CN1507279A - Video acquisition method adopting digital watermark technology - Google Patents

Video acquisition method adopting digital watermark technology Download PDF

Info

Publication number
CN1507279A
CN1507279A CNA021560277A CN02156027A CN1507279A CN 1507279 A CN1507279 A CN 1507279A CN A021560277 A CNA021560277 A CN A021560277A CN 02156027 A CN02156027 A CN 02156027A CN 1507279 A CN1507279 A CN 1507279A
Authority
CN
China
Prior art keywords
watermark
video data
video
embed
coefficient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA021560277A
Other languages
Chinese (zh)
Inventor
邹潇湘
李锦涛
林守勋
黄晁
彭聪
刘书昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Computing Technology of CAS
Original Assignee
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Computing Technology of CAS filed Critical Institute of Computing Technology of CAS
Priority to CNA021560277A priority Critical patent/CN1507279A/en
Publication of CN1507279A publication Critical patent/CN1507279A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The video acquisition method adopting digital watermark technology includes the following steps: acquiring video data; real-time encoding the acquired video data; and embedding digital watermark into video data while encoding the acquired video data. The present invention has wide application foreground in the video monitoring system for bank, traffic, etc. and the acquired video data have high security and reliability.

Description

Adopt the video capture method of digital watermark technology
Technical field
The present invention relates to multi-media information security, particularly adopt the video capture method of digital watermark technology.
Background technology
Along with fast development of computer technology, the video acquisition technology, especially the digital video monitoring technology has obtained using widely in the various aspects of our live and work, monitor as the automatic teller machine in the banking system, vehicle peccancy in the traffic system and traffic monitoring, sub-district security monitoring in the life or the like.The video monitoring technology is being obtained such as safety precaution, information and aspect such as command scheduling all has great using value.
Three phases has roughly been experienced in the development of video monitoring system.The first generation is the simulation monitoring system, mainly is the closed-circuit TV monitoring system based on analog machine; The second generation is a digitlization local video supervisory control system; Third generation Active Eyes.In second and third,, video monitoring system all adopted digitizing technique in generation, with the form of numeral to coding video data, storage, transmission and broadcast.
Digitizing technique brings the various whiles easily to us, brings a series of problem also for the management of video data.Mainly be problems such as the fail safe of video data and reliability.
The fail safe of video data: in many video acquisitions are used, many key messages that need protection and sensitive information are arranged, for example the time of video acquisition, place etc.For example in traffic surveillance and control system, certain time period of certain bar street allows vehicle pass-through, and no thoroughfare for vehicles At All Other Times, and the time of video acquisition, place are exactly very crucial information so.Way commonly used is that the data that these are important are deposited with independent file, perhaps is stored in the User Defined field of video data, perhaps identifies these information with filename, and what have simply comes mark with the form of label.Yet these methods all are absolutely unsafe, and have a mind to or operation unintentionally owing to various, and these important information may be lost, and what is more important, may be utilized by the malicious person or forge.
The reliability of video data: the reliability of the video data that video acquisition system is gathered itself also is a problem that merits attention.The new administration of justice regulation that the Supreme People's Court announces points out that the video and audio recording data of recording privately etc. will can be used as evidence and use.And utilize existing video editing, treatment technology, and be easy to video data is distorted, such as the head portrait of revising in the video someone, it is flawless almost can to accomplish.Even in bank, this situation that belongs to the unit behavior of traffic surveillance and control system, also be difficult to the assurance video data and do not distorted by the malicious person.Therefore, how guaranteeing that the video data of being gathered is reliable, unmodified, is an important problem.The problems referred to above adopt traditional cryptographic technique not to be well solved.
Summary of the invention
The video capture method that the purpose of this invention is to provide a kind of safe and reliable employing digital watermark technology.
For achieving the above object, a kind of video capture method that adopts digital watermark technology comprises step:
Video data is gathered;
The video data of gathering is carried out real-time coding;
In to the video data real-time coding in video data embed digital watermark.
The present invention is with a wide range of applications, and in video monitoring systems such as bank, traffic, the video data of being gathered is required fail safe and reliability highly, and the present invention can satisfy such requirement.
Description of drawings
Fig. 1 is Video processing and watermark processing flow chart;
Fig. 2 is that video coding and watermark embed schematic diagram;
Fig. 3 is video decode and watermark extracting schematic diagram;
Fig. 4 is that robust watermarking embeds and extract schematic diagram;
Fig. 5 is that fragile watermark embeds and extract schematic diagram.
Embodiment
Principal character of the present invention is when the video data of gathering is carried out real-time coding, adopts digital watermark technology, embeds identification information in video data, thereby improves the fail safe and the reliability of video data.
Accompanying drawing 1 has been described the basic procedure that video data is handled, at first by the original video data of camera collection; Then the data of gathering are carried out real-time coding, embed digital watermark in coding to guarantee safety of data and reliability, has obtained embedding the coding video frequency data of watermark; Processing such as the video data to coding can be stored, transmission; In needs, coding video frequency data is decoded and play, in decoding, can extract digital watermarking, to guarantee safety of data and reliability.
Accompanying drawing 2 has been described and carried out the watermark embedding when video coding, accompanying drawing 3 has been described and carried out watermark extracting when video decode, here watermark processing is that key is relevant, that is to say, when embedding, watermark adopts a key, during watermark extracting, have only and grasped this key, just can extract embedded watermark.Adopt robust watermarking and fragile watermark technology to guarantee safety of data and reliability respectively.
Guarantee the fail safe of video data
Here the fail safe of video data, mainly be meant some keys and information sensitivity relevant with video data, can do not utilized, delete, revise and forge by the malicious person, after video data having been carried out have a mind to or having handled unintentionally, these information still can be extracted by validated user.
For the better protection important information relevant with video data; these information and video data itself need be combined; we adopt a kind of technology that is called robust watermarking; in coding video data, adopt the robust watermarking technology to embed the important information relevant with video data to camera collection.Watermark embeds and sees accompanying drawing 2 during video coding, and watermark extracting is seen accompanying drawing 3 during video decode.
The embedded location of watermark is considered from following three aspects:
Intra-coded frame, inter-frame encoding frame;
Luminance component, color component;
The DCT low frequency coefficient, intermediate frequency coefficient, high frequency coefficient.
Embedded location is variable, can only embed in the DCT of intra-coded frame luminance component low frequency coefficient, also can embed in whole DCT coefficients of the brightness of all frames and color component.According to the watermark embedded quantity, and which coefficient is required robustness determine to be chosen in watermarked.
The embedding and the extraction of watermark carried out in employing based on the method for spread spectrum.
Watermark embeds: for the information b ∈ to be embedded of 1 bit 1,1}, by one long be r random sequence P:p i{ 1,1} expands ∈, then, selects suitable amplification factor α: α i>0 amplifies, and obtains random sequence w i=b α iP i, in host signal X, add this sequence again, just obtained watermarked signal S:
s i=x i+b·α i·p i
Watermark extracting: after establishing that signal S is subjected to having a mind to or attacking unintentionally, become signal R.Detect the watermark among the R, the correlation between signal calculated R and the random sequence P:
c = Σ i = 1 r p i · r i
The positive negative value of judging c just can obtain embedded information.
In order to realize robustness and not sentience preferably, we define one 8 * 8 amplification factor matrix, on the different frequency range of DCT coefficient, choose different amplification factor α i
Embed the efficient of handling in order to improve watermark, we revise the process of video coding, in to coding video data, carry out the embedding of watermark, as accompanying drawing 4.After coefficient is carried out dct transform, embed as watermark if this coefficient block is selected, spectrum spreading method above then adopting carries out watermark and embeds, the watermark information expansion of 1 bit also is embedded in r the host signal, and choosing of the length of spreading factor r is variable, in order to realize robustness preferably, generally require greater than 1000, simultaneously, adjust the length of r, the information that can realize embeds frame by frame.
Need to revise the process of video decode simultaneously, when video data is decoded, carry out the extraction of watermark, as accompanying drawing 4.After coefficient is carried out decoding length changeable code, counter-scanning and inverse quantization, embed as watermark if this coefficient block is selected, the spectrum spreading method above then adopting carries out watermark extracting.
Characteristics below the robust watermarking technology based on spread spectrum that we adopt satisfies:
Robustness: the robustness of watermark is a bit that we emphasize the most, be embedded in the digital watermarking in the video, video has been carried out various have a mind to or handle unintentionally after, as frame insert, deletion, with other coded format recompile etc., still can detect and obtain.
Vision is sentience not: the watermark of embedding is sightless, that is to say, has embedded watermark and can not cause tangible influence to the quality of video afterwards.
Fail safe: adopt a key when watermark embeds, only known this key, could extract, remove embedded information.Fail safe also is embodied in simultaneously: key space is enough big, attacks to prevent exhaustive search; Can adopt a plurality of keys, embed different information.
Blind watermarking project: some digital watermark technologies, when watermark detection, also need data original, that do not add watermark, be called non-blind watermark, otherwise be called blind watermark.In the application of video monitoring, we are in image data, encode and watermarked, are the data that can not obtain not add watermark, and therefore, need to adopt blind watermarking project here.
Guarantee the reliability of video data
Here the reliability of video data is meant mainly whether the video data that can confirm being gathered is distorted, and is modified if confirmed video data, can detect and orient where revising in data.
We adopt a kind of technology that is called fragile watermark, in the coding video data to camera collection, embed fragile watermark in video data.Referring to accompanying drawing 2, accompanying drawing 3.
The embedded location of fragile watermark: the same with robust watermarking, consider from three aspects, therefore can only in the DCT of intra-coded frame luminance component low frequency coefficient, embed, also can in whole DCT coefficients of the brightness of all frames and color component, embed.Choosing of embedded location, depend on that embedded location is many more to the requirement of the ability of fragile watermark detection and positioning tampering, can detect with the ability of positioning tampering just strong more, but the influence that causes to video quality is also just big more simultaneously, can select different embedded locations according to different application requirements.
Simultaneously, consider interoperability with robust watermarking, under the enough strong situation of the intensity of robust watermarking embedding, the embedded location of fragile watermark can be overlapping with the embedded location of robust watermarking, it is certain coefficient, may after dct transform, be used for the embedding of robust watermarking, after quantizing, be used for the embedding of fragile watermark again; Perhaps under the robust watermarking embedment strength was not very high situation, the fragile embedded location that embeds can not be overlapping with the embedded location of robust watermarking, to avoid occurring destroying because of the embedding fragile watermark situation of robust watermarking.
The embedding and the extraction of watermark carried out in employing based on the method for least significant bit (LSB).
Watermark embeds: watermark embeds and comprises two processes, at first is to generate authentication information, is to embed authentication information then.The generation of authentication information is based on such fact: the DC coefficient of DCT coefficient is stable, can obviously destroy the quality of video if it is made amendment; Relative size between the low frequency AC coefficient on while two piece same positions also is stable, the relativeness that processing generally can not destroy the size of these two AC coefficients such as quantize, according to such character, we select DC coefficient and AC coefficient, obtain authentication information, this authentication information is relevant with key, and we represent to select DC and AC coefficient with H, and the process of generation authentication information, k 1The key that expression is used in handling, then authentication information can be expressed as:
M=H(DC,AC,k 1)
Next need these information are embedded in the DCT coefficient after quantizing and go, we adopt the LSB method, promptly revise the least significant bit of coefficient, if embed bit 0, the lowest order of then revising coefficient is 0, otherwise is 1, and we are according to key k 2Select embedded location, we are illustrated in the watermarked process of host signal X with E, have obtained embedding the signal S of watermark:
S=E(X,M,k 2)
Whether according to different application requirements, we adopt different embedding parameters, distort if only need detect certain frame, and then DC and the AC coefficient according to a frame generates authentication information, and embeds this authentication information at this frame; Tamper detection is to carry out on which piece of a frame if desired, then can be a frame piecemeal, generate authentication information according to every DC and AC coefficient (can also can avoid like this replacing and attack), and press piece embedding authentication information according to the DC and the AC coefficient of adjacent block.
Watermark extracting: if known the key k that watermark embeds 1And k 2, then can basis and watermark similar step when embedding, at first obtain authentication information
M=H(DC,AC,k 1)
Simultaneously, represent from S, to extract the process of watermark with D:
M′=D(S,k 2)
Relatively whether M is identical with M ', if different, then expression is distorted.
Embed the efficient of handling in order to improve watermark, we revise the process of video coding, in to coding video data, carry out the embedding of watermark, as accompanying drawing 5.After coefficient being carried out dct transform, quantizing, embed as watermark if this coefficient block is selected, the LSB method above then adopting is carried out watermark and is embedded in quantization parameter.
Need to revise the process of video decode simultaneously, when video data is decoded, carry out the extraction of watermark, as accompanying drawing 5.After coefficient is carried out decoding length changeable code, counter-scanning, embed as watermark if this coefficient block is selected, the LSB method above then adopting is carried out watermark extracting.
Characteristics below the fragile watermark technology based on LSB that we adopt satisfies:
Detect and positioning tampering: at first,, can detect by fragile watermark and whether to revise if video data is revised; Secondly, can confirm this modification is where to occur in;
Simultaneously, the same with robust watermarking, not characteristics such as sentience, fail safe, blind watermarking project of vision are satisfied in the watermark of Qian Ruing here.

Claims (6)

1. video capture method that adopts digital watermark technology comprises step:
Video data is gathered;
The video data of gathering is carried out real-time coding;
In to the video data real-time coding in video data embed digital watermark.
2. by the described method of claim 1, it is characterized in that described digital watermarking comprises robust watermarking and fragile watermark.
3. by the described method of claim 2, it is characterized in that described embedding robust watermarking comprises step:
Generate the step of authentication information;
Embed the step of authentication information.
4. by the described method of claim 2, it is characterized in that described embedding fragile watermark comprises step:
Generate the step of authentication information;
Embed the step of authentication information.
5. by the described method of claim 2, it is characterized in that the embedded location of described robust watermarking and fragile watermark can be overlapping or not overlapping.
6. by the described method of claim 1, it is characterized in that described digital watermarking has identified the time of video acquisition, place and some other important information.
CNA021560277A 2002-12-11 2002-12-11 Video acquisition method adopting digital watermark technology Pending CN1507279A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA021560277A CN1507279A (en) 2002-12-11 2002-12-11 Video acquisition method adopting digital watermark technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA021560277A CN1507279A (en) 2002-12-11 2002-12-11 Video acquisition method adopting digital watermark technology

Publications (1)

Publication Number Publication Date
CN1507279A true CN1507279A (en) 2004-06-23

Family

ID=34236103

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA021560277A Pending CN1507279A (en) 2002-12-11 2002-12-11 Video acquisition method adopting digital watermark technology

Country Status (1)

Country Link
CN (1) CN1507279A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523535A (en) * 2011-12-01 2012-06-27 南京师范大学 Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology
CN103198558A (en) * 2013-02-06 2013-07-10 深圳宝嘉电子设备有限公司 Bank counter intelligent processing terminal
CN103826168A (en) * 2014-02-25 2014-05-28 深圳市掌网立体时代视讯技术有限公司 Method and system for adding watermark to video
CN104735409A (en) * 2015-02-10 2015-06-24 浙江科技学院 Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof
CN105049805A (en) * 2015-01-04 2015-11-11 浙江工大盈码科技发展有限公司 Video monitoring device capable of hiding anti-counterfeiting shooting watermark in real time
CN106454182A (en) * 2016-10-26 2017-02-22 维沃移动通信有限公司 Video generation method and mobile terminal
CN111901661A (en) * 2020-07-30 2020-11-06 海信视像科技股份有限公司 Video recording method, video playing method and display equipment
US10972807B2 (en) 2018-04-06 2021-04-06 Deluxe One Llc Dynamic watermarking of digital media content at point of transmission

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523535A (en) * 2011-12-01 2012-06-27 南京师范大学 Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology
CN102523535B (en) * 2011-12-01 2014-04-23 南京师范大学 Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology
CN103198558A (en) * 2013-02-06 2013-07-10 深圳宝嘉电子设备有限公司 Bank counter intelligent processing terminal
CN103198558B (en) * 2013-02-06 2014-12-10 深圳宝嘉电子设备有限公司 Bank counter intelligent processing terminal
CN103826168A (en) * 2014-02-25 2014-05-28 深圳市掌网立体时代视讯技术有限公司 Method and system for adding watermark to video
CN105049805A (en) * 2015-01-04 2015-11-11 浙江工大盈码科技发展有限公司 Video monitoring device capable of hiding anti-counterfeiting shooting watermark in real time
CN105049805B (en) * 2015-01-04 2018-04-13 浙江工大盈码科技发展有限公司 A kind of video monitoring apparatus for hiding shooting anti-counterfei waterprint in real time
CN104735409A (en) * 2015-02-10 2015-06-24 浙江科技学院 Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof
CN106454182A (en) * 2016-10-26 2017-02-22 维沃移动通信有限公司 Video generation method and mobile terminal
US10972807B2 (en) 2018-04-06 2021-04-06 Deluxe One Llc Dynamic watermarking of digital media content at point of transmission
CN111901661A (en) * 2020-07-30 2020-11-06 海信视像科技股份有限公司 Video recording method, video playing method and display equipment

Similar Documents

Publication Publication Date Title
Zhang et al. Hiding privacy information in video surveillance system
Feng et al. Reversible watermarking: Current status and key issues.
Shi Reversible data hiding
US7389420B2 (en) Content authentication and recovery using digital watermarks
Lu et al. Semi-fragile image watermarking method based on index constrained vector quantisation
Thabit et al. Medical image authentication using SLT and IWT schemes
CN1233371A (en) Data hiding method and data extracting method
CN1290337C (en) Video/image communication with watermarking
CN1507279A (en) Video acquisition method adopting digital watermark technology
Amanipour et al. Video-tampering detection and content reconstruction via self-embedding
Zain Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images
CN101252683A (en) Multifunctional watermark video camera
Chen et al. H. 264 video authentication based on semi-fragile watermarking
Park et al. Invertible semi-fragile watermarking algorithm distinguishing MPEG-2 compression from malicious manipulation
Kapre et al. Key-frame extraction based video watermarking using speeded up robust features and discrete cosine transform
Bassali et al. Compression tolerant watermarking for image verification
JP2000151973A (en) Information processor, information processing method and storage medium
CN114598887A (en) Anti-recompression video watermarking method for controlling bit rate increase
CN1207891C (en) Digital video frequency water mark method based on error correcting code
Tsai et al. Highly imperceptible video watermarking with the Watson's DCT-based visual model
KR20050108515A (en) Method of protection of dct image data against forgery
Kung et al. Watermark technique using frequency domain
Liang et al. Video authentication and tamper detection based on cloud model
Qian et al. Robust blind image watermarking algorithm based on singular value quantization
CN113766242A (en) Watermark embedding method, watermark extracting method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication