CN1507279A - Video acquisition method adopting digital watermark technology - Google Patents
Video acquisition method adopting digital watermark technology Download PDFInfo
- Publication number
- CN1507279A CN1507279A CNA021560277A CN02156027A CN1507279A CN 1507279 A CN1507279 A CN 1507279A CN A021560277 A CNA021560277 A CN A021560277A CN 02156027 A CN02156027 A CN 02156027A CN 1507279 A CN1507279 A CN 1507279A
- Authority
- CN
- China
- Prior art keywords
- watermark
- video data
- video
- embed
- coefficient
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The video acquisition method adopting digital watermark technology includes the following steps: acquiring video data; real-time encoding the acquired video data; and embedding digital watermark into video data while encoding the acquired video data. The present invention has wide application foreground in the video monitoring system for bank, traffic, etc. and the acquired video data have high security and reliability.
Description
Technical field
The present invention relates to multi-media information security, particularly adopt the video capture method of digital watermark technology.
Background technology
Along with fast development of computer technology, the video acquisition technology, especially the digital video monitoring technology has obtained using widely in the various aspects of our live and work, monitor as the automatic teller machine in the banking system, vehicle peccancy in the traffic system and traffic monitoring, sub-district security monitoring in the life or the like.The video monitoring technology is being obtained such as safety precaution, information and aspect such as command scheduling all has great using value.
Three phases has roughly been experienced in the development of video monitoring system.The first generation is the simulation monitoring system, mainly is the closed-circuit TV monitoring system based on analog machine; The second generation is a digitlization local video supervisory control system; Third generation Active Eyes.In second and third,, video monitoring system all adopted digitizing technique in generation, with the form of numeral to coding video data, storage, transmission and broadcast.
Digitizing technique brings the various whiles easily to us, brings a series of problem also for the management of video data.Mainly be problems such as the fail safe of video data and reliability.
The fail safe of video data: in many video acquisitions are used, many key messages that need protection and sensitive information are arranged, for example the time of video acquisition, place etc.For example in traffic surveillance and control system, certain time period of certain bar street allows vehicle pass-through, and no thoroughfare for vehicles At All Other Times, and the time of video acquisition, place are exactly very crucial information so.Way commonly used is that the data that these are important are deposited with independent file, perhaps is stored in the User Defined field of video data, perhaps identifies these information with filename, and what have simply comes mark with the form of label.Yet these methods all are absolutely unsafe, and have a mind to or operation unintentionally owing to various, and these important information may be lost, and what is more important, may be utilized by the malicious person or forge.
The reliability of video data: the reliability of the video data that video acquisition system is gathered itself also is a problem that merits attention.The new administration of justice regulation that the Supreme People's Court announces points out that the video and audio recording data of recording privately etc. will can be used as evidence and use.And utilize existing video editing, treatment technology, and be easy to video data is distorted, such as the head portrait of revising in the video someone, it is flawless almost can to accomplish.Even in bank, this situation that belongs to the unit behavior of traffic surveillance and control system, also be difficult to the assurance video data and do not distorted by the malicious person.Therefore, how guaranteeing that the video data of being gathered is reliable, unmodified, is an important problem.The problems referred to above adopt traditional cryptographic technique not to be well solved.
Summary of the invention
The video capture method that the purpose of this invention is to provide a kind of safe and reliable employing digital watermark technology.
For achieving the above object, a kind of video capture method that adopts digital watermark technology comprises step:
Video data is gathered;
The video data of gathering is carried out real-time coding;
In to the video data real-time coding in video data embed digital watermark.
The present invention is with a wide range of applications, and in video monitoring systems such as bank, traffic, the video data of being gathered is required fail safe and reliability highly, and the present invention can satisfy such requirement.
Description of drawings
Fig. 1 is Video processing and watermark processing flow chart;
Fig. 2 is that video coding and watermark embed schematic diagram;
Fig. 3 is video decode and watermark extracting schematic diagram;
Fig. 4 is that robust watermarking embeds and extract schematic diagram;
Fig. 5 is that fragile watermark embeds and extract schematic diagram.
Embodiment
Principal character of the present invention is when the video data of gathering is carried out real-time coding, adopts digital watermark technology, embeds identification information in video data, thereby improves the fail safe and the reliability of video data.
Accompanying drawing 1 has been described the basic procedure that video data is handled, at first by the original video data of camera collection; Then the data of gathering are carried out real-time coding, embed digital watermark in coding to guarantee safety of data and reliability, has obtained embedding the coding video frequency data of watermark; Processing such as the video data to coding can be stored, transmission; In needs, coding video frequency data is decoded and play, in decoding, can extract digital watermarking, to guarantee safety of data and reliability.
Accompanying drawing 2 has been described and carried out the watermark embedding when video coding, accompanying drawing 3 has been described and carried out watermark extracting when video decode, here watermark processing is that key is relevant, that is to say, when embedding, watermark adopts a key, during watermark extracting, have only and grasped this key, just can extract embedded watermark.Adopt robust watermarking and fragile watermark technology to guarantee safety of data and reliability respectively.
Guarantee the fail safe of video data
Here the fail safe of video data, mainly be meant some keys and information sensitivity relevant with video data, can do not utilized, delete, revise and forge by the malicious person, after video data having been carried out have a mind to or having handled unintentionally, these information still can be extracted by validated user.
For the better protection important information relevant with video data; these information and video data itself need be combined; we adopt a kind of technology that is called robust watermarking; in coding video data, adopt the robust watermarking technology to embed the important information relevant with video data to camera collection.Watermark embeds and sees accompanying drawing 2 during video coding, and watermark extracting is seen accompanying drawing 3 during video decode.
The embedded location of watermark is considered from following three aspects:
Intra-coded frame, inter-frame encoding frame;
Luminance component, color component;
The DCT low frequency coefficient, intermediate frequency coefficient, high frequency coefficient.
Embedded location is variable, can only embed in the DCT of intra-coded frame luminance component low frequency coefficient, also can embed in whole DCT coefficients of the brightness of all frames and color component.According to the watermark embedded quantity, and which coefficient is required robustness determine to be chosen in watermarked.
The embedding and the extraction of watermark carried out in employing based on the method for spread spectrum.
Watermark embeds: for the information b ∈ to be embedded of 1 bit 1,1}, by one long be r random sequence P:p
i{ 1,1} expands ∈, then, selects suitable amplification factor α: α
i>0 amplifies, and obtains random sequence w
i=b α
iP
i, in host signal X, add this sequence again, just obtained watermarked signal S:
s
i=x
i+b·α
i·p
i
Watermark extracting: after establishing that signal S is subjected to having a mind to or attacking unintentionally, become signal R.Detect the watermark among the R, the correlation between signal calculated R and the random sequence P:
The positive negative value of judging c just can obtain embedded information.
In order to realize robustness and not sentience preferably, we define one 8 * 8 amplification factor matrix, on the different frequency range of DCT coefficient, choose different amplification factor α
i
Embed the efficient of handling in order to improve watermark, we revise the process of video coding, in to coding video data, carry out the embedding of watermark, as accompanying drawing 4.After coefficient is carried out dct transform, embed as watermark if this coefficient block is selected, spectrum spreading method above then adopting carries out watermark and embeds, the watermark information expansion of 1 bit also is embedded in r the host signal, and choosing of the length of spreading factor r is variable, in order to realize robustness preferably, generally require greater than 1000, simultaneously, adjust the length of r, the information that can realize embeds frame by frame.
Need to revise the process of video decode simultaneously, when video data is decoded, carry out the extraction of watermark, as accompanying drawing 4.After coefficient is carried out decoding length changeable code, counter-scanning and inverse quantization, embed as watermark if this coefficient block is selected, the spectrum spreading method above then adopting carries out watermark extracting.
Characteristics below the robust watermarking technology based on spread spectrum that we adopt satisfies:
Robustness: the robustness of watermark is a bit that we emphasize the most, be embedded in the digital watermarking in the video, video has been carried out various have a mind to or handle unintentionally after, as frame insert, deletion, with other coded format recompile etc., still can detect and obtain.
Vision is sentience not: the watermark of embedding is sightless, that is to say, has embedded watermark and can not cause tangible influence to the quality of video afterwards.
Fail safe: adopt a key when watermark embeds, only known this key, could extract, remove embedded information.Fail safe also is embodied in simultaneously: key space is enough big, attacks to prevent exhaustive search; Can adopt a plurality of keys, embed different information.
Blind watermarking project: some digital watermark technologies, when watermark detection, also need data original, that do not add watermark, be called non-blind watermark, otherwise be called blind watermark.In the application of video monitoring, we are in image data, encode and watermarked, are the data that can not obtain not add watermark, and therefore, need to adopt blind watermarking project here.
Guarantee the reliability of video data
Here the reliability of video data is meant mainly whether the video data that can confirm being gathered is distorted, and is modified if confirmed video data, can detect and orient where revising in data.
We adopt a kind of technology that is called fragile watermark, in the coding video data to camera collection, embed fragile watermark in video data.Referring to accompanying drawing 2, accompanying drawing 3.
The embedded location of fragile watermark: the same with robust watermarking, consider from three aspects, therefore can only in the DCT of intra-coded frame luminance component low frequency coefficient, embed, also can in whole DCT coefficients of the brightness of all frames and color component, embed.Choosing of embedded location, depend on that embedded location is many more to the requirement of the ability of fragile watermark detection and positioning tampering, can detect with the ability of positioning tampering just strong more, but the influence that causes to video quality is also just big more simultaneously, can select different embedded locations according to different application requirements.
Simultaneously, consider interoperability with robust watermarking, under the enough strong situation of the intensity of robust watermarking embedding, the embedded location of fragile watermark can be overlapping with the embedded location of robust watermarking, it is certain coefficient, may after dct transform, be used for the embedding of robust watermarking, after quantizing, be used for the embedding of fragile watermark again; Perhaps under the robust watermarking embedment strength was not very high situation, the fragile embedded location that embeds can not be overlapping with the embedded location of robust watermarking, to avoid occurring destroying because of the embedding fragile watermark situation of robust watermarking.
The embedding and the extraction of watermark carried out in employing based on the method for least significant bit (LSB).
Watermark embeds: watermark embeds and comprises two processes, at first is to generate authentication information, is to embed authentication information then.The generation of authentication information is based on such fact: the DC coefficient of DCT coefficient is stable, can obviously destroy the quality of video if it is made amendment; Relative size between the low frequency AC coefficient on while two piece same positions also is stable, the relativeness that processing generally can not destroy the size of these two AC coefficients such as quantize, according to such character, we select DC coefficient and AC coefficient, obtain authentication information, this authentication information is relevant with key, and we represent to select DC and AC coefficient with H, and the process of generation authentication information, k
1The key that expression is used in handling, then authentication information can be expressed as:
M=H(DC,AC,k
1)
Next need these information are embedded in the DCT coefficient after quantizing and go, we adopt the LSB method, promptly revise the least significant bit of coefficient, if embed bit 0, the lowest order of then revising coefficient is 0, otherwise is 1, and we are according to key k
2Select embedded location, we are illustrated in the watermarked process of host signal X with E, have obtained embedding the signal S of watermark:
S=E(X,M,k
2)
Whether according to different application requirements, we adopt different embedding parameters, distort if only need detect certain frame, and then DC and the AC coefficient according to a frame generates authentication information, and embeds this authentication information at this frame; Tamper detection is to carry out on which piece of a frame if desired, then can be a frame piecemeal, generate authentication information according to every DC and AC coefficient (can also can avoid like this replacing and attack), and press piece embedding authentication information according to the DC and the AC coefficient of adjacent block.
Watermark extracting: if known the key k that watermark embeds
1And k
2, then can basis and watermark similar step when embedding, at first obtain authentication information
M=H(DC,AC,k
1)
Simultaneously, represent from S, to extract the process of watermark with D:
M′=D(S,k
2)
Relatively whether M is identical with M ', if different, then expression is distorted.
Embed the efficient of handling in order to improve watermark, we revise the process of video coding, in to coding video data, carry out the embedding of watermark, as accompanying drawing 5.After coefficient being carried out dct transform, quantizing, embed as watermark if this coefficient block is selected, the LSB method above then adopting is carried out watermark and is embedded in quantization parameter.
Need to revise the process of video decode simultaneously, when video data is decoded, carry out the extraction of watermark, as accompanying drawing 5.After coefficient is carried out decoding length changeable code, counter-scanning, embed as watermark if this coefficient block is selected, the LSB method above then adopting is carried out watermark extracting.
Characteristics below the fragile watermark technology based on LSB that we adopt satisfies:
Detect and positioning tampering: at first,, can detect by fragile watermark and whether to revise if video data is revised; Secondly, can confirm this modification is where to occur in;
Simultaneously, the same with robust watermarking, not characteristics such as sentience, fail safe, blind watermarking project of vision are satisfied in the watermark of Qian Ruing here.
Claims (6)
1. video capture method that adopts digital watermark technology comprises step:
Video data is gathered;
The video data of gathering is carried out real-time coding;
In to the video data real-time coding in video data embed digital watermark.
2. by the described method of claim 1, it is characterized in that described digital watermarking comprises robust watermarking and fragile watermark.
3. by the described method of claim 2, it is characterized in that described embedding robust watermarking comprises step:
Generate the step of authentication information;
Embed the step of authentication information.
4. by the described method of claim 2, it is characterized in that described embedding fragile watermark comprises step:
Generate the step of authentication information;
Embed the step of authentication information.
5. by the described method of claim 2, it is characterized in that the embedded location of described robust watermarking and fragile watermark can be overlapping or not overlapping.
6. by the described method of claim 1, it is characterized in that described digital watermarking has identified the time of video acquisition, place and some other important information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA021560277A CN1507279A (en) | 2002-12-11 | 2002-12-11 | Video acquisition method adopting digital watermark technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA021560277A CN1507279A (en) | 2002-12-11 | 2002-12-11 | Video acquisition method adopting digital watermark technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1507279A true CN1507279A (en) | 2004-06-23 |
Family
ID=34236103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA021560277A Pending CN1507279A (en) | 2002-12-11 | 2002-12-11 | Video acquisition method adopting digital watermark technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1507279A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523535A (en) * | 2011-12-01 | 2012-06-27 | 南京师范大学 | Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology |
CN103198558A (en) * | 2013-02-06 | 2013-07-10 | 深圳宝嘉电子设备有限公司 | Bank counter intelligent processing terminal |
CN103826168A (en) * | 2014-02-25 | 2014-05-28 | 深圳市掌网立体时代视讯技术有限公司 | Method and system for adding watermark to video |
CN104735409A (en) * | 2015-02-10 | 2015-06-24 | 浙江科技学院 | Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof |
CN105049805A (en) * | 2015-01-04 | 2015-11-11 | 浙江工大盈码科技发展有限公司 | Video monitoring device capable of hiding anti-counterfeiting shooting watermark in real time |
CN106454182A (en) * | 2016-10-26 | 2017-02-22 | 维沃移动通信有限公司 | Video generation method and mobile terminal |
CN111901661A (en) * | 2020-07-30 | 2020-11-06 | 海信视像科技股份有限公司 | Video recording method, video playing method and display equipment |
US10972807B2 (en) | 2018-04-06 | 2021-04-06 | Deluxe One Llc | Dynamic watermarking of digital media content at point of transmission |
-
2002
- 2002-12-11 CN CNA021560277A patent/CN1507279A/en active Pending
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523535A (en) * | 2011-12-01 | 2012-06-27 | 南京师范大学 | Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology |
CN102523535B (en) * | 2011-12-01 | 2014-04-23 | 南京师范大学 | Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology |
CN103198558A (en) * | 2013-02-06 | 2013-07-10 | 深圳宝嘉电子设备有限公司 | Bank counter intelligent processing terminal |
CN103198558B (en) * | 2013-02-06 | 2014-12-10 | 深圳宝嘉电子设备有限公司 | Bank counter intelligent processing terminal |
CN103826168A (en) * | 2014-02-25 | 2014-05-28 | 深圳市掌网立体时代视讯技术有限公司 | Method and system for adding watermark to video |
CN105049805A (en) * | 2015-01-04 | 2015-11-11 | 浙江工大盈码科技发展有限公司 | Video monitoring device capable of hiding anti-counterfeiting shooting watermark in real time |
CN105049805B (en) * | 2015-01-04 | 2018-04-13 | 浙江工大盈码科技发展有限公司 | A kind of video monitoring apparatus for hiding shooting anti-counterfei waterprint in real time |
CN104735409A (en) * | 2015-02-10 | 2015-06-24 | 浙江科技学院 | Single-optical-path surveillance video watermark physical hiding device and digital detection method thereof |
CN106454182A (en) * | 2016-10-26 | 2017-02-22 | 维沃移动通信有限公司 | Video generation method and mobile terminal |
US10972807B2 (en) | 2018-04-06 | 2021-04-06 | Deluxe One Llc | Dynamic watermarking of digital media content at point of transmission |
CN111901661A (en) * | 2020-07-30 | 2020-11-06 | 海信视像科技股份有限公司 | Video recording method, video playing method and display equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Hiding privacy information in video surveillance system | |
Feng et al. | Reversible watermarking: Current status and key issues. | |
Shi | Reversible data hiding | |
US7389420B2 (en) | Content authentication and recovery using digital watermarks | |
Lu et al. | Semi-fragile image watermarking method based on index constrained vector quantisation | |
Thabit et al. | Medical image authentication using SLT and IWT schemes | |
CN1233371A (en) | Data hiding method and data extracting method | |
CN1290337C (en) | Video/image communication with watermarking | |
CN1507279A (en) | Video acquisition method adopting digital watermark technology | |
Amanipour et al. | Video-tampering detection and content reconstruction via self-embedding | |
Zain | Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images | |
CN101252683A (en) | Multifunctional watermark video camera | |
Chen et al. | H. 264 video authentication based on semi-fragile watermarking | |
Park et al. | Invertible semi-fragile watermarking algorithm distinguishing MPEG-2 compression from malicious manipulation | |
Kapre et al. | Key-frame extraction based video watermarking using speeded up robust features and discrete cosine transform | |
Bassali et al. | Compression tolerant watermarking for image verification | |
JP2000151973A (en) | Information processor, information processing method and storage medium | |
CN114598887A (en) | Anti-recompression video watermarking method for controlling bit rate increase | |
CN1207891C (en) | Digital video frequency water mark method based on error correcting code | |
Tsai et al. | Highly imperceptible video watermarking with the Watson's DCT-based visual model | |
KR20050108515A (en) | Method of protection of dct image data against forgery | |
Kung et al. | Watermark technique using frequency domain | |
Liang et al. | Video authentication and tamper detection based on cloud model | |
Qian et al. | Robust blind image watermarking algorithm based on singular value quantization | |
CN113766242A (en) | Watermark embedding method, watermark extracting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |