Next Article in Journal
Ad-Hoc Shallow Neural Network to Learn Hyper Filtered PhotoPlethysmoGraphic (PPG) Signal for Efficient Car-Driver Drowsiness Monitoring
Previous Article in Journal
Low Altitude Measurement Accuracy Improvement of the Airborne FMCW Radio Altimeters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Biological Viral Infection Watermarking Architecture of MPEG/H.264/AVC/HEVC

1
Department of Land, Water and Environment Research, KICT, Daehwa-dong, Ilsanseo-gu, Goyang-si 10223, Korea
2
Department of Information Security, Tongmyong University, Yongdang-dong, Nam-gu, Busan 48520, Korea
3
Institute of Image and Cultural Contents, Dongguk University, Seoul 04620, Korea
4
Department of IT Convergence and Application Engineering, Pukyong National University, Nam-gu, Busan 608737, Korea
*
Authors to whom correspondence should be addressed.
Electronics 2019, 8(8), 889; https://doi.org/10.3390/electronics8080889
Submission received: 9 July 2019 / Revised: 1 August 2019 / Accepted: 8 August 2019 / Published: 13 August 2019
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
This paper addresses the viral infectious watermarking (VIW) model using biological virus infection for a new-paradigm of video copyright protection of MPEG/H.264/AVC/HEVC. Our model aims to spread or infect the watermark to different codecs each time video contents are copied, edited, or transcoded. Thus, we regard the watermark as the infectious virus, the video content as the host, and the video codec as the contagion medium and then model pathogen, mutant, and contagion as the infectious watermark. Then, we define the techniques of viral infectious watermark generation, kernel-based VIW, and content-based VIW. Furthermore, we present a reversible VIW for fast infection in VIW model. This makes the video quality and strength be adaptively controlled in the infectious process. Experiment results verified that our VIW model can detect or recover the reversible watermark without loss in different codecs and also can maintain the quality of video content that is recovered to the same bit rate.

1. Introduction

As the service of ultra-definition video contents becomes more common in broadcasting, digital cinema, and home theater, many researchers have studied deep into high efficiency video coding (HEVC) and highly improved video codecs for effectively compressing and transmitting ultra-definition video contents. With HEVC, the scalable video coding (SVC) facilitates to partially decode from one sequence of compressed video to a combination of resolution, quality, and frame rate that are optimized on platform and transmission bandwidth of user device. With the marvelous progress of video codec technologies, the disputes of copyright and ownership for preventing illegal copying and distribution and pirate edition have been issued steadily as problems on commonplace video compression. To solve disputes of copyright and ownership, many nations have legislated the standardized agreement of creative commons license (CCL) that authorizes the copyright management since 2002. However, this agreement does not protect the copyright infringement all the way in cases of illegal copying and distribution of black works or partial edition. Moreover, the wide use of online storage services, torrent programs, or cloud systems makes it very difficult to guarantee ownership rights or prevent illegal copying and distribution.
Many researchers [1,2,3,4,5,6,7,8,9,10,11,12,13,14] have worked on video copyright and ownership protection based on watermarking for decades. However, most of them do not meet all the requirements of data capacity, reliability, and video quality. Early stage works [1,2,3,4,5,6] focused on the compressed DCT domain of MPEG-2/-4, H.264 codec or the uncompressed DWT domain, considering the robustness in the face of geometric and temporal attacks. Hartung et al. [1] presented an additive spread-spectrum watermarking technique for MPEG-2 compressed video stream that embeds the watermark in the entropy coded DCT coefficients. Swanson et al. presented an object-based transparent watermarking technique [2] and also a temporal wavelet transform-based multi-resolution watermarking technique [3]. Serdean et al. [4] presented DWT-based high capacity video watermarking invariant to geometrical attacks that uses a spatial domain reference watermark. Wang et al. [5] presented a set of robust MPEG-2 video watermarking focused on geometric processing such as cropping, removal of any rows, downscaling, frame dropping, and bit-rate reduction. Zhang et al. [6] embedded the modified 2D 8-bit watermark pattern in the compressed domain to accommodate the computational constraints of H.264/AVC.
Recent stage works [7,8,9,10,11,12,13,14] have considered different codecs and the robustness to combination of commonly used attacks with the development of codecs. Asikuzzaman et al. [7] embedded the watermark into one level of the dual-tree complex wavelet transform (DT DWT) of the chrominance channel and extracted the watermark depending on the resolution of the downscaled version of the watermarked frame and the information of that frame without using the key. Fallahpour et al. [8] generated the watermark signals by the macroblock’s and frame’s indices and embedded them into the nonzero quantized DCT values of blocks, mostly the last nonzero values, enabling detection of spatial, temporal, and spatiotemporal tampering. Stutz et al. [9] presented a non-blind watermarking for H.264/CAVLC structure-preserving substitution with high capacity without changing the length of video stream. Khalilian et al. [10] embedded the watermark in the LL sub-band of DWT coefficients that offers the most robust PCA-based decoding. Boho et al. [11] presented an encryption-watermarking technique for H.264/AVC and HEVC by examining the practical trade-offs between the security of encryption, the robustness of watermarking, and the possibility of transcoding. Wang et al. [12] presented a real-time video watermarking that has the transparency and robustness to resist geometric distortions such as scaling, cropping, changing aspect ratio, frame dropping, and swapping.
However, most of existing techniques have difficulty in practical commercialization because of some considerable defects. The watermark embedded in a video raw data prior to compression may be lost during quantization. Furthermore, it is very difficult for the watermark to keep the robustness to geometric processing such as rotation, translation, and cropping of any frame. Watermarking techniques in the compression domain have been worked out by controlling some compression parameters to minimize the loss of watermark in the process of quantization or video editing. However, the watermark may be lost in the re-compression of decoded video data or the trans-coding by different codecs. Thus, watermarking techniques considering a specific codec have not coped with a variety of video codes [13,14] as well as standard video codecs. Furthermore, they have not coped with a multi-view video coding (MVC), which creates a variety of output streams of a single source, and a hierarchical compression, such as scalable video coding (SVC). Therefore, an effective and reliable integrated copyright protection system for video content technologies that develop and grow exponentially is needed. Besides, Niu et al. [15] presented a reversible watermarking scheme for H.264/AVC using histogram shifting of motion vector, and Xu [16] presented an efficient commutative encryption and watermarking scheme for HEVC standard, unlike H.264/AVC. Ma et al. [17] presented a video watermarking on H.264 compressed domain using the syntactic elements of the compressed bit stream, but Marren et al. [18] designed a scalable architecture for uncompressed-domain of watermarked videos using fast encoders, which re-uses the coding information from a single, previously-encoded, unwatermarked video. Abdi et al. [19] presented a real-time watermarking scheme for H.264/AVC video stream by modifying the number of nonzero-quantized AC (alternating current) coefficients in a 4 × 4 block of I frame.
Like living things, video codec has evolved continuously according to the IT/ICT ecosystem. Existing video watermarking systems cannot keep up with the evolution of video codecs. To solve this problem, we consider the watermarking system and video codecs as a biological environment such as a virus. We have designed a scenario of infectious watermarking that models the relationship between video content and video codecs to biological viruses and hosts [20]. The feature of this scenario is that the watermark is continuously infected through the transcoding process of video contents through a repetitive re-embedding process on the codec. In this scenario, we introduced codec and content based watermarking techniques. The first codec-based watermarking scheme hides DCT coefficients in 4 × 4 block units of codec repeatedly to adapt to various codecs. The second content-based watermarking embeds the robust watermark in the ROI (Region of Interest)-based DCT coefficients of the original video data. In this scenario, however, codec-based watermarking can accumulate image degradation due to persistent and repetitive watermark re-embedding and has a limited re-embedding process on various codecs. Therefore, it is necessary to modify the scenario with a viral reversible/irreversible watermarking method for watermark authentication that is effective in the iterative detection/mutation/re-embedding process.
In this paper, we propose a scenario to integrate infectious watermark authentication, infectious watermark generation and management, content-based watermark embedding, and codec-based watermark embedding technique for continuous watermark infection through continuous transcoding detection/mutation/re-embedding. We also propose a codec-based infectious watermarking technology incorporating irreversible and reversible watermarking techniques. In this paper, we call this scenario a viral infectious watermarking (VIW) model that uses the biological virus theory for an integrated copyright protection system that copes with various video codecs such as H.264/AVC or HEVC.
In our VIW model, we assume two things. The codecs are regarded as the host with infective agent since the infected video by the first watermark, called pathogen, passes over any codecs through a number of routes. The infected video is, secondly, infected by two kinds of watermark—mutant and contagion—whenever it passes over processes of playing, streaming, editing, or transcoding. Following these assumptions, we define our VIW model by four steps: Viral infectious watermark generation and management, kernel-based VIW, content-based VIW, and VIW verification. Then, we presented total irreversible and reversible kernel-based VIW methods and content-based VIW method in our model. The existing kernel-based watermarking method [20] embeds irreversible watermark bits in high frequency coefficients in DCT 4 × 4 block units. The proposed kernel-based method embeds the reversible watermark in units of MB blocks according to the strength, adaptive to the inter/intra frame, and embeds the irreversible watermark in the existing high frequency coefficients in units of 4 × 4 blocks. Therefore, unlike the conventional method [20], the proposed method simultaneously detects both reversible and irreversible watermarks, thereby detecting the watermark adaptively in the detection/mutation/re-embedding process. From experimental results, we verified that our VIW model based on biological virus theory is effective in integrated or multiple video codecs.
This paper is organized as follows. Section 2 introduces the scenario of VIW model and related video watermarking. Section 3 describes the techniques for our VIW model. Section 4 analyzes the experimental results of our watermarking, and Section 5 then presents our conclusions of this paper.

2. Biological Viral Infectious Watermarking (VIW) Architecture

Previous infectious watermarking models [20] have presented a theoretical model between biological virus models and watermarking. In this chapter, we address a new VIW (Virus Infectious Watermarking) model consisting of infectious watermark generation/management, kernel-based watermarking theory for seamless watermark infection for various codecs, content based watermarking theory for copyright protection, and infectious watermark authentication.

2.1. Biological Virus Model

This section briefly discusses biological virus models and watermarking theories based on the previous scenarios [20]. Figure 1a shows the mapping of biological virus model and watermarking model.
  • DNA/RNA: It can be considered as the watermark for copyright and access control of valuable video content.
  • Capsid: It is a nucleic acid surrounded by a protective protein coat. It can be considered as the process of encryption and decryption of the copyright information.
  • Virion: The combination of DNA and capsid generates virions of complete virus particle. Virions can be classified as pathogen, mutant, and contagion, depending on the way and type of infection. We use the name and concept of pathogen, mutant, and contagion and model VIW by encrypting the information of copyright and authority of videos.
We will now consider the infection and reproduction of virus as shown in Figure 1b.

2.1.1. Virus Infection

Main properties of virus infection can be viewed in a watermarking prospect.
(1)
The infection and growth of virus have been accomplished by the process that a virion breaks in a target cell and delivers genetic material to cell. We model the watermarking process as the virus infection and growth process.
(2)
Here, there are many ways how descendant virions are made on the type of cells. Different ways can be modeled as watermarking methods that are compatible with the types of contents or codecs.
(3)
When the virus spreads to cells, hundreds of descendants are reproduced from the virion. This reproduction can be modelled as a re-hiding process of the infectious watermark during content reproduction or transcoding of video.

2.1.2. Virus Reproduction

A virus has two ways of reproduction: lysis and lysogeny.
  • A lysis virus that disassembles or destroys a host cell can be modeled as an authority code or permission code for decoded video contents or display devices. A lysogeny virus that hides genetic material in host cells until it becomes reproductive can be modeled as copyright protection or authentication for hidden watermarks.
  • Virus infections within a host cell are considered as a process of infectious watermarking. The infective ways of a virus are different on the structure of the host cell. When a host cell is considered to be a video content, the watermarking method can be applied differently depending on the type of video content or compressed bit stream.
  • Because biological viruses are reproduced or spread by infected hosts, we design a watermark that should spread wholly through the reproduction or trans-coding of video contents.

2.2. Technical VIW Concepts for Video Codec

We define four descriptive concepts for the viral infectious watermarking (VIW) model using biological virus theory as shown in Figure 2. Our VIW model can apply many different watermarking techniques for the purposes of each descriptive concept.

2.2.1. Watermark Cultivation for Generation and Management

This technique is to generate and manage many watermarks for copyright protection or rights/authority management of video content. Feasible works for them are as follows:
  • Two watermarks on host type: Pathogen and contagion watermarks for host codec and mutant watermark for host content
  • Watermark cultivation by the combination of copyright/ownership and authority: Reliable watermark cultivation by user information. Compatibility of copyright/ownership and authority in the mutation of pathogen, contagion, and mutant watermark
We define three types of watermarks in VIW model as follows:
  • Pathogen watermark: It is the infectious information for producers or copyright owners in the meaning of lysis virus. This watermark can be infected in macro-blocks of base layer in hierarchical video codec like SVC and MVC.
  • Mutant watermark: It is the mutant of pathogen watermark and it can be used in content-based VIW for decoded and reconstructed video. This watermark can be infected into all layers in hierarchical video codec.
  • Contagion watermark: It is the transfectant of extracted mutant watermark in decoding process. This watermark can be infected in the process of storing or re-compressing after video editing.
The pathogen watermark and the contagion watermark should be distinguished according to the infectious process. Two capsids of pathogen and contagion are different in the infection of biological virus. Thus, the bit-streams of pathogen and contagion watermarks are different on encryption algorithms.

2.2.2. Host Kernel-Based VIW

Host kernel-based VIW embeds (or injects) the watermark into host video stream for various video codecs and also infects again the watermark in decoded video data that is considered as a mutant in re-compression or trans-coding of video data. Feasible works for host kernel-based VIW are as follows:
  • Infectious watermarking based on quantization, DCT/DWT kernel, or ME/MC in the encoding process.
  • Reversible infectious watermarking in certification of authority and irreversible infectious watermarking in non-certification of authority.
Host-based VIW for injecting pathogen and contagion should be simple and applied to different video codecs.

2.2.3. Content-Based VIW

Content-based VIW infects the watermark in image data of played video stream that is the primitive video data or decoded video data. Feasible works for content-based VIW are as follows:
  • Generation of first host watermarked video stream by the pathogen watermark or infected video stream by the mutant watermark;
  • Robust infectious watermarking in spatial or frequency domain;
  • Recovery or regeneration of attacked watermark;
  • Intentional video degradation in case of non-certification.
Content-based VIW should consider spatial resolutions of trans-coding by H.264SE/MPEG-4 SVC codecs.

2.2.4. VIW Verification (WV)

VIW verification checks whether the video stream is infected with the watermark and identifies the ownership copyright or the authority from the extracted watermark. The following are related works for VIW verification.
  • Reliable verification technique;
  • Policy of authority control for copying, link, editing using verified infectious watermark: Authorization technique in encoder/decoder, protocol, or syntax for reliability verification and authority control.

3. Proposed Viral Infectious Watermarking Model

3.1. Overall of VIW Application for Video Codec

It is expected to be further improved by reinterpreting existing watermarking techniques and applying them to our VIW (viral infectious watermarking) model. In this sense, we design the scenario to verify the practicality of our model and examine in simulations whether primitive watermarks can be completely infected to many different video contents. In this paper, we consider H.264/MPEG-4 AVC and HEVC codecs as a primitive host and spread the watermark through H.264/MPEG-2 codecs as contagion. Figure 3 shows the VIW application for video codec by the four descriptive concepts in Figure 2.
Our algorithm in VIW model has the infectious watermark cultivation (IWC), content-based watermark embedding and detecting module (C-EM and C-DM) for the mutant watermark, irreversible/reversible kernel-based watermark embedding and detecting module (K-EM and K-DM) for the pathogen and contagion watermarks, as shown in Figure 4. We consider that the copyrighter or owner infects the watermark into a host video. The watermark infection process in encoder is as follows:
  • Before encoding or re-encoding, C-DM detects the watermark in host or re-encoded video.
  • IWC regenerates the watermark after verifying it.
  • K-EM embeds pathogen and contagion watermarks into video stream. K-EM/K-DM has two properties of irreversible and reversible. The irreversible K-EM infects the watermark wholly under trans-coding between heterogeneous codecs and guarantees the safety of video contents against editing, trans-coding, or re-compression. The reversible K-EM regenerates and authenticates the watermark continuously and controls video contents.
  • When watermarked video streams are played or edited on the decoder stage, the watermark verification and regeneration are performed in a similar process on the encoder stage. Then K-DM detects the pathogen or contagion watermark, and C-EM re-embeds the regenerated mutant watermark.
Our VIW preserves the watermark by the recursive and update process that all of watermarks and side information are repeatedly regenerated and embedded in different codes.

3.2. Infectious Watermark Cultivation (IWC)

Pathogen watermark w P , contagion watermark w c , and mutant watermark w m are considered similar in their low complexity. The infectious information I I for watermark includes the copyright or ownership information, the seed number ( S N ) for video authentication, the control codes ( c c ) for parameters required to C-EM and K-EM, and the expiration date. Here we can check the system time of decoder using the expiration date of I I in intra-frames and then can degrade intentionally the quality of intra-frames. The infectious information for watermark I I for intra-frame and inter-frame can be defined by as follows:
I I = { ( S N ( 0 ) , t e , C A ( M , K A ) , c c ) , if   I   frame ( S N ( f % g o p ) , C A ( M , K A ) , c c ) , if   P   or   B   frame .
Here, S N ( n ) is the seed number for a variable n . A variable n is 0 if the current frame is an intra-frame and then the seed number is S N ( 0 ) . Or a variable n is f % g o p if the current frame is an inter-frame and then the seed number is S N ( f % g o p ) that depends on the group of picture g o p and the frame number f . This means that if any frame is dropped during decoding, this codec will not be authenticated. Next, t e is the expiration date on the system time. M is the information of copyright or ownership and is encrypted by a symmetry-key encryption module C A ( M , K A ) to prevent exposure in the watermark infectious process. If a dispute happens, the owner shall be certified the rights to the disputed video from the key K A . c c is the memory size of parameters that control the embedding strength on C-EM or K-EM. The length of M and cc are varied while the watermark capacity is varied on different embedding algorithms or video resolutions.
The watermark w is the encrypted version of I I by the symmetry-key encryption module C V ( · ) .
w = w P = w C = w M = C V ( I I , K V )
K V is the symmetry key for the encoder and decoder. To control the expiration date by K-EM and D-EM, we generate a key k C by the seed number of relative frames S N ( i ) , the expiration date t e , and the current system time t s of that codec.
k C = ( 1 ) u S N ( i ) , 0 i < g o p
u = { 0 , if   i = 0   or   t e t s > 0 1 , otherwise
k C determines the positions of watermarks.

3.3. Kernel-Based Watermarking (K-EM and K-DM) for Pathogen or Contagion Watermark

Our existing kernel-based watermarking [20] embeds the irreversible watermark only within intra frames, which accumulate the image degradation because of the continuous re-embedding process. However, we improve the kernel-based watermarking that has two properties of irreversible and reversible considering intra-inter-frames. Our method uses the quantized DCT coefficients that are computed at the previous stage of entropy coding in general encoding processes with a series of stages of spatial/temporal prediction, DCT transformation, quantization, scanning, and entropy coding.

3.3.1. Irreversible K-EM/K-DM

(1) K-EM: Our irreversible K-EM/K-DM uses only parameters in the encoder for application of various video codecs. At first, we define the number R W of watermark bits, which are periodically infected on the frame frequency r , the bit number of pathogen/contagion watermark | w | , and the numbers N B of DCT blocks in a frame.
R W = | w | × N B | w | × r intra   for   w = w P , w C
Hereby, we set r = 1 and | w | = 64 bits. Then, we compute the block complexity C n of 4 × 4 blocks in all intra-frame and inter-frame by DCT coefficients in high frequency region Ω except for four low frequency coefficients including DC coefficient.
C n = u = 0 3 v = 0 3 ( f n ( u , v ) ) 2 ( f n ( 0 , 0 ) ) 2   for   all   n N B
f n ( u , v ) is a DCT coefficient on ( u , v ) position. Then, we compute the average block complexity C ¯ intra on intra-frame and also the average block complexity C ¯ inter on inter-frame separately.
We arrange all DCT blocks in descending order of the block complexity C n and select N B W ( N B W < N B ) DCT blocks from the highest. As denoted, the rank of block complexity is r a n k ( C n ) and the block index of r th ranked complexity r = r a n k ( C k ) where k = rank 1 ( r ) , the indices of the embedding blocks are
K = [ k 1 , k 2 , , k N B W }   where   k i = rank 1 ( r i )   and   r i ( = r a n k ( C r i ) ) < r i + 1 ( = r a n k ( C r i + 1 ) ) .
We select the highest coefficient f k max ( u , v ) in each of the embedding blocks and modify it by a watermark bit.
f k ( u , v ) = C ¯ k ( w k + α k )   where   C ¯ k = C k N k   for   all   k K
N k is the number of high frequency coefficients Ω except for four low frequency coefficients including DC coefficient. Thus, N k is 10 in 4 × 4 blocks. w k is a watermark bit for k th embedding block. α k is a parameter that controls the transparency and strength for each frame. Thus, it is defined by the difference energy of the highest coefficient f k max ( u , v ) and other coefficients f k ( u , v ) .
α k = E k N B W = 1 N B W k = 1 N B W k = 1 ( u = 0 3 v = 0 3 ( f k max ( u , v ) f k ( u , v ) ) 2 ( f k max ( u , v ) f n ( 0 , 0 ) ) 2 )
Considering security, we generate the key values e k = ( e k ( u ) , e k ( v ) ) for horizontal and vertical permutations for all blocks and permute an embedded coefficient f k ( u , v ) with any coefficient in a block through key values.
f k ( u , v ) f k ( e k ( u ) , e k ( v ) ) ,   0 < e k ( u ) , e k ( v ) < 4
(2) K-DM: In the extracting process, we detect the watermark bit using permutation key values e k and the threshold values t h k as follows:
w ^ k = { 1 , if   f ^ k ( e k ( u ) , e k ( v ) ) t h k 0 , otherwise   for   all   k K
We determine the threshold value t h k by the block complexity C ^ k and the number N k of high frequency coefficients Ω from Equation (8).
t h k = C ^ k N k

3.3.2. Reversible K-EM/K-DM

(1) K-EM: The reversible K-EM embeds bits of the watermark into DCT blocks within the MB(macro-block) for real-time processing. We define the embeddable blocks B m W in m th MB as follows:
B m , n W = { B m , j , z i , B m , j 0 N U L L , z i , B m , j = 0 ,   for   4 i < 2 d
where d = { 6 , i f   | B | = 4 4 , i f   | B | = 16 and { 0 j < | B | 2 , i f   s e e d ( R ( k C ) + m ) = 1 | B | 2 j < | M B | , i f   s e e d ( R ( k C ) + m ) = 0 .
Here, the unique key k C that is generated from encoder and decoder in Equation (3) enables to detect the watermark, to recover the original video, and to authenticate the codec in VIW model. We determine the embeddable blocks B m W using the 1-bit seed value obtained by the index m of MB and the random number R ( k C ) and also determine the recoverable blocks B m S corresponding B m W as follows:
B m , n S = { B m , | B | j 1 , z i , B m , | B | j 1 0 N U L L , z i , B m , | B | j 1 = 0 ,   for   4 i < 2 d
We finally determine target blocks B m , n T in MBs and embed the watermark and side information of | B m T | bits in target blocks B m , n T .
B m T = { ( B m W ,   B m S ) |   B m , n W , B m , n W N U L L }
For embedding | B m T | bits, we scan DCT coefficients z in luminance target blocks B m T and then select first NZC (non-zero coefficient) from fourth scanned coefficient.
f m W = F i r s t   N Z C   o f   z B m W ( j )   and   f m S = F i r s t   N Z C   o f   z B m S ( j )   for   4 i < 2 d
The reason is that codecs that cannot apply K-EM or do not correspond to k C enable to decode only low frequency coefficients.
Given a bit w i of watermark w = w P , w C , we embed w i using the sign of first NZC f i W in embeddable blocks.
f i * W = ( 1 ) x i + 1 | f i W |
f i * W should be recovered to original value f i W for the reversible property.
The side information s i is necessary for this reversible property. If f i W is changed, s i is 1. Or not, s i is 0.
s i = { 1 , i f   f i W = f i * W 0 , i f   f i W f i * W
We embed s i using f i S in recoverable blocks in Equation (16).
f i * S = ( f i S 1 ) + s i
f i S corresponds to f i W . s i recovers f i * W to f i W by autonomous detection.
(2) K-DM: First, we decode a received video stream and find coefficients into which the watermark and side information are embedded using k C and R ( k C ) . Then, we detect the side information s ^ i using LSB of entropy decoded coefficients f ^ i * S in recoverable blocks.
s ^ i = { 1 ,   i f    L S B   o f    f ^ i * S = 1 0 ,   i f    L S B   o f    f ^ i * S = 0
f ^ i * S can be recovered to f i S by the reverse process of Equation (18). Denoted the recovered coefficient as f ^ i S .
f ^ i S = f ^ i * S 1 = f i S
We detect a bit of watermark from a coefficient f ^ i * W in embeddable blocks
w ^ i = { 1 ,   i f    f ^ i * W > 0 0 ,   i f    f ^ i * W < 0
and then recover f ^ i W from f ^ i * W using s ^ i .
f ^ i W = ( 1 ) s ^ i + 1 f ^ i * W

3.4. Content-Based Watermarking (C-EM and C-DM) for Mutant Watermark

We design content-based infectious watermarking based on SVC watermarking method [8] and APDCBT (all phase discrete cosine biorthogonal transform) [21,22] that robust to H.264SE/MPEG-4 SVC/HEVC as well as different video codecs or trans-coding. Compared to DCT transform, APDCBT transform has excellent performance for high frequency attenuation and low frequency aggregation [21,22]. Our method embeds the first watermark into spatial base layers and embeds the second watermark into spatial enhancement layers using interpolation and quantization table.
To infect the mutant information, we determine a region of interest (ROI) on the spatial resolution of each frame f ( x , y ) ;
R ( i , j ) f ( x , y ) ,   a i ( a + R H ) ,   b j ( b + R V ) .
R H and R V are the horizontal and vertical sizes of ROI that are determined by the scaling parameter γ , 0 < γ 1 . a and b are the reference coordinate values of ROI. And we transform ROI region R ( i , j ) to APDCBT domain in each frame and obtain the transform coefficient Y = [ y ( u , v ) ] .
Y = B R B T
The APDCBT transform matrix B with R H × R V dimensions is defined as follows:
B ( u , v ) = { R H u R H R V , u [ 0 , R H ] , v = 0 1 R H R V ( ( R H u ) cos ( u v π R H ) csc ( v π R V ) cos ( u v π R V ) ) , u [ 0 , R H ] , v [ 0 , R V ]
We extend the quantization table Q = { Q ( m , n ) / 2 } ( 0 m , n < 8 ) for intra frame in H.264 to the horizontal and vertical size of ROI using bilinear interpolation.
Q ROI ( u , v ) = { Q ( m , n ) , if   u = m × l V   and   v = n × l H k = 1 1 l = 1 1 ω ( k , l ) Q ( u + k , v + l ) , if   u = 2 m + 1 2 × l V   and   v = 2 n + 1 2 × l H Q ( u , v ) , if   u = τ × R V 8 × 2 n 1   and   v = τ × R H 8 × 2 n 1
l V and l H are l V = τ × R V 8 × 2 n and l H = τ × R H 8 × 2 n . ω = { ω ( k , l ) } is 3 × 3 weighting random matrix that are generated by normal distribution.
ω = 1 k = 0 2 l = 0 2 ω ( k , l ) G R
where
R = [ r ( t 0 , 0 ) r ( t 0 , 1 ) r ( t 0 , 2 ) r ( t 1 , 0 ) r ( t 1 , 1 ) r ( t 1 , 2 ) r ( t 2 , 1 ) r ( t 2 , 1 ) r ( t 2 , 2 ) ]   and   G = 1 16 [ 1 2 1 2 4 2 1 2 1 ]
r ( t k , l ) is random value that is generated by normal distribution of mean = 0.5 and variance = 1 with a seed t k , l .
The extended quantization table Q ROI ( u , v ) is used as a watermark key. We align APDCBT coefficients c ( u , v ) of ROI region by zig-zag scan ordering and quantize them by Q ROI ( u , v ) . Then, we select 64 coefficients in low frequency region and embed the watermark bits into specific bits of quantized APDCBT coefficients as follows:
c ( u , v ) = { c ( u , v ) α × Q R O I ( u , v )   | |   ( 1 δ ) i f   w = 1 c ( u , v ) α × Q R O I ( u , v )   & &   ( 1 δ ) i f   w = 0
| | and & & are bitwise OR and bitwise AND operators. is a bitwise inverse operator. The quantization scale factor α and the bit-shift δ are determined by considering the embedding strength and invisibility. We obtain the embedded ROI R ( i , j ) through inverse quantization and inverse APDCBT and combine it with non-ROI.
The extracting process is performed using a watermark key Q ROI ( u , v ) similar to the above embedding process. Thus, the bits of watermark in each frame can be detected by checking δ th bits of quantized APDCBT coefficients c ˜ ( u , v ) α × Q R O I ( u , v ) as follows:
w ˜ = { 1 , if   ( c ˜ ( u , v ) α × Q R O I ( u , v )   & &   ( 1 δ ) ) = = 1 0 , otherwise

4. Experimental Results

4.1. Experimental Environment

We examined from simulations whether the primitive watermark could be entirely infected to different video codecs. Our simulation considered H.264/MPEG-4 AVC codecs as a primitive host and embedded or spread the infectious watermark by H.264/MPEG-4 AVC, MPEG-2, HEVC (H.265) codecs as contagion and simulated all codecs by FFmpeg; MPEG-2 Part2 (mpeg2video), H.264/MPEG-4 AVC (libx264), HEVC (libx265). Moreover, our simulation was implemented by C/C++ in the PC with Intel Core i7-2700K CPU@3.50GHz, 4cores/8threads and 32GB RAM, of which the OS is 64-bit Windows 10 Ultimate K.
The simulation scenario for verification of our VIW model, as shown in Figure 4. We verified the infectious of watermark with two strategies. The first is that we decoded pathogenic video contents by H.264 SVC and re-coded them by MPEG-2 codec (or H.264/MPEG-4 AVC) and then verified the infectious of watermarks in re-coded MPEG-2 (or H.264/MPEG-4 AVC) streams. The second is that we trans-coded the re-coded MPEG-2 (or H.264/MPEG-4 AVC) streams by H.264/MPEG-4 AVC (or HEVC (H.265)) codec and then verified the infectious of pathogen, mutant, contagion watermarks.
We used MPEG2 and H.264/MPEG-4 AVC for infectious codec of low resolutions (CIF, 4CIF etc.) and used H.264/MPEG-4 AVC and HEVC for infectious codecs for high resolutions (720 p, 1080 p). Table 1 and Table 2 show simulation environments for low and high resolutions. Here, the quality is controlled by a qscale parameter (0–32) in MPEG-2 and a crf parameter (0–51) in H.264/MPEG-4 AVC and HEVC. We set a qscale to 4 in MPEG-2 and a crf to 23 in H.264/MPEG-4 AVC and a crf to 28 in HEVC, which are default values in codec. The following are execution examples of FFmpeg for three codecs; MPEG-2 (ffmpeg -i input -codec:v mpeg2video -qscale:v 4 -codec:a copy output), H.264/MPEG-4 AVC (ffmpeg -i input -c:v libx264 -preset slow -crf 23 -c:a copy output.mkv), HEVC (ffmpeg -i input -c:v libx265 -crf 28 -c:a copy output).
We used test sequences of CIF, 4CIF, and 544p for low resolutions and 720 p, 1280 p, and 2K for high resolutions and some movie sequences were downloaded in H264info.com. Figure 5 shows test video sequences with low resolution used in our experiment.
We compared BERs and PSNRs of our method, previous infectious watermark method [20], and mixture method [19,21] in our scenario. A mixture method is used for K-EM/K-DM of Abdi’s method [19] and C-EM/C-DM of Yang’s method.

4.2. Performance Comparison of BER and PSNR

4.2.1. BER Comparison

Our experiment applied the irreversible/reversible K-EM/DM on base layers for temporal, spatial, and SNR scalabilities and encoded different layers in SVC to bit-streams independently of each other. Since the watermark in base layer can be detected in different layers, temporal and SNR scalabilities were encoded to one layer for the low complexity.
For the fair evaluation, we repeatedly embedded the same 64-bit/128-bit watermark (pathogen, mutant, contagion) per frame for all methods. The mutant watermarks (MW = MW1, MW2, MW3) and the contagion watermark (CW = CW1, CW2) embedded on each round are used as the same watermark of MW and CW in Table 1 and Table 2. We detected the infectious watermark in K-EM/DM and C-EM/DM, as shown in Table 1 and Table 2 and presented the results in Table 3 and Table 4.
According to these results, the proposed method and the existing viral method showed that PW, MW, and CW watermarks were detected without errors until the first infection, but bit errors of both methods occurred from the second infection. That is, the proposed method has average BERs of 0.006–0.018 for PW and MW watermarks and 0.016–0.03 for CW watermark. The conventional viral method has average BERs of 0.012–0.023 for PW and MW watermarks and 0.022–0.048 for CW watermark. BERs of PW and MW of Yang’s method increased from 0.012 to 0.083 on average from compression of host data to 1st and 2nd infection. In addition, BER of CW of Abdi’s method increased from 0.004 to 0.038 from the first infection to the second infection.

4.2.2. PSNR Comparison

Our K-EM/C-EM infects the watermark of three types irrespective of the different encoding parameters. We computed PSNRs to analyze the degraded quality by infected watermarks in various codecs in Table 1 and Table 2 and presented PSNRs of different codecs in Table 5 and Table 6. These PSNRS were the average of the results of 100 experiments, repeatedly. SVC trans-coding of host video sequence does not degrade the quality, which is not different subjectively or objectively. However, the first infection does slightly degrade the quality. This is because, unlike pathogenic watermarks, mutant watermarks are embedded on the basis of C-EM/DM, primarily to consider robustness. However, due to the deterioration and preservation of the infectious watermarks, no further image degradation occurred after the second infection.
These tables show that our method has average PSNRs of 40.99–41.16 dB by PW watermark embedded in the host data, 36.81–39.68 dB by the first infected PW, MW, CW watermarks in the first MPEG2 and H.264 transcoding process and 35.80–38.52 dB by the second infected PW, MW, CW watermarks in the second H.264 and HEVC transcoding process. Thus, we know that PSNR is reduced by 1.01–4.176 dB by transcoding and watermark embedding by the first and second infections from the host data.
The PSNR of the conventional infectious method [20] was 40.57–40.88 dB in average in host data, 36.17–39.12 dB in average in the first infection and 35.19–37.63 dB in the second infection. These average PSNR are 0.414–0.648 dB lower than average PSNR of our method. The PSNR of the combination of Abdi’s [19] and Yang’s [21] methods was 40.18 dB in average in host data, 35.49–39.42 dB in average in the first infection and 33.85–37.29 dB in average in the second infection. Abdi’s method was Yang’s method. The PSNR was slightly higher than that of the control group. The PSNR of Abdi’s method was higher than the PSNR of Yang method. The PSNR of this combination method is 0.340–1.574 dB lower than the PSNR of the proposed method.
Our experiment analyzed the effects of reversible watermark according to the compression ratio of the video stream. The quality of video is degraded if the watermarking method to modify a compressed stream or quantification table meets a predefined bit rate. In addition, if the encoded data in the entropy coding stage is changed by the watermark, the bit rate is increased, which leads to high quantization parameters in the next quantization stage. Since our reversible K-EM embeds the watermark in the entropy coding step, the increase of bit rate and the quality degradation have occurred slightly. We computed the PSNRs of original sequence, recovered sequence, and degraded sequence and presented these results in Table 5 and Table 6. The proposed method uses the sign value of the coefficient only for the watermark embedding, and the non-zero coefficients only for the side information embedding, thus preventing the reduction of entropy coding efficiency.

4.3. Proposed Method Analysis

4.3.1. Watermark Capacity

The watermark length is determined by four parameters ( S N ( t ) , t e , C A ( M , K A ) , c c ) for the resolution and compression ratio of the video sequence. Figure 6 shows the watermark capacity of the test sequence computed in this experiment. These results verified that the watermark can be embedded in an average 2500 MB/frames out of 5440 MB/frames. Thus, the proposed method has an average watermark capacity of 2500 bits/frames, which means that the watermark capacity is large.
According to the above results, we synthesized the infectious information I I = { M , t e , S N ( t ) , c c } for a watermark of a total of 512 bits in Equation (1) and generated the encrypted watermark X of 512 bits by 128-bit DES block-cipher. Here, M is 256 bits for copyright information, t e is 64 bits for expiration data, S N ( t ) is 32 bits for seed number, and c c is 160 bits for control memory size. Then, we computed the embeddable capacity for each frame and embedded the watermark X repeatedly in accordance with the embeddable capacity.

4.3.2. Attack of Compressed Stream

Our K-EM/K-DM and C-EM/DM methods detect the watermark while the sequences of video are decoded and then infect the watermark again by kernel-based reversible watermarking. Therefore, we evaluated the robustness against attacks on the compressed video stream, except for attacks on the decoded frames.
We have shown any frame in the recovered video after K-EM and K-DM processing in Figure 7a,b and also any frame in the recovered video after K-EM and K-EM processing and the re-embedding of random watermark, which is considered as attack, in Figure 7c,d.
When a collusion attack by any watermarks or a watermark removal attack occurs in a compressed video stream, the seed number for the embedded locations and key values is damaged. Damage to the seed number of the key value will degrade the watermark and side information and result in blocking artifacts. The sporadic blocking artifacts in each frame have a detrimental effect on high-quality video streaming services. Therefore, we have confirmed that the proposed method has tolerances to attack in a compressed video stream.

4.3.3. Expired Video Stream

We experimented with the expired use of video stream. That is, when the system time t s of the codec expired for detecting the watermark or generating the recovery key k C , we blocked the high frequency coefficient of the replay video stream containing the watermark and side information. This allows expired video streams or unauthorized codecs to be played only with low quality or low resolution.
Figure 8 shows a frame on a video stream that has been restored normally and a frame on a video stream with low quality and low resolution in an expired or unlicensed codec. We can see that the quality and resolution of expired video stream or unauthorized codec are very low.

5. Conclusions

We presented an infectious reversible watermarking that quickly and effectively infects the reversible watermark in the IIH (infectious information hiding) system for safe dissemination of video content. The proposed method can control video quality and insertion strength together by the control code for infecting the watermark in the C-EM algorithm and the watermark key that is used with the expiration date of the video content. The proposed method hides the watermark into quantized coefficients on a MB unit for real-time processing and also hides the side information for the recovery of the original video content. Thus, the proposed method has the advantage of very low calculations of embedding processes and no frame delay to recover the original video content. Since the quality of video can be reduced by damage to the recovery information when a compressed video stream is attacked, the proposed method can prevent attempts to attack the video content. In a non-attacked video stream, there is no loss of the watermark after reversible watermark detection and video recovery. The quality of the recovered video is similar to the quality of the compressed video that has the same bit rate as this video. If the non-authorized codecs are used to decode watermarked video, or if the use of such video has expired, the proposed method provides video with a low resolution and a quality of less than 30 dB by removing the reversible watermark and performing the de-blocking. That is, the proposed method enables the application of content promotion (PR), free playback services, and other applications. We looked at the structure of infection information and error correction in IIH system, and improved the performance of content-based reversible watermarking by using control code with measuring beam and reversible watermark.

Author Contributions

Conceptualization: B.-J.J., S.-H.L.; Data curation: B.-J.J., S.-H.L.; Formal Analysis: B.-J.J., S.-H.L.; Funding Acquisition: K.-R.K., S.-H.L.; Investigation: B.-J.J., S.-H.L., Y.-S.L.; Methodology: B.-J.J., S.-H.L.; K.-R.K., Y.-S.L.; Project Administration: K.-R.K., S.-H.L.; Resources: B.-J.J.; Softwares: B.-J.J.; Supervision: K.-R.K., S.-H.L.; Validation: K.-R.K., S.-H.L., Y.-S.L.; Visualization: B.-J.J., S.-H.L.; Writing-Original Draft Preparation: B.-J.J., S.-H.L.; Writing-Review and Editing: S.-H.L., Y.-S.L., K.-R.K.

Funding

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (No. 2016R1D1A3B03931003, 2017R1A2B2012456).

Acknowledgments

This research is technically supported by grants from Strategic Research Project (Development of Digital Pairing Core Technology for Water Resource Utilization and Disaster Prediction) funded by Korea Institute of Civil Engineering and Building Technology and also by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2018R1D1A1B07051261).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hartung, F.; Girod, B. Watermarking of uncompressed and compressed video. Signal Process. 1998, 66, 283–301. [Google Scholar] [CrossRef]
  2. Swanson, M.D.; Zhu, B.; Chau, B.; Tewfik, A.H. Object-based transparent video watermarking. In Proceedings of the IEEE First Workshop on Multimedia Signal Processing, Princeton, NJ, USA, 23–25 June 1997; pp. 369–374. [Google Scholar]
  3. Swanson, M.D.; Zhu, B.; Tewfik, A.H. Multiresolution scene-based video watermarking using perceptual models. IEEE J. Sel. Areas Commun. 1998, 16, 540–550. [Google Scholar] [CrossRef]
  4. Serdean, C.V.; Ambroze, M.A.; Tomlinson, M.; Wade, J.G. DWT-based high-capacity blind video watermarking, invariant to geometrical attacks. IEEE Proc. Vis. Image Signal Process. 2003, 150, 51–58. [Google Scholar] [CrossRef]
  5. Wang, Y.; Pearmain, A. Blind MPEG-2 video watermarking robust against geometric attacks: A set of approaches in DCT domain. IEEE Trans. Image Process. 2006, 15, 1536–1543. [Google Scholar] [CrossRef] [PubMed]
  6. Zhang, J.; Ho, A.T.S.; Gang, Q.; Marziliano, P. Robust video watermarking of H.264/AVC. IEEE Trans. Circuits Syst. Video Technol. 2007, 54, 205–209. [Google Scholar] [CrossRef]
  7. Asikuzzaman, M.; Alam, M.J.; Lambert, A.J.; Pickering, M.R. Imperceptible and robust blind video watermarking using chrominance embedding: A set of approaches in the DT CWT domain. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1502–1517. [Google Scholar] [CrossRef]
  8. Fallahpour, M.; Shirmohammadi, S.; Semsarzadeh, M.; Zhao, J. Tampering detection in compressed digital video using watermarking. IEEE Trans. Instrum. Meas. 2014, 63, 1057–1072. [Google Scholar] [CrossRef]
  9. Stutz, T.; Autrusseau, F.; Uhl, A. Non-blind structure-preserving substitution watermarking of H.264/CAVLC inter-frames. IEEE Trans. Multimed. 2014, 16, 1337–1349. [Google Scholar] [CrossRef]
  10. Khalilian, H.; Bajic, I.V. Video watermarking with empirical PCA-based decoding. IEEE Trans. Image Process. 2013, 22, 4825–4840. [Google Scholar] [CrossRef]
  11. Boho, A.; Wallendael, G.V.; Dooms, A.; De Cock, J.; Braeckman, G.; Schelkens, P.; Preneel, B.; Van de Walle, R. End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation. IEEE Signal Process. Mag. 2013, 30, 97–107. [Google Scholar] [CrossRef]
  12. Wang, L.; Ling, H.; Fuhao, Z.; Zhengding, L. Real-time compressed-domain video watermarking resistance to geometric distortions. IEEE Multimed. 2012, 19, 70–79. [Google Scholar] [CrossRef]
  13. Lu, J.; Li, L.; Yang, Z. Video watermarking algorithm for H.264 scalable video coding. KSII Trans. Internet Inf. Syst. 2013, 7, 56–67. [Google Scholar]
  14. Ling, C.; Ur-Rehman, O.; Zhang, W. Semi-fragile watermarking scheme for H.264/AVC video content authentication based on manifold feature. KSII Trans. Internet Inf. Syst. 2014, 8, 4568–4587. [Google Scholar]
  15. Niu, K.; Yang, X.; Zhang, Y. A novel video reversible data hiding algorithm using motion vector for H.264/AVC. Tsinghua Sci. Technol. 2017, 22, 489–498. [Google Scholar] [CrossRef]
  16. Xu, D. Commutative encryption and data hiding in HEVC video compression. IEEE Access 2019, 7, 66028–66041. [Google Scholar] [CrossRef]
  17. Ma, Z.; Huang, J.; Jiang, M.; Niu, X. A video watermarking DRM method based on H.264 compressed domain with low bit-rate increasement. Chin. J. Electron. 2016, 25, 641–647. [Google Scholar] [CrossRef]
  18. Mareen, H.; Praeter, J.D.; Wallendael, G.V.; Lambert, P. A scalable architecture for uncompressed-domain watermarked videos. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1432–1444. [Google Scholar] [CrossRef]
  19. Abdi, L.; Faten, B.A.; Meddeb, A. Real-time watermarking algorithm of H.264/AVC video stream. Int. Arab J. Inf. Technol. 2017, 14, 168–174. [Google Scholar]
  20. Jang, B.J.; Lee, S.H.; Lim, S.H.; Kwon, K.R. Biological infectious watermarking model for video copyright protection. J. Inf. Process. Syst. 2015, 11, 280–294. [Google Scholar]
  21. Yang, F.; Wang, C.; Huang, W.; Zhou, X. Embedding binary image watermark in DC components of all phase discrete cosine biorthogonal transform. Int. J. Secur. Its Appl. 2015, 8, 125–136. [Google Scholar] [CrossRef]
  22. Zhou, X.; Zhang, H.; Wang, C. A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 2018, 10, 77. [Google Scholar] [CrossRef]
Figure 1. (a) Mapping of biological virus model to watermarking model and (b) virus infection process.
Figure 1. (a) Mapping of biological virus model to watermarking model and (b) virus infection process.
Electronics 08 00889 g001
Figure 2. Viral infectious watermarking (VIW) model in video codec.
Figure 2. Viral infectious watermarking (VIW) model in video codec.
Electronics 08 00889 g002
Figure 3. (a) Scenario for video watermarking in proposed VIW model and (b) infecting process for three watermarks.
Figure 3. (a) Scenario for video watermarking in proposed VIW model and (b) infecting process for three watermarks.
Electronics 08 00889 g003
Figure 4. Simulation scenario of our infectious watermarking.
Figure 4. Simulation scenario of our infectious watermarking.
Electronics 08 00889 g004
Figure 5. Test video sequences; (a) Crew (4CIF@30fps), (b) Foreman (CIF@30fps), (c) Bus (CIF@30fps), and (d) Football (CIF@30fps), and (e) movie (1280 × 544@24fps).
Figure 5. Test video sequences; (a) Crew (4CIF@30fps), (b) Foreman (CIF@30fps), (c) Bus (CIF@30fps), and (d) Football (CIF@30fps), and (e) movie (1280 × 544@24fps).
Electronics 08 00889 g005aElectronics 08 00889 g005b
Figure 6. Average watermark capacity for 30 frames of test video sequence.
Figure 6. Average watermark capacity for 30 frames of test video sequence.
Electronics 08 00889 g006
Figure 7. (a) A frame on a video sequence recovered after K-EM and K-DM processing and (c) a frame on a video sequence with blocking artifacts due to the recovery error by re-embedding the random watermarks. (b,d) are 30% enlarged versions of (a,c) respectively.
Figure 7. (a) A frame on a video sequence recovered after K-EM and K-DM processing and (c) a frame on a video sequence with blocking artifacts due to the recovery error by re-embedding the random watermarks. (b,d) are 30% enlarged versions of (a,c) respectively.
Electronics 08 00889 g007
Figure 8. (a) A frame on a video sequence recovered after K-EM and K-DM processing, (c) a frame on an expired video sequence with low quality, and (e) a frame on an expired video sequence with both low quality and low resolution. (b,d) are 30% enlarged versions of (a,c) respectively.
Figure 8. (a) A frame on a video sequence recovered after K-EM and K-DM processing, (c) a frame on an expired video sequence with low quality, and (e) a frame on an expired video sequence with both low quality and low resolution. (b,d) are 30% enlarged versions of (a,c) respectively.
Electronics 08 00889 g008
Table 1. Infectious simulation scenario 1 using MPEG-2 and H.264/MPEG-4 AVC for low resolution (64-bit watermark).
Table 1. Infectious simulation scenario 1 using MPEG-2 and H.264/MPEG-4 AVC for low resolution (64-bit watermark).
Infection TargetEncoderDecoderOutputDetection Watermark
CodecWatermarkCodecWatermark
Host videoSVCPathogen PWSVCMutant MW1PW/MW1 videoPW
Output 1MPEG2 (qscale = 8)Contagion CW1MPEG2 (qscale = 8)Mutant MW2PW/MW1,2/CW1 videoPW/MW1/CW1
Output 2H.264 (crf = 23)Contagion CW2H.264 (crf = 23)Mutant MW3PW/MW1,2,3/CW1,2 videoPW/MW1,2/CW1,2
Table 2. Infectious simulation scenario 1 using H.264/MPEG-4 AVC and HEVC for high resolution (128-bit watermark).
Table 2. Infectious simulation scenario 1 using H.264/MPEG-4 AVC and HEVC for high resolution (128-bit watermark).
Infection TargetEncoderDecoderOutputDetection Watermark
CodecWatermarkCodecWatermark
Host videoSVCPathogen PWSVCMutant MW1PW/MW1 videoPW
Output 1H.264 (crf = 23)Contagion CW1H.264 (crf = 23)Mutant MW2PW/MW1,2/CW1 videoPW/MW1/CW1
Output 2HEVC (crf = 28)Contagion CW2HEVC (crf = 28)Mutant MW3PW/MW1,2,3/CW1,2 videoPW/MW1,2/CW1,2
Table 3. BER results of pathogen, contagion, and mutant watermarks by MPEG2 and H.264/MPEG4 AVC for low resolutions.
Table 3. BER results of pathogen, contagion, and mutant watermarks by MPEG2 and H.264/MPEG4 AVC for low resolutions.
Test SequencesResolution@FPSHost1st Infection2nd Infection
H.264 SVCMPEG-2 (qscale 4)H.264 (crf 23)
PW(C-EM/DM) BERCW1(K-EM/DM) BER/PW/MW1(C-EM/DM) BERCW1,2(K-EM/DM) BER/PW/MW1,2(C-EM/DM) BER
ProposePrevious [20]Yang [21]ProposePrevious [20]Abdi [19]/Yang [20]ProposePreviousAbdi [19]/Yang [20]
FootballCIF@30fps000.020/00/00.01/0.040.01/0.020.02/0.030.03/0.10
ForemanCIF@30fps000.010/00/00.00/0.020.00/0.020.01/0.020.02/0.07
BusCIF@30fps000.000/00/00.00/0.010.01/0.010.01/0.010.02/0.05
Crew4CIF@30fps000.010/00/00.00/0.020.00/0.010.01/0.020.03/0.08
Movie544p@24fps000.020/00/00.01/0.030.01/0.020.01/0.030.04/0.10
Average BER000.0120/00/00.004/0.0240.006/0.0160.012/0.0220.028/0.080
Table 4. BER results of pathogen, contagion, and mutant watermarks by H.264/MPEG4 AVC and HEVC for high resolutions.
Table 4. BER results of pathogen, contagion, and mutant watermarks by H.264/MPEG4 AVC and HEVC for high resolutions.
Test SequencesResolution@23.967FPSHost1st Infection2nd Infection
H.264 SVCH.264 (crf 23)HEVC (crf 28)
PW(C-EM/DM) BERCW1(K-EM/DM) BER/PW/MW1(C-EM/DM) BERCW1,2(K-EM/DM) BER/PW/MW1,2(C-EM/DM) BER
ProposePrevious [20]Yang [21]ProposePreviousAbdi [19]/Yang [20]ProposePreviousAbdi [19]/Yang [20]
Simpsons1080p000.030/00/00.01/0.050.02/0.030.03/0.050.04/0.08
IamLegend1080p000.040/00/00.02/0.060.02/0.040.02/0.060.05/0.11
Serenity720p000.020/00/00.01/0.040.01/0.020.02/0.040.03/0.06
Fantastic4720p000.030/00/00.02/0.060.02/0.030.02/0.040.03/0.08
Average BER000.0300/00.015/0.0530.018/0.0300.023/0.0480.038/0.083
Table 5. PSNR results of pathogen, contagion and mutant watermarks by MPEG2 and H.264/MPEG4 AVC for low resolution.
Table 5. PSNR results of pathogen, contagion and mutant watermarks by MPEG2 and H.264/MPEG4 AVC for low resolution.
Test SequencesResolution@FPSHost1st Infection2nd Infection
H.264 SVCMPEG-2 (qscale 4)H.264 (crf 23)
PW(C-EM/DM) PSNRCW1(K-EM/DM) PSNR/PW/MW1(C-EM/DM) PSNRCW1,2(K-EM/DM) PSNR/PW/MW1,2(C-EM/DM) PSNR
ProposePrevious [20]Yang [21]ProposePrevious [20]Abdi [19]/Yang [20]ProposePrevious [20]Abdi [19]/Yang [20]
FootballCIF@30fps41.3941.1440.7336.9236.4636.78/35.4535.6636.7734.27/33.63
ForemanCIF@30fps42.2141.9541.5337.3636.4836.81/35.7835.9536.3034.76/34.17
BusCIF@30fps40.4540.0839.6836.9336.2936.47/35.7636.1335.8235.20/33.96
Crew4CIF@30fps40.0939.4139.0635.6535.2635.56/34.6435.435.0734.34/33.46
Movie544p@24fps40.8940.2839.8837.2136.3436.75/35.8335.8636.0334.82/34.01
Average PSNR40.9940.5740.1836.8136.1736.47/35.4935.8035.1934.68/33.85
Table 6. PSNR results of pathogen, contagion, and mutant watermarks by H.264/MPEG4 AVC and HEVC for high resolution.
Table 6. PSNR results of pathogen, contagion, and mutant watermarks by H.264/MPEG4 AVC and HEVC for high resolution.
Test SequencesResolution@23.967fpsHost1st Infection2nd Infection
H.264 SVCH.264 (crf 23)HEVC (crf 28)
PW(C-EM/DM) PSNRCW1(K-EM/DM)/PW/MW1(C-EM/DM) PSNRCW1,2(K-EM/DM)/PW/MW1,2(C-EM/DM) PSNR
ProposePrevious [20]Yang [21]ProposePrevious [20]Abdi [19]/Yang [20]ProposePrevious [20]Abdi [19]/Yang [20]
Simpsons1080p40.8840.4439.7239.2538.8539.15/38.0638.2637.3936.98/36.22
IamLegend1080p40.4340.3739.3538.8538.4238.71/37.7437.8336.9836.58/36.18
Serenity720p41.5641.0740.6440.2139.5039.78/38.6938.8937.9237.57/37.21
Fantastic4720p41.7841.6240.9540.4239.7040.04/38.9739.0938.2338.02/37.14
Average PSNR41.1640.8840.1739.6839.1239.42/38.3738.5237.6337.29/36.69

Share and Cite

MDPI and ACS Style

Jang, B.-J.; Lee, S.-H.; Lee, Y.-S.; Kwon, K.-R. Biological Viral Infection Watermarking Architecture of MPEG/H.264/AVC/HEVC. Electronics 2019, 8, 889. https://doi.org/10.3390/electronics8080889

AMA Style

Jang B-J, Lee S-H, Lee Y-S, Kwon K-R. Biological Viral Infection Watermarking Architecture of MPEG/H.264/AVC/HEVC. Electronics. 2019; 8(8):889. https://doi.org/10.3390/electronics8080889

Chicago/Turabian Style

Jang, Bong-Joo, Suk-Hwan Lee, Young-Suk Lee, and Ki-Ryong Kwon. 2019. "Biological Viral Infection Watermarking Architecture of MPEG/H.264/AVC/HEVC" Electronics 8, no. 8: 889. https://doi.org/10.3390/electronics8080889

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop