Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan
{"title":"A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video","authors":"Mahmoud E. Farfoura, O. A. Khashan, Hani Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan","doi":"10.58346/jisis.2023.i2.014","DOIUrl":null,"url":null,"abstract":"This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subsequently injected into the IPCM-Least block's Significant Bits (LSB) of some I-frames' luma and chroma pixel samples. To manage and regulate authentication data and watermark processes (embedding, detection, and verification), a key based on video footage and a secret key has been created. Intra prediction modes and motion vectors from the bitstream can be partially decoded to detect and confirm the hidden watermark data without the need for the original movie or complete video decoding. Several experiments were conducted to assess the sensitivity of the proposed method against signal processing, rate control and transcoding, conventional GOP-based and Frame-based attacks. Experimental simulations demonstrate that the implanted fragile watermark is sensitive to several low to harmful and content-preserving attacks. With only a modest bit-rate increase and hardly any perceptual quality deterioration, a large payload capacity is achieved. Experimental results show that the proposed method is suburb in term of imperceptibility, and lower effect on bit-rate. Applications like tamper-proofing, content-authentication, and covert communication are ideally suited for this technique. Based on achieved results, the devised method is capable of detecting any form of spatial and/or temporal manipulations which make it ideal for real-time applications.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Services and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jisis.2023.i2.014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subsequently injected into the IPCM-Least block's Significant Bits (LSB) of some I-frames' luma and chroma pixel samples. To manage and regulate authentication data and watermark processes (embedding, detection, and verification), a key based on video footage and a secret key has been created. Intra prediction modes and motion vectors from the bitstream can be partially decoded to detect and confirm the hidden watermark data without the need for the original movie or complete video decoding. Several experiments were conducted to assess the sensitivity of the proposed method against signal processing, rate control and transcoding, conventional GOP-based and Frame-based attacks. Experimental simulations demonstrate that the implanted fragile watermark is sensitive to several low to harmful and content-preserving attacks. With only a modest bit-rate increase and hardly any perceptual quality deterioration, a large payload capacity is achieved. Experimental results show that the proposed method is suburb in term of imperceptibility, and lower effect on bit-rate. Applications like tamper-proofing, content-authentication, and covert communication are ideally suited for this technique. Based on achieved results, the devised method is capable of detecting any form of spatial and/or temporal manipulations which make it ideal for real-time applications.