Preview

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding

Better Essays
Open Document
Open Document
6460 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
1130 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 8, AUGUST 2011

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding Ersin Esen and A. Aydin Alatan, Member, IEEE

Abstract—Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications.

Index Terms—Data hiding, digital watermarking, forbidden zone data hiding, quantization index modulation, repeat accu- mulate codes, selective embedding.

I. Introduction ATA HIDING is the process of embedding information into a host medium. In general, visual and arual media are preferred due to their wide presence and the tolerance of human perceptual systems involved. Although the general structure of data hiding process does not depend on the host media type, the methods vary depending on the nature of such media. For instance, image and video data hiding share many common points; however video data hiding necessitates more complex designs [6], [7] as a result of the additional temporal dimension. Therefore, video data hiding continues to constitute an active research area. Data hiding in video sequences is



References: Signal Process., Oct. 2007, pp. 373–376. [2] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, 2007, pp. [3] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chan- drasekaran, “Robust image-adaptive data hiding using erasure and error correction,” IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627–1639, Dec. 2004. [4] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in Proc. IEEE Int. Conf. SITIS, Nov.–Dec. 2008, pp. 277–284. 1, pp. 111–134, Jan. 2005. 12, no. 6, pp. 685–695, Jun. 2003. [8] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006, pp. 1393–1396. [9] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001. [11] D. Divsalar, H. Jin, and R. J. McEliece, “Coding theorems for turbo-like codes,” in Proc. 36th Allerton Conf. Commun. Control Comput., 1998, pp. 201–210. 54, no. 11, pp. 4376–4392, Nov. 2006. [13] Z. Wei and K. N. Ngan, “Spatio-temporal just noticeable distortion profile for grey scale image/video in DCT domain,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 3, pp. 337–346, Mar. 2009. [14] M. Maes, T. Kalker, J. Haitsma, and G. Depovere, “Exploiting shift invariance to obtain a high payload in digital image watermarking,” in Proc. IEEE ICMCS, vol. 1. Jul. 1999, pp. 7–12. Watermarking Multimedia Contents Conf., vol. 3657. 1999, pp. 103– 112. [17] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Trans. Circuits Syst. Video Tech- nol., vol. 19, no. 10, pp. 1499–1512, Oct. 2009. ACM STOC, 2003, pp. 116–125. [19] B. Skoric, T. U. Vladimirova, M. Celik, and J. C. Talstra, “Tardos fingerprinting is better than we thought,” IEEE Trans. Inform. Theory, vol. 54, no. 8, pp. 3663–3676, Aug. 2008.

You May Also Find These Documents Helpful

  • Best Essays

    Reynolds, Jackie. Selective and differential media. Digital image. Www.microbelibrary.org). Kern Community College District, 12 Sept. 2011. Web. 3 Nov. 2013.…

    • 2885 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Video Signal Technology- Video signals can be both analog and digital signals. Analog video consists of a low voltage signal containing intensity information, timing information, and a horizontal sync signal. Digital video signals contain a series of digital images displayed in rapid succession in “frames”, measured by FPS (frames per second).…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Data encryption on removable media guideline. (2014). In Berkeley Security. Retrieved March 15, 2014, from https://security.berkeley.edu/content/data-encryption-removable-media-guideline?destination=node/379…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    John Lech Johansen was a programmer in Norway that devised a code to bypass the encryption on DVD’s and allowed people to file share them on the internet. He did not break the laws that where in place at that time.…

    • 966 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Level 3 unit 302

    • 578 Words
    • 2 Pages

    When people have been given constructive feedback some people take it in a good way and listen to the feedback to try and improve on their work but some people get defensive and take it as a dig at their work and choose not to follow the feedback.…

    • 578 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hansen, R., Harris, A., Phenix, A., Thornton, D. (2003). STATIC 99 Coding Rules – Revised 2003. Retrieved June 18, 2009 from http://ww2.ps-sp.gc.ca/publications/corrections/pdf/Static-99-coding-Rules_e.pdf…

    • 2465 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    References: Ali, I. (2006, July 24). Copyright Protection-Software-Computer Programs. Retrieved December 4, 2010 from http://www.lawdit.co.uk/reading_room/room/view_article.asp?name=../articles/Computer%20Protection-%20Software-Computer%20Programs.htm…

    • 1793 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Good Essays

    Editing Codes

    • 553 Words
    • 3 Pages

    In the beginning film-makers in America tried to create films by using invisible editing. They would try to make sure the audience wouldn’t notice the cuts and would make the film seem magic. I learned that this can be very useful to make the audience feel entertained and keep…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Spam Image Identification Using an Artificial Neural Network Jason R. Bowling, Priscilla Hope, Kathy J. Liszka The University of Akron Akron, Ohio 44325-4003 {bowling, ph11, liszka}@uakron.edu Abstract We propose a method for identifying image spam by training an artificial neural network. A detailed process for preprocessing spam image files is given, followed by a description on how to train an artificial neural network to distinguish between ham and spam.…

    • 2824 Words
    • 12 Pages
    Powerful Essays