Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking
Guang Zhu1,2(),Mining Feng1
1School of Economics and Management, Nanjing University of Information Science & Technology, Nanjing 210044, China 2School of Information Management, Nanjing University, Nanjing 210093, China
[Objective]This study designs a more secure semi-fragile watermarking algorithm for the big data environment, which protects the authenticity and integrity of online video resources of libraries, museums and archives (LAM). [Context] The algorithm improves the robustness of video resources in normal operation, and then meets the real-time demand of content authentication. [Methods] First, we embedded the binary watermarking image to the videos with the help of quantization modulation to protect their copyright. Second, we inserted the index watermarking into key frames of videos to detect the inter-frame modifications. Finally, we generated the authentication watermarking with XOR operation of least significant bit to detect the intra-frame tampers. [Results] The proposed algorithm was robust and transparent in normal operations, and its value of Peak Signal to Noise Ratio was above 33. The time of tamper localization was around 5 seconds. [Conclusions] The proposed algorithm protects the authenticity and integrity of LAM videos, and then promotes the information sharing and service integration.
朱光, 丰米宁. 基于半脆弱水印的图博档视频资源内容认证策略研究*[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking. Data Analysis and Knowledge Discovery, 2016, 32(12): 76-84.
(Zhu Xuefang.On the Digitalized Construction and Service Integration of the Information Resources of Libraries, Museums and Archives[J]. Information and Documentation Services, 2011(5): 57-60.)
[2]
Yu Y H, Zhang L.Research on a Provable Security RFID Authentication Protocol Based on Hash Function[J]. Journal of China Universities of Posts and Telecommunications, 2016, 23(2): 31-37.
[3]
Liu H, Xiao D, Zhang R, et al.Robust and Hierarchical Watermarking of Encrypted Images Based on Compressive Sensing[J]. Signal Processing: Image Communication, 2016, 45: 41-51.
(Hao Shibo, Zhu Xuefang.An Image Zero-Watermarking Algorithm Using Block Compressive Sensing for Libraries, Museums and Archives[J]. New Technology of Library and Information Service, 2014(6): 87-93.)
(Zhu Guang.Copyright Protection Scheme of Color Images for Libraries, Museums and Archives Based on Zero-Watermarking[J]. New Technology of Library and Information Service, 2015(12): 89-94.)
(Zhang Junliang, Zhu Xuefang.The Implementation of Copyright Protection for Digitalizing Ancient Books Image Based on Binary Image Watermarking[J]. New Technology of Library and Information Service, 2010(9): 79-83.)
(Zhu Xuefang.Application of Image Watering in Digital Archives Development[J]. Archives Science Bulletin, 2010(5): 72-75.)
[8]
Loukhaoukha K, Refaey A, Zebbiche K.Comments on “Homomorphic Image Watermarking with a Singular Value Decomposition Algorithm”[J]. Information Processing & Management, 2016, 52(4): 644-645.
(Chen Mingqi, Niu Xinxin, Yang Yixian.The Research Developments and Applications of Digital Watermarking[J]. Journal of China Institute of Communications, 2001, 22(5): 71-79.)
[10]
Xu D W, Wang R D, Shi Y Q.An Improved Reversible Data Hiding-Based Approach for Intra-frame Error Concealment in H.264/AVC[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 410-422.
[11]
Qi X J, Xin X.A Singular-value-based Semi-fragile Watermarking Scheme for Image Content Authentication with Tamper Localization[J]. Journal of Visual Communication and Image Representation, 2015, 30:312-327.
[12]
Ono S, Maehara T, Minami K.Coevolutionary Design of a Watermark Embedding Scheme and an Extraction Algorithm for Detecting Replicated Two-dimensional Barcodes[J]. Applied Soft Computing, 2016, 46: 991-1007.
[13]
Shi Y J, Qi M, Yi Y G, et al.Object Based Dual Watermarking for Video Authentication[J]. Optik, 2013, 124(19): 3827-3834.
[14]
Masoumi M, Amisi S.Content Protection in Video Data Based on Robust Digital Watermarking Resistant to Intentional and Unintentional Attacks[J]. International Arab Journal of Information Technology, 2012, 11(2): 204-212.
[15]
Horng S J, Farfoura M E, Fan P Z, et al.A Low Cost Fragile Watermarking Scheme in H.264/AVC Compressed Domain[J]. Multimedia Tools and Applications, 2014, 72(3): 2469-2495.
(Li Shuzhi, Zhang Xiang, Deng Xiaohong, et al.Reversible Video Watermarking Algorithm for H.264/AVC Based on Mode Feature[J]. Journal of Image and Graphics, 2015, 20(10): 1285-1296.)
[18]
Ghazy R A, Amoon M, Abdallah H A, et al.Block Based Embedding of Encrypted Watermarks Using Singular Value Decomposition[J]. Optik, 2014, 125(20): 6299-6304.
[19]
Rastia P, Samieib S, Agoyic M, et al.Robust Non-Blind Color Video Watermarking Using QR Decomposition and Entropy Analysis[J]. Journal of Visual Communication and Image Representation, 2016, 38: 838-847.
[20]
Dutta T, Gupta H P.A Robust Watermarking Framework for High Efficiency Video Coding (HEVC) - Encoded Video with Blind Extraction Process[J]. Journal of Visual Communication and Image Representation, 2016, 38: 29-44.
[21]
Lu Z M, Zheng W M, Pan J S, et al.Multi-Purpose Image Watermarking Method Based on Mean-Removed Vector Quantization[J]. Journal of Information Assurance and Security, 2006, 1(1): 33-42.
(Jiang Gangyi, Li Wenfeng, Yu Mei, et al.Robust Video Watermarking in H.264/AVC Compressed Domain[J]. Optics and Precision Engineering, 2015, 23(1): 260-270.)