Watermarking Algorithm of Tolerating the Second Compression for Video Content Authentication
Jian-Jing FU,De-Ren CHEN
DOI: https://doi.org/10.11897/SP.J.1016.2018.00558
2018-01-01
Abstract:With the function enhancement of video editing software,video contents tampering and forging become more and more easier,which makes the user difficult to distinguish the authenticity of video content.So it may lead to serious consequences when it comes to forensic evidence,medical expertise,military intelligence,national security,and so on.Up to now,most of the existing researches focus on the identification of video content under the first compression or recompression.But after videos are published in compressed form,it often undergo decoding,conventional signal processing,and encoded again by modifying GOP(Group of Pictures) and QP (Quantization Parameters).Under the secondary compression condition above,how to effectively determine the authenticity of video content is an urgent problem.Therefore,we propose a watermarking algorithm,based on quantitatively modulating the contribution rate of the singular value,for video content authentication.(1) By extracting features and embedding watermark in the 2nd level DWT (Wavelet Transform Discrete) domain for each sub-block from the video luminance component,the consistency between the reconstructed features and extracted watermark can be promoted in the whole;(2) The low frequency domain in the 2nd level DWT is selected to embed the watermark by using a novel algorithm based on quantitatively modulating the contribution rate of the first singular,which achieves watermark transparency and the robustness tolerating the second video compression.The core content of authentication algorithm based on digital watermarking is the stability of hidden information which is embodied by watermark algorithm.Because the stability of the proposed watermark comes from all the singular values,rather than part of the singular value,algorithm of this paper have obvious advantages in robustness;(3) The video content features based on energy relations can maintain a higher stability after the secondary compression;(4) The security and accuracy of the algorithm are improved respectively by crossing watermark and neighborhood decision.In addition,in this paper,the security of the proposed algorithm is analyzed theoretically,including cryptanalysis,collage attack,quantization attack and targeted forgery attack.And the theoretical analysis shows that the proposed algorithm can resist forgery attack,collage attack and some other attacks,and the robustness of the watermark is 0.96 under the condition of the secondary compression without malicious tampering.Finally,the experiment is carried out aiming at the transparency of watermark,the impact on bit rate and the robustness of attack.And the experimental results show that the influence of watermark embedding on visual quality is decreased by 1.3%,and that on bit rate is increased by 8.41%;that the proposed watermarking scheme can effectively distinguish malicious manipulations from the content-preserving operator after secondary compression for H.264/AVC video,and locate the position tampered.Also,through the performance comparison of related schemes,it further demonstrates the advantage of this algorithm for video content authentication under the condition of secondary compression.