besides, to prevent expert to extract the hidden information directly from the transformed domain, the watermarks are embedded by modifying the relationship of the neighboring blocks of middlefrequency coefficients of the original image instead of embedding by an additive operation. The original image is divided into 8 X 8 blocks of pixels, and the 2-D DCT is applied independently to each block. Then, pick up the coefficients of middle-frequency range from the DCT coefficients, an example of defining the middle-frequency coefficients is shown in Figure 2. A 2-D sub-block mask, as shown in Fig. 3, is used in order to compute the residual pattern from the chosen middlefrequency coefficients. For example, if a=b=c=o, d= - 1, x=l, then the polarity is a binary pattern (0 or 1) which represents the coefficients at the position of the current block is larger (polarity=l) or less (polarityo) than the coefficient at the corresponding position of the previous block. Let the digital watermark be a binary image. A fast 2-D pseudo random number traversing method is used to permute the watermark so as to disperse its spatial relationship. n addition to this pixel-based permutation, a block-based permutation according to the variances of both the image and the watermark is also applied. Although the watermark is embedded into the middle frequency coefficients, for those blocks with little variances (i.e. the blocks contain the low fi-equency contents), the modification of DCT coefficients will introduce quite visible artifacts. However, in this image-dependent permutation, both variances of image blocks and watermark blocks are sorted and mapped accordingly so that the invisibility of the watermarked image will be improved. After the binary residual pattems of the transformed intraframe are obtained, for each marked pixel of the permuted watermark, modify the DCT coefficients according to the residual mask, so that the corresponding polarity of residual value is reversed. Finally, inverse DCT of the associated result to obtain the watermarked image. Fig. 4 shows the embedding steps of intraframe watermarking. The extraction of watermark requires the original frame, the watermarked frame and also the digital watermark. First of all, both the original frame and the watermarked frame are DCT transformed. Then, make use of the chosen middle-frequency coefficients and the residual mask to obtain the residual values. Perform the exclusive-or (XOR) operation on these two residual patterns to obtain a permuted binary signal. Reverse both the block- and the pixel-based permutations to get the extracted watermark. Fig. 5 shows the extracting steps of the intraframe watermarking. 3.2 Watermarking for non-intraframe P-frame is encoded relative to intraframe or other P- fiame. B-frame is derived from two other frames, one before and one after. These non-intraframes are derived fiom other reference frames by motion compensation, which use the estimated motion vectors to reconstruct the images. n order to embed Authorized licensed use limited to: National Taiwan University. Downloaded on March 20, 2009 at 00:22 from EEE Xplore. Restrictions apply.

210 EEE Transactions on Consumer Electronics, Vol. 44, No. 1, FEBRUARY 1998 the watermark into such kind of motion compensated images, the residual patterns of neighboring blocks are extended to temporal domain and other parts of image watermarking techniques could be applied directly into non-intraframes. For forward predicted P frame, the residual mask is designed between the P-frame and its reference or P frame. That is, the watermarks are embedded by modifying the temporal relationship between the current P frame and its reference frame. Figure 6 shows the residual mask used for P frame. For example, if a=b= *,.=h=o, x= -1, y=l, then the residual values are the polarity between frame-toframe differences (with zero-motion vectors). Reverse the polarity of residual pattern by modifying the coefficients of the current frame to embed the watermark. For bidirectional predicted/interpolated B frame, the residua1 mask is designed between current B frame and its past and future reference frames. Figure 7 shows the residual mask used for B frame. For example, if a=b=...=h=o, a =b =..-=A =o x=x = (-1/2), y=2, then the residual values are the polarity between current block and the interpolation of past and future blocks (with zero-motion vectors). The polarity of residual pattern is also reversed to embed the Watermark. Note that, in order to survive the MPEG compression, the middle-frequency DCT coefficients must be modified to reverse the polarity of residua1 pattern in considering the effect of the MPEG quantizer, which is applied to each DCT coefficient and is responsible for the lossy nature. Two default quantization tables were defined in MPEG standard, one is for intraframe coding and another is for nonintraframe coding. MPEG allows the quantization operation to achieve a higher level of adaptation, and this is a key factor in achieving good picture quality in MPEG. Therefore, if the DCT coefficients are modified according to arger quantization factor, the watermark would survive larger compression ratio, and on the other hand, could be with poor invisibility. Figure 8 shows the default quantization matrix used in MPEG-1 standard. 4. EXPERMENTAL RESULTS The Miss America video sequences are used as our test sequences and CF (Common ntermediate Format) format is applied. CF pictures are composed of three components: one luminance Y and two color differences Cb and Cr. The picture size for Y is 352 X 288, while the Cb and Cr are subsampled to 176 X 144. Only the luminance components are considered during our video watermarking. The binary watermark is set to be 128 X 128. The GOP structure is assumed as shown in Fig. 1. Each frame is watermarked by their associate watermarks, as shown in Fig. 9. Figure 10 shows one watermarked intraframe and its extracted watermark. After extracting the watermark, the user can compare the results with the referenced watermark subjectively. However, since the subjective measurement will be affected by the factors of image size, expertise of the observers, the experimental conditions, etc., a quantitative measurement is required to provide objective judgment of the extracting fidelity. Therefore, a similarity measurement of the extracted and the referenced watermarks can be defined as: Normalized correlation (NC)= x x [W(i, A2 which is the cross-correlation normalized by the reference watermark energy to give unity as the peak value. Cropping operation is usually used to edit the special effect on video sequences. Since there are two permutation methods used to disperse the watermark, it is very hard to detect or remove the watermark by just cutting off some part of the frame. Figure 11 shows the cropped version of the

Hsu and Wu: DCT-Based Watermarking for Video 21 1 watermarked intraframe, and the missing portions are filled with zero values to extract the watermark. Figure 12 shows the relationship between the NC value and the cropping ratio, and the effect of cropping operation to NC is almost linear. Figure 13 shows that when the watermarked sequences are under compression / decompression attack with different compression ratio from 9.25-29.0, the extracted watermarks for and P frames are still survive with acceptable quality, while the extracted watermark for B frame is degraded and harder to discriminate subjectively. Figure 14 shows the relationship between the NC values with the cropping ratio for compressed watermarked sequences. Although the quality of extracted watermark is degraded more for B-frames, the effects of cropping ratio for intraframe and nonintraframe are still linear. Figure 15 shows the effect of compression for watermarked sequences, when the compression ratio increases, the picture quality is decreased accordingly. Figure 16 shows that as the compression ratio increases, the NC values decreased accordingly. n most cases, the extracted watermarks for and P frames are with much higher NC values than that of the B-frames. 5. Conclusion n this paper, a DCT-based watermark embedding algorithm in considering the MPEG structure is proposed. n order to provide the proposed watermarking algorithm the ability of being: undeletable, perceptually invisible, statistically undetectable, robustness to lossy compression, and survival of video manipulation and processing. The embedding and extracting methods based on the DCT-based intra-mode and temporal predictive nonintra mode have been included in the proposed approach. Experimental results are presented to claim the invisibility and robustness of the proposed video watermarking process. References [] National Palace Museum, http://www.npm. gov.tw. [2] W. J. Mitchell, When is Seeing Believing?, Scientijk Amer., pp. 68-73, Feb. 1994. [3] P. Samuelson, Digital Media and the Law, Communications ofacm, vol. 34, no. 10, pp.23-28, Oct. 1991. [4] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O Gorman, Electronic Marking and dentification Techniques to Discourage Document Copying, EEE J. Selected Areas Commum., vol. 13, no. 8, Oct. 1995. [5] S. Walton, mage Authetication for a Slippery New Age, Dr. Dobb s Journal, pp. 18-26, April 1995. [6] W. Bender, D. Gruhl and N. Morimoto, Techniques for Data Hiding, Proc. of SPE, vol. 2420, Feb. 1995. [7] 0. Bruyndonckx, J. J. Quisquater and B. Macq, Spatial Method for Copyright Labeling of Digital mages, Proc. EEE Nonlinear Signal and mage Processing, pp. 456-459, June 1995. [8] R. B. Wolfgang and E. J. Delp, A Watermark for Digital mages, Proceeding of nternational Conference On mage Processing, pp. 219-222, Sep. 1996. [9] H. Berghel and L. O Gorman, Protecting ownership rights through digital watermarking, ComputerMagazine, pp. 101-103, July 1996. [lo] E. Koch and J. Zhao, Towards Robust and Hidden mage Copyright Labeling, Proc. EEE Nonlinear Signal and mage Processing, pp. 452-455, June 1995. [l 11 C. T. Hsu and J. L. Wu, Hidden Signatures in mages, Proceeding of nternational Conference On mage Processing, pp. 223-226, Sep. 1996.

Authorized licensed use limited to: National Taiwan University. Downloaded on March 20, 2009 at 00:22 from EEE Xplore. Restrictions apply. 212 EEE-Transactions on Consumer Elec&onics, Vol. 44, No. 1, FEBRUARY 1998 [12]. J. Cox, J. Kilian, T. Leighton and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, Tech. Rep. 95-1 0, NEC Research nstitute, 1995. [13]L. Boney, A. H. Tewfik and K.N. Hamdy, Digital Watermarks for Audio Signals, EEE Proceedings of Multimedia 96, pp. 473-480, 1996. [ 141 SO/EC 1 1 172-2, Coding of Moving Pictures and Associated Audio - for Digital Storage Media at up to About 1.5 Mbits/s - Part 2 Video. [15] R. Aravind, G. L. Cash, D. L. Duttweiler, H. M. Hang, B. G. Haskell and A. Puri, mage and Video Coding Standards, AT&T Technical Journal, pp. 67-89, JanFeb. 1993. Forward n i 003 /------ 4 Bi-directional Prediction Transmission order 1423756 PBBBB 32 39 45 52 54 33 38 46 51 55 60 37 47 50 56 59 61 (a) 14 15 13 16 12 17 25 18 24 19 23 20 22 21 34 35 Figure 2: An example of defining the middlefrequency coefficients, in which the coefficients are picked up in zigzag-scan order and then reordered into a block of 4x4. (a) shows the zigzag ordering of DCT coefficients and the middle frequency coefficients are shown in the shadow area, and (b) shows how the picked up coefficients are reordered into the 4x4 block. blxl Figure 3: The residual mask, where each square represents a transformed block, and position x stands for the current processing block. Figure 1: An example of group of pictures, note that B-frame 5,6 and -frame 7 are part of the next GOP.

Hsu and Wu: DCT-Based Watermarking for Video 213 Original Frame Original Frame Watermarked Frame Watermark Pixel-based Permutation 1 i FDCT FDCT \ / Choice of Middle- Frequency Coefficients 1 Block-based 1 DCT Reverse Pixel-based Permutation Extracted Watermark Watermarked mage (PSNR=44.63dB) Figure 4: ntraframe watermarking embedding steps. Figure 5 : ntraframe watermarking extracting steps.

Authorized licensed use limited to: National Taiwan University. Downloaded on March 20, 2009 at 00:22 from EEE Xplore. Restrictions apply. 214 EEE Transactions on Consumer Electronics, Vol. 44, No. 1, FEBRUARY 1998 /....... current frame previous reference frame Figure 6: The residual mask for P frame T i -- A. -, T d.., t 1 Figure 9: Original video sequences and their associate watermarks. past reference frame future reference frame Figure 7: The residual mask for B frame. 8 16 19 22 26 27 29 34 16 16 22 24 27 29 34 37 19 22 26 27 29 34 37 40 22 22 26 27 29 34 37 40 22 26 27 29 32 35 40 48 26 27 29 32 35 40 48 58 26 27 29 34 38 46 56 69 27 29 35 38 46 56 69 83 (b) Figure 10: (a> Watermarked picture (of frame 1 j with PSNR=44.63dB and (b) is the extracted watermark (NC=1 j.

Authorized licensed use limited to: National Taiwan University. Downloaded on March 20, 2009 at 00:22 from EEE Xplore. Restrictions apply. Hsu and Wu: DCT-Based Watermarking for Video 215 Figure 1 1 : Cropped version of Fig. 10 (a), and (b) is the extracted watermark after cropping operation. (a) (frame 1) B (frame 3) P (frame 4) 1 0.9 0.8 0.7 0.6 NC 0.5 0.4 0.3 ::;,,,,,, 0 10 20 30 40 50 60 70 80 90 100% remaining part after clipping (b) (frame 1) B (frame 3) P (frame 4) (c) (frame 1) B (frame 3) P (frame 4) Figure 12: The relationship between the clipping ratio and NC values (Note that, the NC values after clipping are almost the same for ntra- and nonintraframes). (d) (frame 1) B (frame 3) P (frame 4) Figure 13: Extracted watermark for compressed watermarked scquenccs (a) with compression ratio=9.25, (b) with compression ratio 18.4, (c) with compression ratio 24.34, and (d) with compression ratio 29.0.

216 EEE Transactions on Consumer Electronics, Vol. 44, No. 1, FEBRUARY 1998 0.8 0.6 0.4 0.2 NC -@- P (frame 4) 0 20 30 40 50 60 70 80 90 N remaining part after cropping NC r.' 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 Y 0.2 J 1 2 3 4 5 6 7 Frame No. +3 94 +5 31 t- 9.25 +793 +25 14-9-36 87 +44 09 +57 05 Figure 14: The relationship between the cropping ratio and NC values for compressed sequences with compression ratio=9.25. PSNR Figure 16: The relationship between compression ratio and quantitative measurement NC values. As the compression ratio increases from 3.94 to 57.05, the NC values are decreased accordingly. n most cases, the extracted watermarks for and P frames are with much higher NC values than that of B-frames. 45 +9 25 43 ++ 17.93 41 +25 14 + 36.87 39-0-44.09 37 1 2 3 4 5 6 7 Frame No. Figure 15: The relationship between compression ratio and objective picture quality. As the compression ratio increases from 1, 3.94 to 57.05, the PSNR is decreased accordingly. Note that, the PSNR of watermarked non-intraframe (without compression, i.e. compression ratio=l) is higher than that of intraframe.