Robust MPEG video watermarking technologies
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
ECMAST '98 Proceedings of the Third European Conference on Multimedia Applications, Services and Techniques
A Hybrid Watermarking Scheme for H.264/AVC Video
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
A low complexity video watermarking in H.264 compressed domain
IEEE Transactions on Information Forensics and Security
Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase
IEEE Transactions on Information Forensics and Security
A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance
IEEE Transactions on Information Forensics and Security
Watermarking of MPEG-4 video objects
IEEE Transactions on Multimedia
Digital watermarking for copyright protection of MPEG2 compressed video
IEEE Transactions on Consumer Electronics
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
IEEE Transactions on Image Processing
Hi-index | 0.00 |
In this research, we propose a practical digital video watermarking scheme mainly used for authenticating the H.264/AVC compressed videos to ensure their correct content order. The watermark signals, which represent the serial numbers of video segments, are embedded into nonzero quantization indices of frames to achieve both the effectiveness of watermarking and the compact data size. The human visual characteristics are taken into account to guarantee the imperceptibility of watermark signals and to attain an efficient implementation in H.264/AVC. The issues of synchronized watermark detections are settled by selecting the shot-change frames for calculating the distortion-resilient hash, which helps to determine the watermark sequence. The experimental results demonstrate the feasibility of the proposed scheme as the embedded watermarks can survive the allowed transcoding processes while the edited segments in the tampered video can be located.