Blind semi-fragile watermarking scheme for video authentication in video surveillance context
- PDF / 8,690,111 Bytes
- 35 Pages / 439.642 x 666.49 pts Page_size
- 71 Downloads / 193 Views
Blind semi-fragile watermarking scheme for video authentication in video surveillance context Amal Hammami1 · Amal Ben Hamida1 · Chokri Ben Amar1 Received: 23 December 2019 / Revised: 7 August 2020 / Accepted: 24 September 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract With the development of advanced multimedia editing tools, numerous unauthorized manipulations are easily doable to surveillance systems video files. Thus, video tamper detection is revealed as a big challenge for multimedia security field researchers. Indeed, we propose herein a singular value decomposition (SVD) and discrete wavelet transform (DWT) based semi fragile watermarking scheme for video content authentication. A content-based authentication signature is firstly generated by extracting reliable features from regions of interest. QR code generation technique as well as Arnold transform are used to boost the security aspect of the watermark. This latter is efficiently hidden in the wavelet middle frequency sub bands through an additive embedding algorithm and then extracted via a blind detection method. Simulation results demonstrate that the proposed scheme jointly achieves a good perceptual quality and a high watermark capacity. In addition, it is capable of distinguishing intentional attacks from incidental modifications. Indeed, the proposed watermarking scheme is very fragile to malicious tampering while allowing non-malicious processing. Keywords Blind semi-fragile watermarking · Video authentication · Video surveillance · Singular value decomposition · Discrete wavelet transform · Quick response code
Abbreviations: Used acronyms and symbols Acronym/Symbol Definition BER Bit Error Rate Cmax Maximum Capacity DCT Discrete Cosine Transform Amal Hammami
[email protected] Amal Ben Hamida [email protected] Chokri Ben Amar [email protected] 1
REsearch Groups in Intelligent Machines, University of Sfax, National Engineering School of Sfax, Sfax 3038, Tunisia
Multimedia Tools and Applications
DWT F actα F actβ FFT FPS GMM GOP HH HL LH LL LWT NC PCA PSNR QDCT QR code ROI Sextracted Soriginal SSIM Swatermarked TBER TNC ViSAR Wembedding Wextracted Wregenerated ⊕
Discrete Wavelet Transform Scaling factor Scaling factor Fast Fourier Transform Frame per second Gaussian Mixture Model Group Of Pictures High Frequency sub-band Middle Frequency sub-band Middle Frequency sub-band Low Frequency sub-band Lifting Wavelet Transform Normalized Correlation Principal Component Analysis Peak Signal to Noise Ratio Quantized Discrete Cosine Transform Quick Response code Regions Of Interest Extracted singular value matrix Original version of the singular value matrix Structural SIMilarity index Watermarked version of the singular value matrix Threshold for BER values Threshold for NC values Video Synthetic Aperture Radar Watermark bit Extracted watermark bit Regenerated watermark bit Exclusive OR operation
1 Introduction Nowadays, video surveillance is broadly deployed in several sectors. In fact, survei
Data Loading...