Regions Based Semi-fragile Watermarking Scheme for Video Authentication

Autor: Amal Ben Hamida, Amal Hammami, Chokri Ben Amar, Henri Nicolas
Přispěvatelé: Mathématiques et Informatique Appliquées du Génome à l'Environnement [Jouy-En-Josas] (MaIAGE), Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), Université Paris-Saclay, Département de Génie Électrique de Sfax [ENIS] (CEM Lab - ENIS), École Nationale d'Ingénieurs de Sfax | National School of Engineers of Sfax (ENIS), REsearch Group in Intelligent Machines [Sfax] (REGIM-Lab), Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), Tunisian Ministry of Higher Education and Scientific Research under the grant agreement number LR11ES48, Nicolas, Henri, Université de Sfax - University of Sfax
Jazyk: angličtina
Rok vydání: 2020
Předmět:
Zdroj: Journal of WSCG
Journal of WSCG, University of West Bohemia, Czech Republic, 2020, 28 (1-2), pp.96-104. ⟨10.24132/JWSCG.2020.28.12⟩
HAL
WSCG
WSCG, May 2020, Plzen, Czech Republic
ISSN: 1213-6972
1213-6964
Popis: International audience; In this paper, we propose a new semi-fragile watermarking scheme in the frequency domain for surveillance videosauthentication. Our system starts operating by generating a binary watermark based on a novel watermarkconstruction process. This latter combines Speeded Up Robust Features (SURF) and Maximally Stable ExtremalRegions (MSER) detectors to extract frames relevant features that can resist common attacks while being fragileto intentional manipulations. Furthermore, the watermark security is improved using torus automorphism mapping.For the embedding process, Regions of Interest (ROI) are detected and then used as watermark holders. Theseregions are decomposed into different frequency sub-bands using Singular Value Decomposition (SVD) as wellas Discrete Wavelet Transform (DWT). Then, the watermark is embedded in selected bands following an additivemethod. A blind detection is conducted to extract the hidden signature from the watermarked video. Evaluationresults show that the proposed scheme is suitable for authentication purpose since it efficiently discriminatesmalicious manipulations from non-malicious ones. Besides, it preserves a high level of perceptual quality
Databáze: OpenAIRE