Professional Documents
Culture Documents
embedding, categorizing them make the public key more GMAM (1)
§ ·
robust in case of alternation. Since the decision for each
intra prediction mode totally depends on the structure of the
max ¨
¨ ¦
© k Previos GOP
IMM k ¸
¸
¹
4×4 block, it is enough robust to be considered as a public The closer value to zero indicates that the
key. corresponding 4×4 sub-macroblock has a less temporal
In I frames there are two luma prediction modes: I4 and activity than the value which is further form zero.
I16. I16 is chosen for the smooth areas while I4, is selected We use the motion information to decide whether the
for the detailed areas of the frame. Since I4 shows detailed selected macroblock for embedding is appropriate. We
area, the proposed method uses this kind of macroblock for avoid embedding the watermark if GMAM information is
embedding. In this paper, the statistical results of the close to zero. Since this kind of macroblock is more
transformed coefficients distribution in Intra coding are vulnerable to be changed after re-encoding.
used. Based on histogram analysis in [11], three main For embedding the watermark, some nonzero (zero) AC
structures are selected for watermark embedding. All of the residuals are converted to zero (±1) in such a way that less
I4 intra blocks should be mapped into one of these three degradations appear. To fulfill this aim, the priority matrix
1755
(PM) is introduced. In the next section, the foundation of if nnz (A )-nnz (B ) d T (3)
PM is explained.
Where the nnz(.) indicates the numbers of nonzero AC
coefficients in a selected 4×4 block, and the threshold T, can
2.1. The priority matrix
vary depending on the application requirement.
If the watermark bit equals to one (Wi=1), then the
The PM is utilized in order to identify the most appropriate
condition nnz (A )-nnz (B ) t 0 should be met; otherwise,
coefficient for modifying. To select the suitable coefficients,
the quality of watermarked video, its bit rate, and also the coefficient should be altered until this condition is
security have been taken into consideration. For each satisfied. In doing so, the suitable nonzero coefficient in B
demand, a priority matrix is devised respectively as Mq, Mb, (based on PM) have to be converted to zero. In this case, the
and Ms. These matrices from which the PM is constructed is least probable coefficient in PM is selected for modifying. If
explained in the following. the mentioned condition is not satisfied yet, the appropriate
To select the appropriate coefficients respect to quality zero coefficient in block A should be converted to (±1)
demand, structure type of the I4 block is determined first. randomly. These process repeats as long as the condition is
Considering the pdf of each coefficient given the structure fulfilled.
type, effectiveness of each coefficient can be specified. As a In the reverse manner, if Wi=0, then the condition
result, the probability of being nonzero for each coefficient nnz (A )-nnz (B ) 0 should be fulfilled in a similar
in specific structure is considered as the quality priority procedure.
matrix, termed as Mq. In this paper, we use the reports of In order to strengthen the robustness of the proposed
the analysis in [11]. algorithm, it is necessary to prevent conversion of the
Moreover, one of the most important challenging issues unwatermarked macroblock to watermarked one. Therefore,
in video watermarking is bit rate increase. Merely noticing the unwatermarked macroblock which are vulnerable to be
the quality in designing the PM may increase the bit rate considered as watermarked one after re-encoding, i.e.,
and will be impractical. To prevent the bit rate increase, it is T nnz (A ) nnz (B ) d T 2 , should be modified to
necessary to modify the coefficients in a manner that the
satisfy the following condition
zigzag order of the watermarked block does not alter
intensively. Consequently, the priority for each coefficient nnz (A ) nnz (B ) ! T 2 (4)
in Mb, is defined considering the zigzag ordering scan. Consequently, the watermarked block can be identified
On the other hand, to strengthen the security in addition after re-encoding or applying attack without ambiguity.
to random selection of 4×4 blocks, another policy is the
random selection of the coefficients. Therefore, a 3. EXPERIMENTAL RESULTS
pseudorandom matrix is defined as Ms. This random matrix
is generated based on a seed extracted from the unused bits We implement the proposed method using the H.264
of the generated key. reference software version 15.0 [13]. To evaluate the
Finally, the PM is calculated via weighted summation watermarking method fairly, different kinds of video stream
of these three matrices: such as “Mobile”, “Salesman”, and “Claire” are selected.
PM W q M q +W b M b +W s M s We apply the algorithm for 35 successive frames of
(2) “Mobile” sequence with ten intra period in main profile
where W q +W b +W s 1
with CAVLC entropy coding with QP=28. The bitstream
In which Mq , Mb and Ms illustrate the quality, bit rate, and embedding is used in this algorithm. Table 1 demonstrates
security probability matrices. Wq , Wb and Ws show the the results of bit rate increase, average PSNR of frames, and
weight of involvement of these parameter in generating PM the achieved capacity for different threshold value, different
respectively. The higher weight for the specified controlling weight factors, and GMAM threshold parameter.
parameter leads to achieving the results considering that As it is shown, the threshold has almost a reverse effect
parameter more than the two other factors. in quality of the watermarked video. In addition, increasing
Wq leads to a better quality as it is expected. It is obvious
2.2. Watermark embedding that if only the security parameter is considered, the bite rate
will increase along with quality degradation.
The difference between the numbers of nonzero coefficients To evaluate the robustness of the proposed method after
in two selected 4×4 block (namely A and B) indicates the re-encoding, we compare the percentage of extracted bit
watermark bit. Wherever the watermark bit is opposite to with the method proposed in [5]. GMAM is selected as [0.5
the sign of the result, the modification should be applied. In 1] and T is considered as 2.The results are shown in Table 2.
order to prevent quality degradation, the modification is
applied on the 4×4 blocks satisfying the following
condition:
1756
Table 1. Simulation Results for “Mobile” Sequence structural information of each block is explored to select the
Wq Wb Ws T GMAM Bit Rate Average appropriate coefficients for embedding. To avoid temporal
Increase per PSNR
flicker, the motion information of previous GOP is
Capacity
embedded (dB)
bit exploited. To make the algorithm robust against re-encoding
and common signal processing attacks, we embed the
watermark data in appropriate macroblock based on motion
0.33 0.33 0.33 2 [0.6 1] 58 -0.0006 41.17 analysis. In contrast to most of the blind H.264
1 0 0 2 [0.6 1] 58 -0.0005 41.35 watermarking scheme, the proposed method uses random
block selection based on a content based key which
0 1 0 2 [0.6 1] 58 -0.0007 40.13 provides the reasonable level of security. Moreover, the
proposed method can control the bit rate increase
0 0 1 2 [0.6 1] 58 0.00067 34.95
efficiently.
0.33 0.33 0.33 2 [0 0.6] 23 -0.0008 43.68
5. REFERENCES
0.33 0.33 0.33 3 [0.6 1] 77 -0.0005 39.19
0.33 0.33 0.33 4 [0.6 1] 99 -0.0006 37.12 [1] V. Solachidis and L. Pitas, "Watermarking digital 3-d
volumes in the discrete Fourier transform domain," IEEE
Table 2. The comparison of the proposed method with [5] Transactions on Multimedia, vol. 9, pp. 1373-1383, Nov 2007.
Proposed Method [5] [2] P. Campisi and A. Neri, "Video watermarking in the 3D-
Bit Rate Bit Rate DWT domain using perceptual masking," vol. 1, pp. 997-1000,
Video Re_encoding Increase per Re_encoding Increase 2005.
Sequence Recovery embedded Recovery per [3] F. Hartung and B. Girod, "Watermarking of
Rate bit Rate embedded uncompressed and compressed video," Signal Processing, vol. 66,
bit pp. 283-301, May 1998.
Carphone 84% 0.0007% 58% 0.018% [4] S. Winkler, E. D. Gelasca, and T. Ebrahimi, "Toward
Claire 83% -0.0028% 83% 0.02% Perceptual Metrics for Video Watermark Evaluation," in SPIE,
2003, pp. 371–378.
Mobile 85% -0.0006% 85% 0.0027%
[5] M. Noorkami and R. M. Mersereau, "Compressed-
Mother 59% 0.0005% 68% 0.016% domain video watermarking for H.264," in Image Processing,
2005. ICIP 2005. IEEE International Conference on, 2005, pp. II-
As it is depicted in Table 2, in most cases our method 890-3.
outperforms the proposed scheme in [5]. Moreover, the [6] M. Noorkami and R. M. Mersereau, "Towards robust
robustness of the proposed method against three kinds of compressed-domain video watermarking for H.264," in Security,
attacks including additive white Gaussian noise, salt and Steganography, and Watermarking of Multimedia Contents VIII,
San Jose, CA, USA, 2006, pp. 60721A-9.
pepper noise and circular averaging filter is shown in Figure
[7] M. Noorkami and R. M. Mersereau, "A framework for
1. robust watermarking of H.264-encoded video with controllable
detection performance," IEEE Transactions on Information
Forensics and Security, vol. 2, pp. 14-23, Mar 2007.
[8] W. Pei, Z. Zhendong, and Y. Jun, "A novel video
watermark technique in motion vectors," in Audio, Language and
Image Processing, 2008. ICALIP 2008. International Conference
on, 2008, pp. 1555-1559.
[9] D. Xu, R. Wang, and J. Wang, "Blind Digital
Watermarking of Low Bit-Rate Advanced H.264/AVC
Compressed Video," in Digital Watermarking, 2009, pp. 96-109.
[10] M. Barni and F. Bartolini, Watermarking Systems
Engineering (Signal Processing and Communications, 21): CRC
Press, Inc., 2004.
[11] F. Xiaopeng, L. Yan, and G. Wen, "A novel coefficient
scanning scheme for directional spatial prediction-based image
Figure 1. The robustness result of the proposed method against compression," in Multimedia and Expo, 2003. ICME '03.
three kinds of attacks (salt & pepper noise density=0.0001, Proceedings. 2003 International Conference on, 2003, pp. II-557-
Gaussian noise (0,0.0001), circular averaging filter r=0.6) 60 vol.2.
[12] A. Mansouri, F. Torkamani-Azar, and A. Mahmoudi
4. CONCLUSION Aznaveh, "Motion Consideration In H.264/AVC Compressed
Video Watermarking," in PCM Bangkok, Thailand, 2009, pp. 879-
In this paper, a blind H.264 watermarking method is 888.
presented. Regarding to preserving spatial quality, the [13] "http://iphome.hhi.de/suehring/tml/download."
1757