[Objective]This study designs a more secure semi-fragile watermarking algorithm for the big data environment, which protects the authenticity and integrity of online video resources of libraries, museums and archives (LAM). [Context] The algorithm improves the robustness of video resources in normal operation, and then meets the real-time demand of content authentication. [Methods] First, we embedded the binary watermarking image to the videos with the help of quantization modulation to protect their copyright. Second, we inserted the index watermarking into key frames of videos to detect the inter-frame modifications. Finally, we generated the authentication watermarking with XOR operation of least significant bit to detect the intra-frame tampers. [Results] The proposed algorithm was robust and transparent in normal operations, and its value of Peak Signal to Noise Ratio was above 33. The time of tamper localization was around 5 seconds. [Conclusions] The proposed algorithm protects the authenticity and integrity of LAM videos, and then promotes the information sharing and service integration.
朱光, 丰米宁. 基于半脆弱水印的图博档视频资源内容认证策略研究*[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking. Data Analysis and Knowledge Discovery, DOI：10.11925/infotech.1003-3513.2016.12.10.
(Zhang Junliang, Zhu Xuefang.The Implementation of Copyright Protection for Digitalizing Ancient Books Image Based on Binary Image Watermarking[J]. New Technology of Library and Information Service, 2010(9): 79-83.)
(Chen Mingqi, Niu Xinxin, Yang Yixian.The Research Developments and Applications of Digital Watermarking[J]. Journal of China Institute of Communications, 2001, 22(5): 71-79.)
Xu D W, Wang R D, Shi Y Q.An Improved Reversible Data Hiding-Based Approach for Intra-frame Error Concealment in H.264/AVC[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 410-422.
Qi X J, Xin X.A Singular-value-based Semi-fragile Watermarking Scheme for Image Content Authentication with Tamper Localization[J]. Journal of Visual Communication and Image Representation, 2015, 30:312-327.
Ono S, Maehara T, Minami K.Coevolutionary Design of a Watermark Embedding Scheme and an Extraction Algorithm for Detecting Replicated Two-dimensional Barcodes[J]. Applied Soft Computing, 2016, 46: 991-1007.
Shi Y J, Qi M, Yi Y G, et al.Object Based Dual Watermarking for Video Authentication[J]. Optik, 2013, 124(19): 3827-3834.
Masoumi M, Amisi S.Content Protection in Video Data Based on Robust Digital Watermarking Resistant to Intentional and Unintentional Attacks[J]. International Arab Journal of Information Technology, 2012, 11(2): 204-212.
Horng S J, Farfoura M E, Fan P Z, et al.A Low Cost Fragile Watermarking Scheme in H.264/AVC Compressed Domain[J]. Multimedia Tools and Applications, 2014, 72(3): 2469-2495.
(Li Shuzhi, Zhang Xiang, Deng Xiaohong, et al.Reversible Video Watermarking Algorithm for H.264/AVC Based on Mode Feature[J]. Journal of Image and Graphics, 2015, 20(10): 1285-1296.)
Ghazy R A, Amoon M, Abdallah H A, et al.Block Based Embedding of Encrypted Watermarks Using Singular Value Decomposition[J]. Optik, 2014, 125(20): 6299-6304.
Rastia P, Samieib S, Agoyic M, et al.Robust Non-Blind Color Video Watermarking Using QR Decomposition and Entropy Analysis[J]. Journal of Visual Communication and Image Representation, 2016, 38: 838-847.
Dutta T, Gupta H P.A Robust Watermarking Framework for High Efficiency Video Coding (HEVC) - Encoded Video with Blind Extraction Process[J]. Journal of Visual Communication and Image Representation, 2016, 38: 29-44.
Lu Z M, Zheng W M, Pan J S, et al.Multi-Purpose Image Watermarking Method Based on Mean-Removed Vector Quantization[J]. Journal of Information Assurance and Security, 2006, 1(1): 33-42.