Abstract

An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT) coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI).

Highlights

  • Nowadays, the object-based MPEG4 standard is becoming growingly attractive to various applications in areas such as the Internet, video editing, and wireless communication because of its object-based nature

  • We employ BCH (63,45,3) error correction coding (ECC) coding scheme, which has 3 bits error correction capability, as the feature ECC coding scheme

  • We have proposed a new object-based video authentication system, where angular radial transformation (ART) coefficients of the video object (VO) are used as the feature to represent the VO

Read more

Summary

Introduction

The object-based MPEG4 standard is becoming growingly attractive to various applications in areas such as the Internet, video editing, and wireless communication because of its object-based nature. (We define the distortions introduced by attacks as intentional distortions.) On the other hand, as shown, the video will usually be segmented into objects and background first, and the objects and background are compressed individually before transmission; at the receiving site, the decompressed objects may even be scaled, translated, or rotated to interact with the end users. For robustness reasons, such kinds of video processing should be allowed.

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.