Learn More
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data is embedded as fragile, blind and erasable watermark with low video quality degradations. Because of using a fragile watermark, hard authentication is possible. In contrast to other approaches, the watermarking is done after the(More)
Distributed Video Coding (DVC) is a recent paradigm that offers emerging capabilities in contradiction to the established conventional video coding techniques. Based on the Slepian-Wolf (SW) and Wyner-Ziv (WZ) theorems, a DVC system has an outstanding low encoding complexity, by shifting the computational complex process of correlation exploration to the(More)
In this paper, we present a new video watermarking approach which is robust to efficient video coding standards such as H.264/AVC. We show the contradiction between embedding watermarks in the irrelevant part of a video and using a lossy compression algorithm to reduce the video data rate. Because the compression algorithm removes irrelevant information,(More)
Our paper proposes an enhanced video watermarking approach. The fundamental idea is to use geometric warping for watermarks with high predictable robustness to lossy compression. We explain the basic watermarking approach which uses a block based statistic (Normed Centre of Gravity-NCG) to describe the geometric structure of blocks. The NCG also is used to(More)
Hard decisions constitute the major problem in digital wa-termarking applications, especially when content adaptive embedding methods are used. Soft-decision decoding, on the other hand, has proved to be performance gaining, often realized during forward error correction. But despite this insight, no adaptive watermarking approach integrates the adaptation(More)
In this work, we present a new content-based watermarking approach that uses geometric warping to embed watermarks with high robustness to strong lossy compression. The issue of hard decisions related to content-based watermarking is discussed and it is explained why hard decisions can involve bit errors in the watermark extraction process. This work(More)
Authentication watermarking approaches can be classified into two kinds: fragile and semi-fragile. In contrast to the latter one, fragile watermarking does not tolerate modifications of any single bit of the watermarked data. Since the transmission of digital data often requires lossy compression, an authentication system should accept non-malicious(More)