1 / 22

MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles

ARTEMIS Department Institut Télécom Télécom SudParis Evry - France. MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles. Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX. Outline. Compressed domain watermarking.

lorne
Download Presentation

MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ARTEMIS Department Institut Télécom Télécom SudParis Evry - France MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX

  2. Outline • Compressed domain watermarking • A robust compressed-domain watermarking • Conclusion and further work • m-ST-QIM insertion (new perceptual shaping, energy selection criterion) • Detection • Experimental result A contradiction in terms? Between myth and reality!

  3. Context: VoD distribution Context Justice VOD server BOB Selection Buy Right Distribution Send content Internet Storage MPEG-4 AVC Watermarking Challenge: Real time, robust watermarking for MPEG-4 AVC Video visual redundancy eliminated Video visual redundancy exploited in order to hide watermark

  4. State-of-the-art panorama A. Golikeri, and R.M. Mersereau Robust digital video watermarking scheme for H.264 advanced videocoding standard”, Journal of Electronic imaging 16, 2007. Best robustness • QIM Mark generation M. Noorkami, P. Nasiopoulos, and Z. J. Wang Compressed‑domain video watermarking for H.264, IEEE Intl. Conf. on Image Processing, Vol. 2, September 2005. Besttransparency • Perceptual shaping adapted to syntax features Large data payload D. Zou, and J.A. Bloom H.264/AVC STREAM REPLACEMENT TECHNIQUE FOR VIDEO WATERMARKING 2009. • Embedding at the Decoder side Less complexity ComWat algorithm (May 2010) Multi-symbole ComWat algorithm

  5. m-ComWat algorithm: distinctive factors • m-array Quantization Index Modulation method [Chen and Worwell] • Energy selection criteria based on information theory concepts • First perceptual masking mechanism in MPEG-4 AVC • Mark inserted in AC quantized coefficient at the decoder side Between myth and reality

  6. m-ST-QIM Insertion Perceptual shaping Embedding & Block reconstruction Between myth and reality Selected Host AC block x Key k Message m Input Mark generation Block selection YES NO Output Watermarked block z Block x

  7. Toward an MPEG-4 AVC perceptual mask Between myth and reality 4x4 contrast sensitivity table 4x4 sub- macroblock DCT IDCT Perceptual mask DCT int IDCT int

  8. Perceptual shaping Between myth and reality Input: x= original tAVC= perceptual mask output: = original

  9. mST-QIM Insertion Embedding & Block reconstruction Between myth and reality Selected Host AC block x Key k Message m Input Mark generation Perceptual shaping Energy selection YES NO Output Watermarked block z Block x

  10. Embedding & block reconstruction Between myth and reality The inserted bit m = 0

  11. mST-QIM Insertion Embedding & Block reconstruction Between myth and reality Selected Host AC block x Key k Message m Input Mark generation Perceptual shaping Energy selection YES NO Output Watermarked block z Block x

  12. Block selection: energy-based criterion • Additional constraints for transparent MPEG-4 AVC watermarking in: S. Duta, M. Mitrea, F. Preteux, M. Belhaj, “The MPEG-4 AVC domain watermarking transparency”, Proc. SPIE Vol. 6982, April 2008 Between myth and reality Unmarked block energy The standard deviation of energy of unmarked selected blocks Marked block energy The mean of energy of unmarked selected blocks

  13. Mark detection Decision Y(m =d) Decision Y(m =d+1) Between myth and reality Quantization step Key Watermarked block Detection variable Without attack

  14. Mark detection Decision Y(m =d) Decision Y(m =d+1) Between myth and reality Quantization step Key Attacked block Detection variable Without attack After an attack

  15. MEDIEVALS video corpus: https://www.medialive.com/Medievals • 2 h of video in HD and SD • Different compression rate: 1Mo, 5 Mo, 10 Mo • MPEG-4 AVC baseline profile, only level 2, 3 and 4 • The watermarking quantization step is chosen according to Golikiri:

  16. Experimental results: transparency embbeding Subjective Quality Objective Quality Similarity measures Correlation measures Marked video Original video α =0.84, Δ=160, m=5 Psycho visual measures

  17. Experimental results: robustness Attack: Noise matrix embbeding detection Transcoding Stirmark Noise addition

  18. Performance demonstration: Transcoding Attack Attack: Noise matrix embbeding detection 0 2 -2 0 1 1 2 -2 0 1 With energy selection Without energy selection Number of «-2» detected under condition «-2» was inserted to total number of inserted bits Number of «-2» detected under condition «1» was inserted to total number of inserted bits

  19. Performance demonstration: Stirmark Attack Attack: Noise matrix embbeding detection 1 0 2 -2 0 1 1 1 2 -2 0 1 0 0 With energy selection Without energy selection

  20. Performance demonstration: Noise adding Attack Attack: Noise matrix embbeding detection 1 0 2 -2 0 1 1 1 2 -2 0 1 0 0 With energy selection Without energy selection

  21. Conclusion • New masking model adapted to MPEG‑4 AVC features • An extension of the first MPEG‑4 AVC robust watermarking method against transcoding (about 6.5% of errors) and geometric attacks (about 11.57 % of errors) • Quantization watermarking on compressed domain • Information theory modeling attack

  22. Perspectives • Ameliorate the masking model • Technical solution: watermarking system • Estimate the capacity

More Related