MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI...
-
Upload
victoria-curtis -
Category
Documents
-
view
218 -
download
2
Transcript of MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI...
MPEG-4 AVC robust video MPEG-4 AVC robust video watermarking based on QIM and watermarking based on QIM and perceptual masking principlesperceptual masking principles
Marwen HASNAOUIMarwen HASNAOUI
Maher BELHAJMaher BELHAJ
Mihai MITREAMihai MITREA
Françoise PRETEUXFrançoise PRETEUX
ARTEMIS DepartmentARTEMIS Department Institut Télécom Institut Télécom
Télécom SudParis Télécom SudParis Evry - France Evry - France
OutlineOutline
Compressed domain watermarkingCompressed domain watermarking
A robust compressed-domain watermarkingA robust compressed-domain watermarking
Conclusion and further workConclusion and further work
m-ST-QIM insertion (new perceptual shaping, energy m-ST-QIM insertion (new perceptual shaping, energy selection criterion)selection criterion)
DetectionDetection
Experimental resultExperimental result
A contradiction in termsA contradiction in terms??
Between myth and realityBetween myth and reality!!
Selection
Buy Right
Send content
Distribution
Internet
VOD server BOB
Justice
ContextContext
Storage
MPEG-4 AVC WatermarkingChallengeChallenge::
Real time, robust watermarking for MPEG-4 AVC
Video visual redundancy exploited in order to hide
watermark
Video visual redundancy
eliminated
Context: VoD distributionContext: VoD distribution
State-of-the-art panorama
D. Zou, and J.A. BloomH.264/AVC STREAM REPLACEMENT
TECHNIQUE FOR VIDEO WATERMARKING 2009.
Embedding at the Decoder side
A. Golikeri, and
R.M. Mersereau Robust digital video watermarking scheme for
H.264 advanced videocoding standard”, Journal of Electronic imaging 16, 2007.
QIM Mark generation
M. Noorkami, P. Nasiopoulos, and
Z. J. Wang Compressed‑domain video
watermarking for H.264, IEEE Intl. Conf. on Image Processing, Vol. 2,
September 2005.
Perceptual shaping adapted to syntax features
ComWat algorithm (May 2010)
Less complexity
Best robustness
Best transparency
Large data payload
Multi-symbole ComWat algorithm
m-ComWat algorithm: distinctive factorsm-ComWat algorithm: distinctive factors
m-array Quantization Index Modulation method [Chen and Worwell]m-array Quantization Index Modulation method [Chen and Worwell]
Energy selection criteria based on information theory conceptsEnergy selection criteria based on information theory concepts
First perceptual masking mechanism in MPEG-4 AVCFirst perceptual masking mechanism in MPEG-4 AVC
Between myth and realityBetween myth and reality
Mark inserted in AC quantized coefficient at the decoder sideMark inserted in AC quantized coefficient at the decoder side
Watermarked block z
Selected Host AC block x Key k Message m
Output
Input
Perceptual shapingPerceptual shaping
AVC
AVCt
txxy
txx
'
'
Embedding & Block reconstructionEmbedding & Block reconstruction
ytwxz
wxwx
AVC
'
AVCt
Mark generationMark generation
qw
kM
mxk
M
mxQq
))('())('(
Block x
Block selectionBlock selectionYESYES NONO
m-ST-QIM Insertionm-ST-QIM Insertion
Between myth and realityBetween myth and reality
Toward an MPEG-4 AVC perceptual maskToward an MPEG-4 AVC perceptual mask
Between myth and realityBetween myth and reality
DC 1 5 6
2 4 7 12
3 8 11 13
9 10 14 15
DCT
tAXAY
IDCTAXAY t
DC 1 5 6
2 4 7 12
3 8 11 13
9 10 14 15
DCT int
4x4 sub- macroblock
X
ECXCY t
IDCT int
5/2b ; 2/1;
4/²2/4/²2/
2/²2/²
4/²2/4/²2/
2/²2/²
1121
2111
2111
1121
1221
1111
2112
1111
a
babbab
abaaba
babbab
abaaba
E
; C'C
')'(' CEYCX t
Perceptual mask Perceptual mask
4x4 contrast sensitivity tableT
0.7 0.58 1.20 2.39
0.58 1.12 1.49 2.30
1.20 1.49 3.07 4.35
2.39 2.30 4.35 7.25
ATAY t
EtCATtAC
EtCATtACAVC
T
)(
)(
Perceptual shapingPerceptual shaping
AVCtx
AVCtx'y
AVCt
Between myth and realityBetween myth and reality
Input:x = original
tAVC = perceptual mask
output:
= original AVCtx'
Watermarked block z
Selected Host AC block x Key k Message m
Output
Input
Perceptual shapingPerceptual shaping
AVC
AVCt
txxy
txx
'
'
Embedding & Block reconstructionEmbedding & Block reconstruction
ytwxz
wxwx
AVC
'
AVCt
Mark generationMark generation
qw
kM
mxk
M
mxQq
))('())('(
Block x
Energy selectionEnergy selectionYESYES NONO
mST-QIM InsertionmST-QIM Insertion
Between myth and realityBetween myth and reality
Embedding & block reconstructionEmbedding & block reconstruction
AVCtx
AVCtx'
y
The inserted bit The inserted bit m = 0m = 0
z
kx '
w
Between myth and realityBetween myth and reality
Watermarked block z
Selected Host AC block x Key k Message m
Output
Input
Perceptual shapingPerceptual shaping
AVC
AVCt
txxy
txx
'
'
Embedding & Block reconstructionEmbedding & Block reconstruction
ytwxz
wxwx
AVC
'
AVCt
Mark generationMark generation
Block x
Energy selectionEnergy selectionYESYES NONO
mST-QIM InsertionmST-QIM Insertion
Between myth and realityBetween myth and reality
qw
kM
mxk
M
mxQq
))('())('(
Block selection: energy-based criterionBlock selection: energy-based criterion
Additional constraints for transparent MPEG-4 AVC watermarking in:Additional constraints for transparent MPEG-4 AVC watermarking in:S. Duta, M. MitreaS. Duta, M. Mitrea, F. Preteux, M. Belhaj, “The MPEG-4 AVC domain watermarking , F. Preteux, M. Belhaj, “The MPEG-4 AVC domain watermarking transparency”, transparency”, Proc. SPIE Vol. 6982, April 2008Proc. SPIE Vol. 6982, April 2008
16//116/ xxxx zx
Between myth and realityBetween myth and reality
Unmarked block energy
Marked block energy
The mean of energy of unmarked selected blocks
The standard deviation of energy of
unmarked selected blocks
Mark detection Mark detection
Detection variable
))(())(()( ktzktzQmY AVCt
AVCt
KeyQuantization step
k
Watermarked blockz
Without attack
Between myth and realityBetween myth and reality
Decision
Y(m =d) 2 Decision
Y(m =d+1) 2
dIsup 1inf dI dI inf 1sup dI
01infsup dIdIm
m 1
m
dmI d 2
)2)1(()inf(
m
dmI d 2
)2)1(()sup(
Mark detection Mark detection
After an attack
Detection variable
KeyQuantization step
k
Attacked block
'z
Without attack
))'(())'(()( nAVCt
nAVCt ktzktzQmY
Between myth and realityBetween myth and reality
Decision
Y(m =d) 2 Decision
Y(m =d+1) 2
dIsup 1inf dI dI inf 1sup dI
MEDIEVALS video corpus: MEDIEVALS video corpus: https://www.medialive.com/Medievalshttps://www.medialive.com/Medievals
2 h of video in 2 h of video in HDHD and and SDSD
Different compression rate: 1Mo, 5 Mo, 10 Mo Different compression rate: 1Mo, 5 Mo, 10 Mo
MPEG-4 AVC baseline profile, only level 2, 3 and 4MPEG-4 AVC baseline profile, only level 2, 3 and 4
The watermarking quantization step is chosen according to Golikiri:The watermarking quantization step is chosen according to Golikiri:
5131 )168.0*exp(*68.0
300 160
264264
264
hh
h
QPQP
QP
Experimental results: transparencyExperimental results: transparency
embbeding
Subjective Quality Objective Quality
PSNR 60.5
Marked videoOriginal video
AAD 0.47
PMSE 0.0003
IF 999.73
SC 0.99
NCC 0.99
DVQ 0.06
Similarity measures
Correlation measures
Psycho visual measures
α =0.84, Δ=160, m=5
Experimental results: robustnessExperimental results: robustness
Transcoding Stirmark Noise addition
%57.6BER %75.11BER %0BER
embbeding detectionAttack: Noise matrix
embbeding detectionAttack: Noise matrix
With energy selection
Without energy selection
Performance demonstration: Performance demonstration: Transcoding AttackTranscoding Attack
X Y
-2 -1 0 1 2
-2
-1
0
1
2
Number of «-2» detected under condition «-2» was inserted to total
number of inserted bits
Number of «-2» detected under condition «1» was inserted to total number of
inserted bits
-2 -1 0 1 2
-2 0,9 0,02 0,02 0,01 0,05
-1 0,06 0,87 0,05 0,01 0,01
0 0 0,06 0,89 0,04 0,01
1 0,01 0,02 0,04 0,9 0,03
2 0,02 0,01 0,11 0,04 0,92
-2 -1 0 1 2
-2 0,2 0,2 0,2 0,2 0,2
-1 0,2 0,2 0,2 0,2 0,2
0 0,2 0,2 0,2 0,2 0,2
1 0,2 0,2 0,2 0,2 0,2
2 0,2 0,2 0,2 0,2 0,2
embbeding detectionAttack: Noise matrix
With energy selection
Without energy selection
Performance demonstration: Stirmark Performance demonstration: Stirmark AttackAttack
X Y
-2 -1 0 1 2
-2
-1
0
1
2
-2 -1 0 1 2
-2 0,77 0,11 0,02 0,01 0,09
-1 0,12 0,69 0,15 0,03 0,01
0 0,03 0,14 0,73 0,08 0,02
1 0,01 0,04 0,06 0,81 0,08
2 0,07 0,02 0,04 0,11 0,76
-2 -1 0 1 2
-2 0,2 0,2 0,2 0,2 0,2
-1 0,2 0,2 0,2 0,2 0,2
0 0,2 0,2 0,2 0,2 0,2
1 0,2 0,2 0,2 0,2 0,2
2 0,2 0,2 0,2 0,2 0,2
embbeding detectionAttack: Noise matrix
With energy selection
Without energy selection
Performance demonstration: Noise adding Performance demonstration: Noise adding AttackAttack
X Y
-2 -1 0 1 2
-2
-1
0
1
2
-2 -1 0 1 2
-2 1 0 0 0 0
-1 0 1 0 0 0
0 0 0 1 0 0
1 0 0 0 1 0
2 0 0 0 0 1
-2 -1 0 1 2
-2 1 0 0 0 0
-1 0 1 0 0 0
0 0 0 1 0 0
1 0 0 0 1 0
2 0 0 0 0 1
Conclusion
New masking model adapted to New masking model adapted to MPEG‑4 AVC featuresMPEG‑4 AVC features
An extension of the first MPEG‑4 AVC robust An extension of the first MPEG‑4 AVC robust watermarking method against transcoding (about 6.5% of watermarking method against transcoding (about 6.5% of errors) and geometric attacks (about 11.57 % of errors)errors) and geometric attacks (about 11.57 % of errors)
Quantization watermarking on Quantization watermarking on compressed domain compressed domain
Information theory modeling attackInformation theory modeling attack
Perspectives
Ameliorate the masking model Ameliorate the masking model
Technical solution: watermarking systemTechnical solution: watermarking system
Estimate the capacity Estimate the capacity