Lino Coria-Mendoza, P. Nasiopoulos, R. Ward, M. Pickering
{"title":"An access control video watermarking method that is robust to geometric distortions","authors":"Lino Coria-Mendoza, P. Nasiopoulos, R. Ward, M. Pickering","doi":"10.1109/ICDIM.2007.4444266","DOIUrl":null,"url":null,"abstract":"A new video watermarking algorithm for access control is introduced. This method is content- dependent and uses the dual tree complex wavelet transform (DT CWT) to create a watermark that is robust to geometric distortions and lossy compression. The watermark is a random array of 1's and -1's. A one-level DT CWT is applied to this watermark and the coefficients of this transformation are embedded into selected frequency components of the video sequence. The robustness of this method is tested against a joint attack, which involves rotation, scaling, cropping and H.264 video compression.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 2nd International Conference on Digital Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2007.4444266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
A new video watermarking algorithm for access control is introduced. This method is content- dependent and uses the dual tree complex wavelet transform (DT CWT) to create a watermark that is robust to geometric distortions and lossy compression. The watermark is a random array of 1's and -1's. A one-level DT CWT is applied to this watermark and the coefficients of this transformation are embedded into selected frequency components of the video sequence. The robustness of this method is tested against a joint attack, which involves rotation, scaling, cropping and H.264 video compression.