Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding Ersin Esen and A. Aydin Alatan, Member, IEEE
Abstract—Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications.
Index Terms—Data hiding, digital watermarking, forbidden zone data hiding, quantization index modulation, repeat accu- mulate codes, selective embedding.
I. Introduction ATA HIDING is the process of embedding information into a host medium. In general, visual and arual media are preferred due to their wide presence and the tolerance of human perceptual systems involved. Although the general structure of data hiding process does not depend on the host media type, the methods vary depending on the nature of such media. For instance, image and video data hiding share many common points; however video data hiding necessitates more complex designs [6], [7] as a result of the additional temporal dimension. Therefore, video data hiding continues to constitute an active research area. Data hiding in video sequences is
References: Signal Process., Oct. 2007, pp. 373–376. [2] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, 2007, pp. [3] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chan- drasekaran, “Robust image-adaptive data hiding using erasure and error correction,” IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627–1639, Dec. 2004. [4] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in Proc. IEEE Int. Conf. SITIS, Nov.–Dec. 2008, pp. 277–284. 1, pp. 111–134, Jan. 2005. 12, no. 6, pp. 685–695, Jun. 2003. [8] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006, pp. 1393–1396. [9] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001. [11] D. Divsalar, H. Jin, and R. J. McEliece, “Coding theorems for turbo-like codes,” in Proc. 36th Allerton Conf. Commun. Control Comput., 1998, pp. 201–210. 54, no. 11, pp. 4376–4392, Nov. 2006. [13] Z. Wei and K. N. Ngan, “Spatio-temporal just noticeable distortion profile for grey scale image/video in DCT domain,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 3, pp. 337–346, Mar. 2009. [14] M. Maes, T. Kalker, J. Haitsma, and G. Depovere, “Exploiting shift invariance to obtain a high payload in digital image watermarking,” in Proc. IEEE ICMCS, vol. 1. Jul. 1999, pp. 7–12. Watermarking Multimedia Contents Conf., vol. 3657. 1999, pp. 103– 112. [17] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Trans. Circuits Syst. Video Tech- nol., vol. 19, no. 10, pp. 1499–1512, Oct. 2009. ACM STOC, 2003, pp. 116–125. [19] B. Skoric, T. U. Vladimirova, M. Celik, and J. C. Talstra, “Tardos fingerprinting is better than we thought,” IEEE Trans. Inform. Theory, vol. 54, no. 8, pp. 3663–3676, Aug. 2008.