scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Information hiding in AVS compressed stream

07 Jul 2008-pp 988-992
TL;DR: A novel information hiding algorithm for AVS (audio video coding standard), taking advantage of the specific features of this self developed Chinese audio video compression standard, requiring neither original media nor complete video decoding.
Abstract: This paper presents a novel information hiding algorithm for AVS (audio video coding standard), taking advantage of the specific features of this self developed Chinese audio video compression standard. AVS adopts Exp-Golomb coding and context based adaptive variable length coding to solve the entropy coding problem, almost all the syntax elements are encoded using Exp-Golomb codes. In the compressed bitstream, hidden bits are embedded by modulating the corresponding Exp-Golomb code, which is based on the mapping rules between these codes and the hidden bits. The hiding positions are limited to maintain the quality of the reconstructed images. Hidden information can be retrieved by decoding the Exp-Golomb code from bitstream, requiring neither original media nor complete video decoding. The experimental results show that the hidden algorithm has little effect on the video quality and the bitrate hasnpsilat been changed.
References
More filters
Journal ArticleDOI
TL;DR: The proposed method is robust and of much lower complexity than a complete decoding process followed by watermarking in the pixel domain and re-encoding, and is also applicable to other hybrid transform coding schemes like MPEG-1, MPEG-4, H.263.

861 citations

Journal ArticleDOI
01 Jul 1999
TL;DR: Digital watermarking techniques are described, known as perceptually based watermarks, that are designed to exploit aspects of the the human visual system in order to provide a transparent (invisible), yet robust watermark.
Abstract: The growth of new imaging technologies has created a need for techniques that can be used for copyright protection of digital images and video. One approach for copyright protection is to introduce an invisible signal, known as a digital watermark, into an image or video sequence. In this paper, we describe digital watermarking techniques, known as perceptually based watermarks, that are designed to exploit aspects of the the human visual system in order to provide a transparent (invisible), yet robust watermark. In the most general sense, any watermarking technique that attempts to incorporate an invisible mark into an image is perceptually based. However, in order to provide transparency and robustness to attack, two conflicting requirements from a signal processing perspective, more sophisticated use of perceptual information in the watermarking process is required. We describe watermarking techniques ranging from simple schemes which incorporate common-sense rules in using perceptual information in the watermarking process, to more elaborate schemes which adapt to local image characteristics based on more formal perceptual models. This review is not meant to be exhaustive; its aim is to provide the reader with an understanding of how the techniques have been evolving as the requirements and applications become better defined.

668 citations


"Information hiding in AVS compresse..." refers methods in this paper

  • ...The algorithms in [ 9 ] and [10] only embed the data in those coefficients with high visibility thresholds....

    [...]

Proceedings ArticleDOI
TL;DR: Digital image watermarking techniques known as perceptually watermarks that are designed to exploit aspects of the human visual system in order to produce a transparent, yet robust watermark are described.
Abstract: The growth of new imaging technologies has created a need for techniques that can be used for copyright protection of digital images. One approach for copyright protection is to introduce an invisible signal known as a digital watermark in the image. In this paper, we describe digital image watermarking techniques known as perceptually watermarks that are designed to exploit aspects of the human visual system in order to produce a transparent, yet robust watermark.

422 citations

Journal ArticleDOI
01 Jul 1999
TL;DR: In this paper, the contribution of watermarking for developing protection schemes is studied and the fundamental demands are listed, and necessary conditions for a reliable and efficient protection are stated, and particular solutions, based on product registration and related network services, are suggested to overcome such problems.
Abstract: The watermarking of digital images, audio, video, and multimedia products in general has been proposed for resolving copyright ownership and verifying originality of content. This paper studies the contribution of watermarking for developing protection schemes. A general watermarking framework (GWF) is studied and the fundamental demands are listed. The watermarking algorithms, namely watermark generation, embedding, and detection, are analyzed and necessary conditions for a reliable and efficient protection are stated. Although the GWF satisfies the majority of requirements for copyright protection and content verification, there are unsolved problems inside a pure watermarking framework. Particular solutions, based on product registration and related network services, are suggested to overcome such problems.

216 citations

01 Jan 1999
TL;DR: Although the GWF satisfies the majority of requirements for copyright protection and content verification, there are unsolved problems inside a pure watermarking framework and particular solutions are suggested to overcome such problems.
Abstract: The watermarking of digital images, audio, video, and multimedia products in general has been proposed for resolving copyright ownership and verifying originality of content. This paper studies the contribution of watermarking for developing protection schemes. A general watermarking framework (GWF) is studied and the fundamental demands are listed. The watermarking algorithms, namely watermark generation, embedding, and detection, are analyzed and necessary conditions for a reliable and efficient protection are stated. Although the GWF satisfies the majority of requirements for copyright protection and content verification, there are unsolved problems inside a pure watermarking framework. Particular solutions, based on product registration and related network services, are suggested to overcome such problems.

209 citations