Patent classifications
G06T1/0057
VIDEO WATERMARKING
A method of embedding a watermark data in a video signal to be entropy coded, wherein the video signal comprises a block with levels and the watermark data comprises a bit, the method of embedding comprising: obtaining watermark data; obtaining a value of a first watermarked level on the basis of a first level of the block by processing the value of the first watermarked level; it is also described a method of detecting a watermark in a video signal, the video signal having been entropy decoded and comprising a block with a first watermarked level and the watermark data comprising a bit, the method of detecting comprises: receiving the video signal; obtaining watermark data w.sub.i on the basis of the first watermarked level; determining a tampering indicator by verifying whether the obtained watermark data w.sub.i corresponds with a watermark data w.sub.i embedded by a method of embedding watermark.
Method and device for watermark-based image integrity verification
The present disclosure provides a method of embedding a watermark on a Joint Photographic Experts Group (JPEG) image. The method includes: performing an entropy decoding on the JPEG image to generate quantized discrete cosine transform (DCT) coefficients; determining target bits in a bit plane of the quantized DCT coefficients on the basis of a watermark-embedding table (WET); and embedding a watermark based on metadata of the JPEG image in the target bits. Also, the present disclosure provides a method of verifying integrity of the image by using the embedded watermark.
Detection of video tampering
Techniques are provided for generation of secure video and tamper detection of the secure video. A methodology implementing the techniques according to an embodiment includes selecting a subset of macroblocks from a video frame to be transmitted and calculating a low frequency metric on each of the selected macroblocks. The method also includes performing a hash calculation on the low frequency metrics to generate a frame signature; encrypting the frame signature (using a private key) to generate an encrypted watermark; and modifying pixels of each of the selected macroblocks to generate the secured video frame, the modifications based on bits of the encrypted watermark that are associated with the selected macroblock. The method further includes authenticating a received video frame by comparing a calculated frame signature to an authenticated frame signature, the authenticated frame signature decrypted (using a public key) from an extracted watermark of the received video frame.
Watermark embedding apparatus and method through image structure conversion
One aspect of the present invention discloses a watermark embedding method. The method includes: inputting an original bitstream; determining a first frame for embedding a watermark in the input original bitstream; selecting one of frames after the first frame as a second frame; generating the first frame a bidirectional-coded frame (B frame) referring to the second frame; generating the second frame as a reference frame of the first frame; and embedding the watermark in the first frame generated as the B frame.
WATERMARK EMBEDDING APPARATUS AND METHOD THROUGH IMAGE STRUCTURE CONVERSION
One aspect of the present invention discloses a watermark embedding method. The method includes: inputting an original bitstream; determining a first frame for embedding a watermark in the input original bitstream; selecting one of frames after the first frame as a second frame; generating the first frame a bidirectional-coded frame (B frame) referring to the second frame; generating the second frame as a reference frame of the first frame; and embedding the watermark in the first frame generated as the B frame.
Embedding data in halftone images
A data-bearing image (391) is created from a carrier image (371). The carrier image (371) is scaled to produce a scaled image. A clustered-dot halftone screen is applied to the scaled image to produce a halftone image. A resulting number of cells in the halftone image conforms to a cell count (372) that includes a horizontal cell value and a vertical cell value. Payload data is encoded into the halftone image to produce a data-bearing halftone image, including shifting pixel clusters within cells of the halftone image that include pixel clusters.
System, method, and computer program for encoding and decoding a unique signature in a video file as a set of watermarks
The present disclosure describes a system, method, and computer program for encoding and decoding a unique signature for a user in a video file, wherein the digital signature is substantially invisible to the viewer of the video, easy to detect during the coding process, does not require specialized equipment for playback of the video, and is resilient to transcoding, video editing, and high compression encoding. A numeric digital signature is converted into a binary number. The binary number is then divided into sequences, where sequence includes a subset of data bits from the binary number. Each sequence is also associated with a sequence ID that enables the data bits in the sequence to be later combined in the correct order to recreate the binary number. A watermark is created for each of the sequences and embedded within suitable areas of a color channel.
Zero-watermarking registration and detection method for HEVC video streaming against requantization transcoding
A zero-watermarking registration and detection method for HEVC video streaming against requantization transcoding is provided. To increase an attack-resistance of a registration watermarking, the registration method firstly processes depth values corresponding to respective brightness blocks in a target video streaming with a depth binarization during constructing registration watermarking information through depth features, because the depth binarization well reflects a robustness of the registration watermarking. A first watermarking information matrix including a part of the depth values after the depth binarization is encrypted with a random matrix, so as to increase a safety of the registration watermarking. The registration method directly generates zero-watermarking through the depth features of the video streaming without modifying original carrier information and affecting a watermarking transparency. Meanwhile, the registration method has a strong robustness against attacks, such as the requantization transcoding of quantization parameters within a certain range of variation and common signal processing.
Zero-watermarking registration and detection method for HEVC video streaming against requantization transcoding
A zero-watermarking registration and detection method for HEVC video streaming against requantization transcoding is provided. To increase an attack-resistance of a registration watermarking, the registration method firstly processes depth values corresponding to respective brightness blocks in a target video streaming with a depth binarization during constructing registration watermarking information through depth features, because the depth binarization well reflects a robustness of the registration watermarking. A first watermarking information matrix including a part of the depth values after the depth binarization is encrypted with a random matrix, so as to increase a safety of the registration watermarking. The registration method directly generates zero-watermarking through the depth features of the video streaming without modifying original carrier information and affecting a watermarking transparency. Meanwhile, the registration method has a strong robustness against attacks, such as the requantization transcoding of quantization parameters within a certain range of variation and common signal processing.
Watermark-based image reconstruction
A computer-implemented method that provides watermark-based image reconstruction to compensate for lossy encoding schemes. The method can generate a difference image describing the data loss associated with encoding an image using a lossy encoding scheme. The difference image can be encoded as a message and embedded in the encoded image using a watermark and later extracted from the encoded image. The difference image can be added to the encoded image to reconstruct the original image. As an example, an input image encoded using a lossy JPEG compression scheme can be embedded with the lost data and later reconstructed, using the embedded data, to a fidelity level that is identical or substantially similar to the original.