Please wait a minute...
Data Analysis and Knowledge Discovery  2016, Vol. 32 Issue (12): 76-84    DOI: 10.11925/infotech.1003-3513.2016.12.10
Orginal Article Current Issue | Archive | Adv Search |
Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking
Guang Zhu1,2(),Mining Feng1
1School of Economics and Management, Nanjing University of Information Science & Technology, Nanjing 210044, China
2School of Information Management, Nanjing University, Nanjing 210093, China
Download: PDF(2577 KB)   HTML ( 34
Export: BibTeX | EndNote (RIS)      

[Objective]This study designs a more secure semi-fragile watermarking algorithm for the big data environment, which protects the authenticity and integrity of online video resources of libraries, museums and archives (LAM). [Context] The algorithm improves the robustness of video resources in normal operation, and then meets the real-time demand of content authentication. [Methods] First, we embedded the binary watermarking image to the videos with the help of quantization modulation to protect their copyright. Second, we inserted the index watermarking into key frames of videos to detect the inter-frame modifications. Finally, we generated the authentication watermarking with XOR operation of least significant bit to detect the intra-frame tampers. [Results] The proposed algorithm was robust and transparent in normal operations, and its value of Peak Signal to Noise Ratio was above 33. The time of tamper localization was around 5 seconds. [Conclusions] The proposed algorithm protects the authenticity and integrity of LAM videos, and then promotes the information sharing and service integration.

Key wordsLAM      Video resources      Content authentication      Semi-fragile watermarking      Timeliness     
Received: 17 October 2016      Published: 22 January 2017

Cite this article:

Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking. Data Analysis and Knowledge Discovery, 2016, 32(12): 76-84.

URL:     OR

[1] 朱学芳. 图博档信息资源数字化建设及服务融合探讨[J]. 情报资料工作, 2011(5): 57-60.
[1] (Zhu Xuefang.On the Digitalized Construction and Service Integration of the Information Resources of Libraries, Museums and Archives[J]. Information and Documentation Services, 2011(5): 57-60.)
[2] Yu Y H, Zhang L.Research on a Provable Security RFID Authentication Protocol Based on Hash Function[J]. Journal of China Universities of Posts and Telecommunications, 2016, 23(2): 31-37.
[3] Liu H, Xiao D, Zhang R, et al.Robust and Hierarchical Watermarking of Encrypted Images Based on Compressive Sensing[J]. Signal Processing: Image Communication, 2016, 45: 41-51.
[4] 郝世博, 朱学芳. 面向图博档的分块压缩感知图像零水印算法[J]. 现代图书情报技术, 2014(6): 87-93.
[4] (Hao Shibo, Zhu Xuefang.An Image Zero-Watermarking Algorithm Using Block Compressive Sensing for Libraries, Museums and Archives[J]. New Technology of Library and Information Service, 2014(6): 87-93.)
[5] 朱光. 基于零水印的图博档彩色图像资源版权保护策略研究[J]. 现代图书情报技术, 2015(12): 89-94.
[5] (Zhu Guang.Copyright Protection Scheme of Color Images for Libraries, Museums and Archives Based on Zero-Watermarking[J]. New Technology of Library and Information Service, 2015(12): 89-94.)
[6] 张军亮, 朱学芳. 基于二值图像水印的古籍数字化图像版权保护及其实现[J]. 现代图书情报技术, 2010(9): 79-83.
[6] (Zhang Junliang, Zhu Xuefang.The Implementation of Copyright Protection for Digitalizing Ancient Books Image Based on Binary Image Watermarking[J]. New Technology of Library and Information Service, 2010(9): 79-83.)
[7] 朱学芳. 数字档案信息开发及应用管理中的图像水印保护技术[J]. 档案学通讯, 2010(5): 72-75.
[7] (Zhu Xuefang.Application of Image Watering in Digital Archives Development[J]. Archives Science Bulletin, 2010(5): 72-75.)
[8] Loukhaoukha K, Refaey A, Zebbiche K.Comments on “Homomorphic Image Watermarking with a Singular Value Decomposition Algorithm”[J]. Information Processing & Management, 2016, 52(4): 644-645.
[9] 陈明奇, 钮心忻, 杨义先. 数字水印的研究进展和应用[J]. 通信学报, 2001, 22(5): 71-79.
[9] (Chen Mingqi, Niu Xinxin, Yang Yixian.The Research Developments and Applications of Digital Watermarking[J]. Journal of China Institute of Communications, 2001, 22(5): 71-79.)
[10] Xu D W, Wang R D, Shi Y Q.An Improved Reversible Data Hiding-Based Approach for Intra-frame Error Concealment in H.264/AVC[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 410-422.
[11] Qi X J, Xin X.A Singular-value-based Semi-fragile Watermarking Scheme for Image Content Authentication with Tamper Localization[J]. Journal of Visual Communication and Image Representation, 2015, 30:312-327.
[12] Ono S, Maehara T, Minami K.Coevolutionary Design of a Watermark Embedding Scheme and an Extraction Algorithm for Detecting Replicated Two-dimensional Barcodes[J]. Applied Soft Computing, 2016, 46: 991-1007.
[13] Shi Y J, Qi M, Yi Y G, et al.Object Based Dual Watermarking for Video Authentication[J]. Optik, 2013, 124(19): 3827-3834.
[14] Masoumi M, Amisi S.Content Protection in Video Data Based on Robust Digital Watermarking Resistant to Intentional and Unintentional Attacks[J]. International Arab Journal of Information Technology, 2012, 11(2): 204-212.
[15] Horng S J, Farfoura M E, Fan P Z, et al.A Low Cost Fragile Watermarking Scheme in H.264/AVC Compressed Domain[J]. Multimedia Tools and Applications, 2014, 72(3): 2469-2495.
[16] 赵春晖, 刘巍. 基于分块压缩感知的图像半脆弱零水印算法[J]. 自动化学报, 2012, 38(4): 609-617.
[16] (Zhao Chunhui, Liu Wei.Block Compressive Sensing Based Image Semi-fragile Zero-watermarking Algorithm[J]. Acta Automatica Sinica, 2012, 38(4): 609-617.)
[17] 李淑芝, 张翔, 邓小鸿, 等. 基于模式特征的H.264/AVC可逆视频水印[J]. 中国图象图形学报, 2015, 20(10): 1285-1296.
[17] (Li Shuzhi, Zhang Xiang, Deng Xiaohong, et al.Reversible Video Watermarking Algorithm for H.264/AVC Based on Mode Feature[J]. Journal of Image and Graphics, 2015, 20(10): 1285-1296.)
[18] Ghazy R A, Amoon M, Abdallah H A, et al.Block Based Embedding of Encrypted Watermarks Using Singular Value Decomposition[J]. Optik, 2014, 125(20): 6299-6304.
[19] Rastia P, Samieib S, Agoyic M, et al.Robust Non-Blind Color Video Watermarking Using QR Decomposition and Entropy Analysis[J]. Journal of Visual Communication and Image Representation, 2016, 38: 838-847.
[20] Dutta T, Gupta H P.A Robust Watermarking Framework for High Efficiency Video Coding (HEVC) - Encoded Video with Blind Extraction Process[J]. Journal of Visual Communication and Image Representation, 2016, 38: 29-44.
[21] Lu Z M, Zheng W M, Pan J S, et al.Multi-Purpose Image Watermarking Method Based on Mean-Removed Vector Quantization[J]. Journal of Information Assurance and Security, 2006, 1(1): 33-42.
[22] 蒋刚毅, 李文锋, 郁梅, 等. H.264/AVC压缩域鲁棒视频水印[J]. 光学精密工程, 2015, 23(1): 260-270.
[22] (Jiang Gangyi, Li Wenfeng, Yu Mei, et al.Robust Video Watermarking in H.264/AVC Compressed Domain[J]. Optics and Precision Engineering, 2015, 23(1): 260-270.)
[1] Cong Wu,Yuxiang Zhao,Qinghua Zhu. Analyzing Crowdfunding Videos Based on Task Presentation——Case Study of[J]. 数据分析与知识发现, 2017, 1(10): 64-76.
[2] Zhu Guang,Feng Mining. A New Video Watermarking Technology for Copyright Protection[J]. 现代图书情报技术, 2016, 32(10): 105-111.
[3] Zeng Zhanwei. Construction of an Anti-virus Filter Proxy on Linux System and Its Application in Library Local Area Network[J]. 现代图书情报技术, 2007, 2(7): 92-95.
[4] Yang Jingfeng,Zhang Chengyu. Application of Video Technology in Digital Library[J]. 现代图书情报技术, 2004, 20(11): 14-16.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938