CN113613073A - End-to-end video digital watermarking system and method - Google Patents

End-to-end video digital watermarking system and method Download PDF

Info

Publication number
CN113613073A
CN113613073A CN202110890824.0A CN202110890824A CN113613073A CN 113613073 A CN113613073 A CN 113613073A CN 202110890824 A CN202110890824 A CN 202110890824A CN 113613073 A CN113613073 A CN 113613073A
Authority
CN
China
Prior art keywords
video
watermark
user
matrix
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110890824.0A
Other languages
Chinese (zh)
Inventor
王晗
崔凯元
胡海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Forestry University
Original Assignee
Beijing Forestry University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Forestry University filed Critical Beijing Forestry University
Priority to CN202110890824.0A priority Critical patent/CN113613073A/en
Publication of CN113613073A publication Critical patent/CN113613073A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25891Management of end-user data being end-user preferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/27Server based end-user applications
    • H04N21/274Storing end-user multimedia data in response to end-user request, e.g. network recorder
    • H04N21/2743Video hosting of uploaded data from client
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to an end-to-end video digital watermarking system and a method, comprising the following modules: the video management module: the administrator manages the videos; the user management and identity recognition module: the administrator manages the users and the affiliated units at the server side; the administrator can extract the watermark from the video at the client, and the user can play the video under the unit name of the user at the client; the video watermark embedding and extracting module comprises: when a user downloads a video, the information of the video is embedded into the video as a watermark; the administrator can perform reverse analysis on the watermark to obtain user information in the watermark; the video file encryption transmission module: the uploaded video is encrypted and then stored in a server; a user uses a client to carry out video transmission in an encryption mode; video playing and exporting module: the user can play the received video and export it. The system provided by the invention is used for embedding and extracting the watermark of a traceable source for the video, and is beneficial to protecting the intellectual property of the video.

Description

End-to-end video digital watermarking system and method
Technical Field
The invention relates to the field of digital watermarking, in particular to an end-to-end video digital watermarking system and method.
Background
With the development of computer and network technologies, multimedia products are becoming digital, and digital audio-video products are getting into people's lives. Although digitization makes multimedia information easier to edit, make, store, transmit, and improves the quality of audio-visual products, it also brings new copyright problem. For example, unlimited copying of a highly valued work without the consent of the owner of the work would result in considerable economic loss to the producer and content provider. Moreover, due to the advantage of digitization, the video information is extremely easy to tamper, and the integrity of the original work is seriously threatened. Some information of special significance, such as information related to judicial litigation, government agencies, etc., is subject to malicious attack and falsification. The negative effects caused by the characteristics of the series of digital technologies become a great obstacle to the health and continuous development of the information industry. Therefore, copyright protection for digital products is becoming increasingly important. It is often considered that the implementation of copyright protection can be done by encryption. The method includes the steps that firstly, a multimedia data file is encrypted into a ciphertext and then is issued, so that an illegal attacker who appears in the network transmission process cannot obtain confidential information from the ciphertext, and the purposes of copyright protection and information security are achieved. On one hand, the encrypted file hinders the propagation of multimedia information due to the non-intelligibility of the encrypted file; on the other hand, multimedia information is easy to attract curiosity and attention of attackers after being encrypted, and has the possibility of being cracked, and once the encrypted file is cracked, the content of the encrypted file is completely transparent. Cryptography has been considered and valued as the primary means of information security in the field of communications research applications, and this has not changed until the last few years. The existing copyright protection system mostly adopts a password authentication technology (such as a security password of a DVD optical disc), but the problem of copyright protection cannot be completely solved only by adopting the password, and the password can only carry out data encryption protection in the transmission process of data from a sender to a receiver. However, when the information is received and decrypted, all encrypted documents are the same as ordinary documents and are not protected any more, and thus the encrypted documents cannot survive piracy. In order to solve the problem, a new and effective technology, namely multimedia digital watermark, for protecting the copyright of digital products and maintaining the data security is proposed internationally in recent years.
Embedding digital watermarks in video information as a copyright protection method is receiving more and more attention from the information industry. The digital watermarking technology is characterized in that copyright information such as numbers, serial numbers, characters, image marks and the like is embedded into a digital work by utilizing redundant data and randomness which are commonly existing in the digital work, so that the digital watermarking technology has the effects of copyright protection, secret communication, authenticity identification of data files, product identification and the like. The digital watermark is a copyright protection means proposed in recent years, can identify and verify the information of an author, an owner, an issuer or an authorized consumer of a digital video by detecting and extracting the watermark, can trace the illegal transmission of the digital work, is a more effective technical means for protecting the copyright of the video work at present, and makes up the defects of the traditional encryption technology.
Disclosure of Invention
In order to solve the above technical problem, the present invention provides an end-to-end video digital watermarking system and method.
The technical solution of the invention is as follows: an end-to-end video digital watermarking system, comprising:
the video management module: the administrator manages videos, including uploading, deleting the videos and distributing the videos to units to which the users belong;
the user management and identity recognition module: at a server end, the administrator adds, deletes and modifies the user and the unit to which the user belongs; at a client, the administrator can extract a watermark from the video, and the user can play the video under the unit name to which the user belongs;
the video watermark embedding and extracting module comprises: when the user downloads the video, the user information is embedded into the video as a watermark; the administrator can perform reverse analysis on the watermark to acquire user information in the watermark, so that the user information for downloading the video is acquired; wherein the watermark is a character string with the length of 128 bits, namely a 1024-bit binary string;
the video file encryption transmission module: when the administrator uploads the video, the video file is encrypted and then stored in a server; the user uses the client to transmit video data in an encryption mode and receives an encrypted video file;
video playing and exporting module: the user with video playing authority can play the received video and export the video to be stored locally.
Compared with the prior art, the invention has the following advantages:
the invention provides an end-to-end video digital watermarking system, which can embed and extract watermarks of traceable sources for videos and make contributions to digital video leakage tracing and video intellectual property protection under a new media environment through a video digital watermarking algorithm based on a DCT (discrete Cosine transform) domain and an image registration method based on SIFT (scale invariant feature transform) characteristics.
Drawings
Fig. 1 is a block diagram of an end-to-end video digital watermarking system according to an embodiment of the present invention;
fig. 2 is a flowchart of an end-to-end video digital watermarking method according to an embodiment of the present invention.
Detailed Description
The invention provides an end-to-end video digital watermarking system and method, which can embed and extract watermarks capable of tracing a source for a video and make a contribution to digital video leakage tracing and video intellectual property protection under a new media environment through a video digital watermarking algorithm based on a DCT (discrete Cosine transform) domain and an image registration method based on SIFT (scale invariant feature transform) characteristics.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings.
Example one
As shown in fig. 1, an end-to-end video digital watermarking system provided by an embodiment of the present invention includes the following modules:
the video management module 1: the administrator manages the videos, including uploading, deleting and distributing the videos to the units to which the users belong;
the user management and identity recognition module 2: at a server side, an administrator adds, deletes and modifies the user and the affiliated unit thereof; at a client, an administrator extracts watermarks from videos, and a user can play the videos under the unit name of the user;
the video watermark embedding and extracting module 3: when a user downloads a video, the user information is embedded into the video as a watermark; the administrator can perform reverse analysis on the watermark to acquire user information in the watermark, so as to acquire the user information for downloading the video; wherein, the watermark is a character string with the length of 128 bits, namely a 1024-bit binary string;
the video file encryption transmission module 4: when the administrator uploads the video, the video file is encrypted and then stored in the server; a user uses a client to transmit video data in an encryption mode and receives an encrypted video file;
video playing and exporting module 5: the user with video playing authority can play the received video and export the video to be stored locally.
In one embodiment, the video management module: the administrator manages videos, including uploading, deleting videos and distributing videos to units to which users belong, and specifically includes:
after logging in a background management system by using an administrator account, an administrator selects a video management-video uploading option in a navigation list, and can upload videos under the page; selecting the option of 'video management-video list' in the navigation list can perform operations of viewing the uploaded video list, deleting the uploaded video and distributing the uploaded video to the unit to which the user belongs.
In one embodiment, the user management and identity module: at a server side, an administrator adds, deletes and modifies the user and the affiliated unit thereof; at the client, an administrator can perform watermark extraction operation on the video, and a user can play the video under the unit name to which the user belongs, and the method specifically comprises the following steps:
at the server side, after an administrator logs in the system, the user and the unit to which the user belongs can be newly added, deleted and modified in the personnel management interface;
displaying different operation interfaces at the client according to different login users: the administrator can extract the watermark from the uploaded video, the user can see the video distributed to the unit to which the user belongs in the video list, when the number of playing times remains and the playing time is within the playing deadline, the user can play, export and the like the video, and when the user downloads the video, the user can automatically add the corresponding watermark.
In one embodiment, the video watermark embedding and extracting module includes: the video watermark embedding module and the video watermark extracting module, wherein the video watermark embedding process in the video watermark embedding module 31 comprises the following steps:
step S11: when an original video is downloaded, extracting one frame of the video as a key frame every 120 frames;
step S12: converting a watermark character string to be embedded into a binary watermark array, and converting the watermark array into a 32 x 32 two-dimensional watermark matrix W; if the watermark array is smaller than 1024-bit binary system, supplementing 0 to 1024 bits; the first 32 bits of the watermark array are set as flag bits for identifying whether the analyzed watermark content is a correct watermark;
step S13: selecting a region with the pixel size of 256x256 from the center of the key frame, converting the region from an RGB color space to a YCbCr color space, and extracting a Y component matrix H in the region; the component matrix H is partitioned into 8 × 8 sized sets of sub-blocks: b (x, y), x, y ∈ [0,31 ]]X, y ∈ N, the subblock set consisting of 32 × 32 subblocks of size 8 × 8; performing two-dimensional DCT (Discrete Cosine Transform) on the subblock set to obtain a transformed subblock set Bdct(x,y),x,y∈[0,31]X, y ∈ N; one sub-block in a sub-block set B (x, y) and the corresponding element W (p, q) in the watermark matrix W are taken in sequence, and the sub-block set B is embedded into the transformed sub-block set B according to the formula (1)dctThe intermediate frequency coefficient of (x, y), i.e. BdctEight points on the secondary diagonal in the 8 × 8 DCT matrix of (x, y):
λ′=λ+α·K (1)
wherein λ is the set of transform subblocks BdctThe value of the frequency coefficient in the (x, y) sub-block, λ' is the transformed sub-block set B with embedded watermarkdctThe value of the frequency coefficient in the sub-block of (x, y), α is the watermark embedding strength, K is the key:
Figure BDA0003195821850000041
wherein, K1=[1,2,3,4,5,6,7,8],K2=[8,7,6,5,4,3,2,1]D is a binary value on a corresponding bit of an element W (p, q) in the watermark matrix W;
in this step, since the size of the watermark region is 256 × 256, after the watermark region is divided into 8 × 8 sub-blocks, 32 × 32 sub-block regions, that is, 1024 sub-block regions, each sub-block region corresponds to one bit of the watermark array, and therefore, one element value W (p, q) in the watermark matrix W in the corresponding order is embedded into each sub-block B (x, y).
The embodiment of the invention does not simply embed the watermark information into the transformed subblock, but obtains the corresponding key information (namely the information really written into the subblock) by the binary value on the corresponding bit of the watermark, multiplies the watermark strength and then adds the information into the transformed subblock, so that the binary value corresponding to the current transformed subblock can be derived by the key when the watermark is removed.
Furthermore, the embedding strength α in equation (1) affects the robustness and invisibility of the watermark: the embedding strength is too low, the invisibility of the watermark is high, the impression of the video is not influenced, but the attack resistance of the watermark is poor; when the embedding strength is too high, the watermark may affect the subjective vision of the person, although it may be more resistant to attack. The proper embedding strength alpha can be selected according to actual needs.
Step S14: for transformed sub-block set B with embedded watermarkdct(x, y) neutron masses advance separatelyObtaining a Y component containing a watermark by performing two-dimensional inverse DCT transformation, merging the Y component into a YCbCr color space, and then converting the Y component into an RGB color space; and recombining the watermark areas with the size of 256 multiplied by 256 after embedding the watermark information to the key frames, and embedding the key frames with the embedded watermark into the original video.
The video watermark extraction process in the video watermark extraction module 32 includes the following steps:
step S21: acquiring the first 200 frames of the video containing the watermark for watermark extraction; extracting a square area with the size of 256 multiplied by 256 from the center of a video frame, converting the color space of the area from RGB to YCbCr color space, and extracting a Y component; the Y component is divided into 32 x 32 sub-blocks of size 8x8, resulting in a set of sub-blocks B (x, Y), x, Y ∈ [0,31 ]]X, y belongs to N, two-dimensional DCT transform is respectively carried out on the subblocks to obtain a transform subblock set Bdct(x,y),x,y∈[0,31],x,y∈N;
Step S22: obtaining a set of transform subblocks BdctThe intermediate frequency coefficient of each sub-block in (x, y), namely eight points on the sub-diagonal in the DCT matrix of 8x8, is obtained by respectively mixing the obtained intermediate frequency coefficient with the key K1=[1,2,3,4,5,6,7,8],K2=[8,7,6,5,4,3,2,1]Calculating a correlation matrix R to obtain R1And R2Wherein R is1Is the intermediate frequency coefficient and the secret key K1Performing a calculation to obtain a correlation matrix, R2Is the intermediate frequency coefficient and the secret key K2The correlation matrix obtained by calculation is calculated, and the calculation formula (2) of the correlation matrix is as follows:
Figure BDA0003195821850000051
wherein i and j are subscripts of corresponding positions of the matrix; c is a covariance matrix, and formula (3) is calculated as follows:
Figure BDA0003195821850000052
wherein X and Y are matrixes participating in covariance calculation, X and Y are corresponding values in X, Y matrixes, X is a sample mean value in the X matrix, and Y is a sample mean value in the Y matrix;
calculating to obtain a correlation matrix R1And R2Then, R is compared1And R2In the matrix [0,1 ]]Value of position, if R1[0,1]Greater than R2[0,1]Then the watermark corresponding to this position should be K1The binary value 0 corresponding to the secret key, otherwise, is 1;
after the calculation is finished, obtaining a 32 multiplied by 32 binary watermark matrix W (p, q), and converting the W (p, q) into a one-dimensional sequence to obtain watermark information;
step S23: when the first 32 bits of the extracted watermark sequence are matched with the embedded watermark marker bits, the watermark extraction operation is ended, and the step is switched to step S27; if the matched watermark cannot be extracted after 200 frames of extraction is finished, turning to step S24 to perform video depth watermark extraction;
step S24: extracting one frame of the uploaded original video every 120 frames to serve as a calibration frame; extracting a frame from the 90 th frame of the video containing the watermark every 15 frames to serve as a video frame to be detected containing the watermark; comparing each video frame to be detected with all calibration frames;
step S25: matching the image similarity based on SIFT features by using a K nearest neighbor algorithm (KNN), and aligning a video to be detected with a calibration frame in a rotation and transformation mode by using a Homography Matrix; wherein, the homography matrix H is shown as formula (4):
Figure BDA0003195821850000061
wherein, [ x ]1 y1 1]TAnd [ x ]2 y2 1]TRespectively representing the homogeneous coordinates of the video frame to be detected and the calibration frame, and calculating the average value of the coordinates22If the homography matrix H is set to be 1, 8 unknown parameters exist in the homography matrix H, each corresponding pixel point can generate 2 equations, one x equation and one y equation, so that the homography matrix H needs four pixel points and 8 equations in total to be solved; the symbol is selected by Random sample consensus (RANSAC)Taking qualified pixel points as inner group points;
the specific selection process comprises the following steps: randomly selecting 4 matching points to set the sample points as inner group points (inlier), calculating a model by using the selected matching points, substituting other unselected points into the model, calculating whether the points accord with the model, if so, also calculating the inner group, and if not, calculating the outer group points (outlier). If the obtained number of the inner clusters is larger than that of the outer clusters after traversing all the pixel points, the model is considered to have higher degree of satisfaction, and a better model is recalculated by using the current inner cluster data. And repeating the steps, and finally, keeping the model with the maximum inner group number to solve the homography matrix H.
Step S26: comparing the intra-group point value of each video frame to be detected with the intra-group point value of the calibration frame, and skipping the current calibration frame if the number of the intra-group points is set to be less than or equal to 25% of all the feature points; if the number is more than 25%, temporarily storing the matched calibration frame; after the comparison of the video frame to be detected and all the calibration frames is completed, sequentially aligning 160 frames before and after the video frame to be detected with the calibration frames according to a matching strategy from inside to outside (such as 1-160, namely 80,81,79,82,78 and 83 … …) and then extracting the watermark, if the watermark is not extracted, switching to the next video frame to be detected and repeating the steps until the watermark is extracted or the complete part of the video frame to be detected is detected;
the embodiment of the invention creatively adopts a matching strategy from inside to outside, thereby greatly improving the searching speed. Compared with the existing search strategy which is searched in sequence from beginning to end through experiments, the search strategy only takes 15 minutes, and the search strategy which is searched in sequence from beginning to end takes 2 hours and 30 minutes.
Step S27: and comparing the extracted watermark with the watermark in the server to obtain the user information for downloading the video.
In the embodiment of the invention, the secret key is used for encrypting the watermark, and the functions of the secret key comprise:
1. even if the way of embedding the watermark is cracked, if the corresponding secret key is unknown, the corresponding watermark information cannot be analyzed, so that the protection of the watermark is enhanced.
2. The robustness of extracting the watermark is increased, and the binary value corresponding to the sub-block is judged through the similarity matrix of the key when the watermark is extracted.
In one embodiment, the video file encryption transmission module: when the administrator uploads the video, the video file is encrypted and then stored in the server; the method includes that a user uses a client to transmit video data in an encryption mode and receives an encrypted video file, and specifically includes the following steps:
when the administrator uploads the video, the video is encrypted and stored in the server; when the user uses the client to receive the video file, the AES256 encryption mode is used for video data transmission.
In one embodiment, the video playing and exporting module: the user with the video playing authority can play and export the received video to be stored locally, and the method specifically includes:
when the administrator distributes the videos, the playing times and the playing deadline of the videos can be limited;
when a user clicks a play button in a client, a piece of play recording information is automatically added into the database so as to record the play times of the user on the video;
when the user reads the play list, the user can inquire the play record table, and when the play times are less than the play limit times and the current time is before the expiration date, the video can be continuously played;
when the playing times exceed the playing limit times or the current time exceeds the playing deadline, the playing and exporting buttons cannot be clicked;
when the user clicks the button of downloading video, the encrypted video file is downloaded to the local.
The invention provides an end-to-end video digital watermarking system, which can embed and extract watermarks of traceable sources for videos and make contributions to digital video leakage tracing and video intellectual property protection under a new media environment through a video digital watermarking algorithm based on a DCT (discrete Cosine transform) domain and an image registration method based on SIFT (scale invariant feature transform) characteristics.
Example two
As shown in fig. 2, an end-to-end video digital watermarking method provided by an embodiment of the present invention includes the following steps:
step S1: the administrator manages the videos, including uploading, deleting and distributing the videos to the units to which the users belong;
step S2: at a server side, an administrator adds, deletes and modifies the user and the affiliated unit thereof; at a client, an administrator extracts watermarks from videos, and a user can play the videos under the unit name of the user;
step S3: when a user downloads a video, the user information is embedded into the video as a watermark; the administrator can perform reverse analysis on the watermark to acquire user information in the watermark, so as to acquire the user information for downloading the video; wherein, the watermark is a character string with the length of 128 bits, namely a 1024-bit binary string;
step S4: when the administrator uploads the video, the video file is encrypted and then stored in the server; a user uses a client to transmit video data in an encryption mode and receives an encrypted video file;
step S5: the user with video playing authority can play the received video and export the video to be stored locally.
The above examples are provided only for the purpose of describing the present invention, and are not intended to limit the scope of the present invention. The scope of the invention is defined by the appended claims. Various equivalent substitutions and modifications can be made without departing from the spirit and principles of the invention, and are intended to be within the scope of the invention.

Claims (3)

1. An end-to-end video digital watermarking system, comprising:
the video management module: the administrator manages videos, including uploading, deleting the videos and distributing the videos to units to which the users belong;
the user management and identity recognition module: at a server end, the administrator adds, deletes and modifies the user and the unit to which the user belongs; at a client, the administrator extracts the watermark from the video, and the user can play the video under the unit name of the user;
the video watermark embedding and extracting module comprises: when the user downloads the video, the user information is embedded into the video as a watermark; the administrator can perform reverse analysis on the watermark to acquire user information in the watermark, so that the user information for downloading the video is acquired; wherein the watermark is a character string with the length of 128 bits, namely a 1024-bit binary string;
the video file encryption transmission module: when the administrator uploads the video, the video file is encrypted and then stored in a server; the user uses the client to transmit video data in an encryption mode and receives an encrypted video file;
video playing and exporting module: the user with video playing authority can play the received video and export the video to be stored locally.
2. The end-to-end video digital watermarking system according to claim 1, wherein the video watermark embedding and extracting module comprises: the video watermark extraction module is used for extracting the video watermark;
the video watermark embedding process in the video watermark embedding module comprises the following steps:
step S11: when an original video is downloaded, extracting one frame of the video as a key frame every 120 frames;
step S12: converting the watermark character string to be embedded into a binary watermark array, and converting the watermark array into a 32 x 32 two-dimensional watermark matrix W; if the watermark array is smaller than 1024-bit binary system, supplementing 0 to 1024 bits; the first 32 bits of the watermark array are set as flag bits for identifying whether the analyzed watermark content is a correct watermark;
step S13: selecting a region of pixel size 256x256 in the center of the key frame, transforming the region from RGB color space to YCbCr color space, extracting a Y component matrix H in the Cr color space; partitioning the component matrix H into 8x8 sized sets of sub-blocks: b (x, y), x, y ∈ [0,31 ]]X, y ∈ N, the subblock set consists of 32 × 32 subblocks of size 8 × 8; performing two-dimensional DCT on the subblock set to obtain a transformed subblock set Bdct(x,y),x,y∈[0,31]X, y ∈ N; sequentially taking one sub-block in the sub-block set B (x, y) and corresponding elements W (p, q) in the watermark matrix W, and embedding the sub-block in the transformed sub-block set B according to a formula (1)dctThe intermediate frequency coefficient of (x, y), i.e. BdctEight points on the secondary diagonal in the 8 × 8 DCT matrix of (x, y):
λ′=λ+α·K (1)
wherein λ is the set of transform subblocks BdctThe values of the frequency coefficients in the (x, y) sub-blocks, λ' being the set B of transformed sub-blocks in which the watermark is embeddeddctThe value of the frequency coefficient in the sub-block of (x, y), α is the watermark embedding strength, K is the key:
Figure FDA0003195821840000021
wherein, K1=[1,2,3,4,5,6,7,8],K2=[8,7,6,5,4,3,2,1]D is a binary value on a corresponding bit of an element W (p, q) in the watermark matrix W;
step S14: for the transformed sub-block set B in which the watermark has been embeddeddctThe (x, Y) sub-blocks are respectively subjected to two-dimensional inverse DCT to obtain Y components containing the watermarks, and the Y components are combined into a YCbCr color space and then converted into an RGB color space; recombining the watermark areas with the size of 256 multiplied by 256 after embedding the watermark information to the key frames, and embedding the key frames with the embedded watermark into the original video;
the video watermark extraction process in the video watermark extraction module comprises the following steps:
step S21: acquiring the first 200 frames of the video containing the watermark for watermark extraction; extracting a square area with the size of 256 multiplied by 256 from the center of a video frame, converting the color space of the area from RGB to YCbCr color space, and extracting a Y component; the Y component is partitioned into 32 × 32 sub-blocks of size 8 × 8, resulting in a set of sub-blocks B (x, Y), x, Y ∈ [0,31 ]]X, y ∈ N, making two sub-blocks in it respectivelyPerforming dimensional DCT to obtain transform subblock set Bdct(x,y),x,y∈[0,31],x,y∈N;
Step S22: obtain each Bdct(x, y) intermediate frequency coefficients, i.e. eight points on the sub-diagonal of the 8x8 DCT matrix, are obtained by respectively comparing the intermediate frequency coefficients with the key K1=[1,2,3,4,5,6,7,8],K2=[8,7,6,5,4,3,2,1]Calculating a correlation matrix R to obtain R1And R2Wherein R is1Is the intermediate frequency coefficient and the secret key K1Performing a calculation to obtain a correlation matrix, R2Is the intermediate frequency coefficient and the secret key K2The correlation matrix obtained by calculation is calculated, and the calculation formula (2) of the correlation matrix is as follows:
Figure FDA0003195821840000022
wherein i and j are subscripts of corresponding positions of the matrix; c is a covariance matrix, and formula (3) is calculated as follows:
Figure FDA0003195821840000023
wherein X and Y are matrixes participating in the calculation of covariance, X and Y are corresponding values in X, Y matrixes,
Figure FDA0003195821840000024
is the mean value of the samples in the X matrix,
Figure FDA0003195821840000025
the mean value of the samples in the Y matrix is obtained;
calculating to obtain a correlation matrix R1And R2Then, R is compared1And R2In the matrix [0,1 ]]Value of position, if R1[0,1]Greater than R2[0,1]Then the watermark corresponding to this position should be K1The binary value 0 corresponding to the secret key, otherwise, is 1;
after the calculation is finished, obtaining a 32 multiplied by 32 binary watermark matrix W (p, q), and converting the W (p, q) into a one-dimensional sequence to obtain watermark information;
step S23: when the first 32 bits of the extracted watermark sequence are matched with the embedded watermark marker bits, the watermark extraction operation is ended, and the step is switched to step S27; if the matched watermark cannot be extracted after 200 frames of extraction is finished, turning to step S24 to perform video depth watermark extraction;
step S24: extracting one frame of the uploaded original video every 120 frames to serve as a calibration frame; extracting a frame from the 90 th frame of the video containing the watermark every 15 frames to serve as a video frame to be detected containing the watermark; comparing each video frame to be detected with all the calibration frames;
step S25: matching the image similarity based on SIFT characteristics by using a K nearest neighbor algorithm, and aligning the video to be detected with the calibration frame by using a homography matrix through rotation and transformation; wherein the homography matrix H is shown as equation (4):
Figure FDA0003195821840000031
wherein, [ x ]1 y1 1]TAnd [ x ]2 y2 1]TRespectively representing the homogeneous coordinates of the video frame to be detected and the calibration frame, and calculating h22Setting the homography matrix to be 1, wherein the homography matrix has 8 unknown parameters, and each corresponding pixel point can generate 2 equations, namely an x equation and a y equation, so that four pixel points are needed to solve the homography matrix H; selecting qualified pixel points as inner group points through a random sampling consistency algorithm;
step S26: comparing the intra-group point value of each video frame to be detected with the intra-group point value of the calibration frame, and skipping the current calibration frame if the number of the intra-group points is set to be less than or equal to 25% of all the feature points; if the frame number is more than 25%, temporarily storing the matched calibration frame; after the comparison of the video frame to be detected and all the calibration frames is completed, sequentially aligning 160 frames in front of and behind the video frame to be detected with the calibration frames according to a matching strategy from inside to outside, then extracting the watermark, if the watermark is not extracted, switching to the next video frame to be detected, and repeating the steps until the watermark is extracted or the complete video frame to be detected is detected;
step S27: and comparing the extracted watermark with the watermark in the server to obtain the user information for downloading the video.
3. An end-to-end video digital watermarking method, comprising the steps of:
step S1: the administrator manages videos, including uploading, deleting the videos and distributing the videos to units to which the users belong;
step S2: at a server end, the administrator adds, deletes and modifies the user and the unit to which the user belongs; at a client, the administrator extracts the watermark from the video, and the user can play the video under the unit name of the user;
step S3: when the user downloads the video, the user information is embedded into the video as a watermark; the administrator can perform reverse analysis on the watermark to acquire user information in the watermark, so that the user information for downloading the video is acquired; wherein the watermark is a character string with the length of 128 bits, namely a 1024-bit binary string;
step S4: when the administrator uploads the video, the video file is encrypted and then stored in a server; the user uses the client to transmit video data in an encryption mode and receives an encrypted video file;
step S5: the user with video playing authority can play the received video and export the video to be stored locally.
CN202110890824.0A 2021-08-04 2021-08-04 End-to-end video digital watermarking system and method Pending CN113613073A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110890824.0A CN113613073A (en) 2021-08-04 2021-08-04 End-to-end video digital watermarking system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110890824.0A CN113613073A (en) 2021-08-04 2021-08-04 End-to-end video digital watermarking system and method

Publications (1)

Publication Number Publication Date
CN113613073A true CN113613073A (en) 2021-11-05

Family

ID=78306785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110890824.0A Pending CN113613073A (en) 2021-08-04 2021-08-04 End-to-end video digital watermarking system and method

Country Status (1)

Country Link
CN (1) CN113613073A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114025224A (en) * 2021-11-18 2022-02-08 甘肃欧美亚信息科技有限公司 Network video traceability system based on deep learning
CN115170378A (en) * 2022-06-13 2022-10-11 北京林业大学 Video digital watermark embedding and extracting method and system based on deep learning
CN116132084A (en) * 2022-09-20 2023-05-16 马上消费金融股份有限公司 Video stream processing method and device and electronic equipment
CN117093965A (en) * 2023-10-20 2023-11-21 江苏省测绘资料档案馆 Full-flow tracking system and method for basic surveying and mapping result

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130259294A1 (en) * 2012-03-27 2013-10-03 Infosys Limited Method, system, and computer-readable medium for embedding and extracting a watermark in a video
CN110099239A (en) * 2019-05-09 2019-08-06 浙江大华技术股份有限公司 Video marker method, video source tracing method, video process apparatus and storage medium
CN110147683A (en) * 2019-04-26 2019-08-20 江苏信实云安全技术有限公司 Safety of image sharing platform construction method based on block chain
CN112184533A (en) * 2020-10-08 2021-01-05 东南数字经济发展研究院 Watermark synchronization method based on SIFT feature point matching
CN112257036A (en) * 2020-10-23 2021-01-22 智橙知识产权运营服务(广州)有限公司 Digital work copyright protection method and device based on playing end
CN112468715A (en) * 2020-10-26 2021-03-09 国网天津市电力公司 Video tracing system and video tracing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130259294A1 (en) * 2012-03-27 2013-10-03 Infosys Limited Method, system, and computer-readable medium for embedding and extracting a watermark in a video
CN110147683A (en) * 2019-04-26 2019-08-20 江苏信实云安全技术有限公司 Safety of image sharing platform construction method based on block chain
CN110099239A (en) * 2019-05-09 2019-08-06 浙江大华技术股份有限公司 Video marker method, video source tracing method, video process apparatus and storage medium
CN112184533A (en) * 2020-10-08 2021-01-05 东南数字经济发展研究院 Watermark synchronization method based on SIFT feature point matching
CN112257036A (en) * 2020-10-23 2021-01-22 智橙知识产权运营服务(广州)有限公司 Digital work copyright protection method and device based on playing end
CN112468715A (en) * 2020-10-26 2021-03-09 国网天津市电力公司 Video tracing system and video tracing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WUYONGZHANG.ET AL: "Affine Correction Based Image Watermarking Robust to Geometric Attacks", 《2016 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING,APPLICATIONS AND TECHNOLOGIES》 *
崔凯元等: "一种端到端的对抗生成式视频数字水印算法", 《中国科技论文》 *
胡海等人: "基于空间转换网络的视频盲水印方法", 《图学学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114025224A (en) * 2021-11-18 2022-02-08 甘肃欧美亚信息科技有限公司 Network video traceability system based on deep learning
CN115170378A (en) * 2022-06-13 2022-10-11 北京林业大学 Video digital watermark embedding and extracting method and system based on deep learning
CN116132084A (en) * 2022-09-20 2023-05-16 马上消费金融股份有限公司 Video stream processing method and device and electronic equipment
CN117093965A (en) * 2023-10-20 2023-11-21 江苏省测绘资料档案馆 Full-flow tracking system and method for basic surveying and mapping result
CN117093965B (en) * 2023-10-20 2024-03-12 江苏省测绘资料档案馆 Full-flow tracking system and method for basic surveying and mapping result

Similar Documents

Publication Publication Date Title
Shih Digital watermarking and steganography: fundamentals and techniques
CN113613073A (en) End-to-end video digital watermarking system and method
Sharma et al. An enhanced Huffman-PSO based image optimization algorithm for image steganography
MXPA05000524A (en) Desynchronized fingerprinting method and system for digital multimedia data.
Thanh et al. Robust semi-blind video watermarking based on frame-patch matching
CN113129198B (en) Zero watermark generation method and system and copyright infringement comparison method and system
Katariya Digital watermarking
Anand et al. A hybrid optimization-based medical data hiding scheme for industrial internet of things security
Rose et al. A secure verifiable scheme for secret image sharing
Ding et al. Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value
CN106600516B (en) Image embedding method based on digital fingerprint
Thanh et al. A proposal of digital rights management based on incomplete cryptography using invariant Huffman code length feature
Hsu et al. Digital watermarking scheme with visual cryptography
Sharma et al. Digital video watermarking: features, techniques, and challenges
Talukder et al. An Enhanced Method for Encrypting Image and Text Data Simultaneously using AES Algorithm and LSB-Based Steganography
Rani et al. Region based data hiding in medical images
Shah et al. Triple byte nonlinear component of block cipher and its application in frequency domain watermarking
Shady et al. Local features-based watermarking for image security in social media
Wu et al. Reversible image visual transformation for privacy and content protection
Riaz et al. A robust multimedia authentication and restoration scheme in digital photography
Avila-Domenech et al. Dual watermarking for handwritten document image authentication and copyright protection for JPEG compression attacks
Madhi et al. Pixel steganography method for grayscale image steganography on colour images
El-Shafai et al. A hybrid security framework for medical image communication
Li et al. A reversible watermarking for image content authentication based on wavelet transform
Bandyopadhyay et al. A novel steganographic technique based on 3D-DCT approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20211105