skip to main content
research-article

Spatio-Temporal Context Based Adaptive Camcorder Recording Watermarking

Authors Info & Claims
Published:01 November 2022Publication History
Skip Abstract Section

Abstract

Video watermarking technology has attracted increasing attention in the past few years, and a great deal of traditional and deep learning-based methods have been proposed. However, these existing methods usually suffer from the following two challenges: First, most algorithms cannot resist camcorder recording attack, which limits their practical application. Second, watermark embedding may cause substantial degradation of video quality. Through analyzing the unique distortions presented in the camcorder recording process, including geometric distortion, temporal sampling distortion, sensor distortion and processing distortion, this paper proposes a novel spatio-temporal context based adaptive camcorder recording watermarking scheme STACR. In STACR, considering the geometric distortion and video visual quality, we embed the watermark by constructing a spatio-temporal histogram and incorporate a content features based adaptive locating algorithm to select embedding blocks and embedding strengths. As for the temporal sampling attack, we put forward a watermark correlation-based synchronization algorithm and combine it with cross-validation. Moreover, to resist the sensor distortion, we design a local matching-based algorithm to improve the extraction accuracy. In addition, grouped and repeated embedding strategies are combined to cope with the processing distortion. Experimental results compared with the state-of-the-art show that the proposed scheme achieves high video quality and is robust to geometric attacks, compression, scaling, transcoding, recoding, frame rate changes and especially for camcorder recording.

REFERENCES

  1. [1] Asikuzzaman Md., Alam Md. Jahangir, Lambert Andrew J., Mark R. Pickering, al et. 2014. Imperceptible and robust blind video watermarking using chrominance embedding: A set of approaches in the DT CWT domain. IEEE Transactions on Information Forensics and Security 9, 9 (2014), 15021517.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Asikuzzaman Md., Alam Md. Jahangir, Lambert Andrew J., and Pickering Mark R.. 2016. Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Transactions on Multimedia 18, 9 (2016), 17331748.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Asikuzzaman Md. and Pickering Mark R.. 2017. An overview of digital video watermarking. IEEE Transactions on Circuits and Systems for Video Technology 28, 9 (2017), 21312153.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Baluja S.. 2020. Hiding images within images. IEEE Transactions on Pattern Analysis and Machine Intelligence (2020), 16851697.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] BT RECOMMENDATION ITU-R. 2002. Methodology for the subjective assessment of the quality of television pictures. International Telecommunication Union (2002).Google ScholarGoogle Scholar
  6. [6] Chen Changsheng, Huang Wenjian, Zhou Baojian, Liu Chenchen, and Mow Wai Ho. 2016. PiCode: A new picture-embedding 2D barcode. IEEE Transactions on Image Processing 25, 8 (2016), 34443458.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Chen Changsheng, Zhou Baojian, and Mow Wai Ho. 2018. RA code: A robust and aesthetic code for resolution-constrained applications. IEEE Transactions on Circuits and Systems for Video Technology 28, 11 (2018), 33003312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Choi Dooseop, Do Hoseok, Choi Hyuk, and Kim Taejeong. 2010. A blind MPEG-2 video watermarking robust to camcorder recording. Signal Processing 90, 4 (2010), 13271332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Do Hoseok, Choi Dooseop, Kim Taejeong, and Choi Hyuk. 2008. Digital video watermarking based on histogram and temporal modulation and robust to camcorder recording. In 2008 IEEE International Symposium on Signal Processing and Information Technology. IEEE, 330335.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Doërr Gwenaël and Dugelay J-L. 2004. Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing 52, 10 (2004), 29552964.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Dubey Nilesh and Modi Hardik. 2021. A robust discrete wavelet transform based adaptive watermarking scheme in YCbCr color space against camcorder recording in cinema/movie theatres. Engineered Science 15 (2021), 116128.Google ScholarGoogle Scholar
  12. [12] Fang Han, Zhang Weiming, Zhou Hang, Cui Hao, and Yu Nenghai. 2019. Screen-shooting resilient watermarking. IEEE Transactions on Information Forensics and Security 14, 6 (2019), 14031418.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Fridrich Jessica. 2009. Digital image forensics. IEEE Signal Processing Magazine 26, 2 (2009), 2637.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Gunturk Bahadir K., Altunbasak Yucel, and Mersereau Russell M.. 2002. Color plane interpolation using alternating projections. IEEE Transactions on Image Processing 11, 9 (2002), 9971013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Hadjidemetriou Efstathios, Grossberg Michael D., and Nayar Shree K.. 2001. Histogram preserving image transformations. International Journal of Computer Vision 45, 1 (2001), 523.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Hartung Frank H., Su Jonathan K., and Girod Bernd. 1999. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents, Vol. 3657. International Society for Optics and Photonics, 147158.Google ScholarGoogle Scholar
  17. [17] Holliman Matthew J., Macy William W., and Yeung Minerva M.. 2000. Robust frame-dependent video watermarking. In Security and Watermarking of Multimedia Contents II, Vol. 3971. International Society for Optics and Photonics, 186197.Google ScholarGoogle Scholar
  18. [18] Hui Chen, Liu Shaohui, Cui Wenxue, Zeng Jinghua, Jiang Feng, and Zhao Debin. 2021. Adaptive flexible 3D histogram watermarking. In 2021 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Iwata Motoi, Mizushima Naoyoshi, and Kise Koichi. 2017. Practical watermarking method estimating watermarked region from recaptured videos on smartphone. IEICE Transactions on Information and Systems 100, 1 (2017), 2432.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Jianfeng Lu, Zhenhua Yang, Fan Yang, and Li Li. 2011. A MPEG2 video watermarking algorithm based on DCT domain. In 2011 Workshop on Digital Media and Digital Content Management. IEEE, 194197.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Kim Won-gyum, Lee Seon Hwa, and Seo Yong-seok. 2006. Image fingerprinting scheme for print-and-capture model. In Proc. Pacific-Rim Conf. Multimedia. Springer, 106113.Google ScholarGoogle Scholar
  22. [22] Kingsbury Nick. 1999. Image processing with complex wavelets. Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences 357, 1760 (1999), 25432560.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Kingsbury Nick. 2005. Human Vision. http://cnx.org/content/m11084/latest/.Google ScholarGoogle Scholar
  24. [24] Langelaar Gerhard C., Setyawan Iwan, and Lagendijk Reginald L.. 2000. Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Processing Magazine 17, 5 (2000), 2046.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Li Li, Dong Zihui, Lu Jianfeng, Dai Junping, Huang Qianru, Chang Chin-Chen, and Wu Ting. 2015. AN H. 264/AVC HDTV watermarking algorithm robust to camcorder recording. Journal of Visual Communication and Image Representation 26 (2015), 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Li Tianxing, An Chuankai, Xiao Xinran, Campbell Andrew T., and Zhou Xia. 2015. Real-time screen-camera communication behind any scene. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 197211.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Liu Jen-Chang and Shieh Hsiang-An. 2011. Toward a two-dimensional barcode with visual information using perceptual shaping watermarking in mobile applications. Optical Engineering 50, 1 (2011), 017002.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Mareen Hannes, Courteaux Martijn, Praeter Johan De, Asikuzzaman Md., Wallendael Glenn Van, Pickering Mark R., and Lambert Peter. 2021. Camcording-resistant forensic watermarking fallback system using secondary watermark signal. IEEE Transactions on Circuits and Systems for Video Technology 31, 9 (2021), 34033416. Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Miller Matt L. and Bloom Jeffrey A.. 1999. Computing the probability of false watermark detection. In International Workshop on Information Hiding. Springer, 146158.Google ScholarGoogle Scholar
  30. [30] Nguyen Viet, Tang Yaqin, Ashok Ashwin, Gruteser Marco, Dana Kristin, Hu Wenjun, Wengrowski Eric, and Mandayam Narayan. 2016. High-rate flicker-free screen-camera communication with spatially adaptive embedding. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, 19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Párraga C. A., Brelstaff Gavin, Troscianko Tom, and Moorehead I. R.. 1998. Color and luminance information in natural scenes. JOSA A 15, 3 (1998), 563569.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Prabakaran Ganesan, Bhavani R., and Ramesh M.. 2013. A robust QR-Code video watermarking scheme based on SVD and DWT composite domain. In 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering. IEEE, 251257.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Schaber Philipp, Kopf Stephan, Wetzel Sina, Ballast Tyler, Wesch Christoph, and Effelsberg Wolfgang. 2015. CamMark: Analyzing, modeling, and simulating artifacts in camcorder copies. ACM Trans. Multim. Comput. Commun. Appl. 11 (2015), 42:1–42:23.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Su Po-Chyi, Chang Yu-Chuan, and Wu Ching-Yu. 2013. Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Transactions on Information Forensics and Security 8, 12 (2013), 18971908.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Sullivan Gary J., Ohm Jens-Rainer, Han Woo-Jin, and Wiegand Thomas. 2012. Overview of the high efficiency video coding (HEVC) standard. IEEE Transactions on Circuits and Systems for Video Technology 22, 12 (2012), 16491668.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Tancik Matthew, Mildenhall Ben, and Ng Ren. 2020. StegaStamp: Invisible hyperlinks in physical photographs. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Voloshynovskiy Sviatoslav V., Pereira Shelby, Herrigel Alexander, Baumgartner Nazanin, and Pun Thierry. 2000. Generalized watermarking attack based on watermark estimation and perceptual remodulation. In Security and Watermarking of Multimedia Contents II, Vol. 3971. International Society for Optics and Photonics, 358370.Google ScholarGoogle Scholar
  38. [38] Wang Yulin. 2009. A blind MPEG-2 video watermarking robust to regular geometric attacks. In 2009 IEEE International Workshop on Open-Source Software for Scientific Computation (OSSC). IEEE, 169171.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Watson Andrew B.. 1993. Visually optimal DCT quantization matrices for individual images. In [Proceedings] DCC93: Data Compression Conference. IEEE, 178187.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Xiang Shijun, Kim Hyoung Joong, and Huang Jiwu. 2008. Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Transactions on Circuits and Systems for Video Technology 18, 6 (2008), 777790.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Yuan Yule, Zhao Yong, Wang Kunpeng, and Bai Xuhui. 2010. A robust video watermarking algorithm based on sliding window for AVS. In 6th International Conference on Digital Content, Multimedia Technology and its Applications. IEEE, 710.Google ScholarGoogle Scholar
  42. [42] Zhu Jiren, Kaplan Russell, Johnson Justin, and Fei-Fei Li. 2018. HiDDeN: Hiding data with deep networks. In Proceedings of the European Conference on Computer Vision (ECCV).Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Zong Tianrui, Xiang Yong, Natgunanathan Iynkaran, Guo Song, Zhou Wanlei, and Beliakov Gleb. 2015. Robust histogram shape-based method for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology 25, 5 (2015), 717729.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Spatio-Temporal Context Based Adaptive Camcorder Recording Watermarking

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Multimedia Computing, Communications, and Applications
          ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 3s
          October 2022
          381 pages
          ISSN:1551-6857
          EISSN:1551-6865
          DOI:10.1145/3567476
          • Editor:
          • Abdulmotaleb El Saddik
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 2022
          • Online AM: 12 March 2022
          • Accepted: 29 November 2021
          • Revised: 6 October 2021
          • Received: 1 June 2021
          Published in tomm Volume 18, Issue 3s

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Refereed
        • Article Metrics

          • Downloads (Last 12 months)163
          • Downloads (Last 6 weeks)12

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!