Abstract
Recently, with the improvement of attack technology and computational capability, how to meet the security application of streaming media data has become a significant issue, especially for systems with a high standard of security. This paper presents a real-time authentication scheme for P2P streaming media transmission system, which can at least meet the application of identity authentication, tamper location, and error retransmission. We first tailor and employ off-the-shelf algorithms to propose two types of watermarking algorithms (the Feature Watermarker and the Identity Watermarker). Then, the sliding window is employed to group and provision the above two types of watermarks in the overall authentication scheme. Several metrics are employed to indicate our watermarking meets the application of invisibility and has a very low false alarm rate and missing alarm rate after computing and choosing viable thresholds. Moreover, we sketch an “Attack List” aiming at detecting and deal with malicious behaviors effectively, including two types of attacks which is irresistible for the common watermarking algorithms (Re-embedded attack and Destruction of watermark). The delay in transmission turns out to be acceptable by reasonably tailoring crucial parameters.
Similar content being viewed by others
References
Wu D et al (2001) Streaming video over the internet: approaches and directions. IEEE Transactions on circuits and systems for video technology 11(3):282–300
Lin ET et al. (2001) "An overview of security issues in streaming video." Information Technology: Coding and Computing, 2001. Proceedings. International conference on. IEEE
Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies[J]. ACM computing surveys (CSUR) 36(4):335–371
Steinmetz, Ralf, and Klaus Wehrle, eds. Peer-to-peer systems and applications. Vol. 3485. Springer, 2005.
Wallach DS (2003) "A survey of peer-to-peer security issues." Software Security—Theories and Systems. Springer, Berlin, Heidelberg, 42–57.
Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Process Mag 17(5):20–46
Ash LE et al. (2010) Real-time streaming media measurement system and method. U.S. Patent No. 7,647,418. 12 Jan.
Farfoura ME, Horng S-J, Guo J-M, Al-Haj A (2016) Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed Tools Appl 75(13):7465–7493. https://doi.org/10.1007/s11042-015-2672-8
Bhardwaj A, Verma VS, Jha RK (2018) Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed Tools Appl 77(15):19659–19678
Joshi AM et al. (2017) "Combined DWT–DCT-based video watermarking algorithm using Arnold transform technique." Proceedings of the international conference on data engineering and communication technology. Springer, Singapore
Ling H, Lu Z, Zou F (2004) "New real-time watermarking algorithm for compressed video in VLC domain." Image Processing, 2004. ICIP'04. 2004 international conference on. Vol. 4. IEEE
Yoo GS, Kim H (2017) Real-time video watermarking techniques robust against re-encoding. J Real-Time Image Proc 13(3):467–477
Abdi L, Abdallah FB, Meddeb A (2017) "Real-time Watermarking Algorithm of H. 264/AVC Video Stream." International Arab Journal of Information Technology (IAJIT)14.2
Sowmya KN, Chennamma HR (2017) "video authentication using watermark and digital signature—a study." proceedings of the first international conference on computational intelligence and informatics. Springer, Singapore
Xu D, Wang R, Wang J (2011) A novel watermarking scheme for H. 264/AVC video authentication. Signal Process Image Commun 26(6):267–279
Li Y (2015) Realizaton of real-time streaming media digital watermarking system and its performance evaluation[J]. Modern electronic technology 38(15):45–49
Cheng C et al. (2012) "A real-time video watermarking algorithm for streaming media." International Journal of Digital Content Technology and its Applications 6.14
Patel S, Katharotiya A, Goyani M (2011) A survey on digital video watermarking. International Journal Comp Tech Appl 2(6):3015–3018
Queluz MP (2001) Authentication of digital images and video: generic models and a new contribution. Signal Process Image Commun 16(5):461–475
Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT) 2(9):165–175
Meerwald, Peter, and Andreas Uhl (2001) "Watermark security via wavelet filter parametrization." Image Processing, 2001. Proceedings. 2001 international conference on. Vol. 3. IEEE
Dietl W, Uhl A (2003) "Watermark security via secret wavelet packet subband structures." IFIP International Conference on Communications and Multimedia Security. Springer, Berlin, Heidelberg
Liu Z et al (2017) A security watermark scheme used for digital speech forensics. Multimedia Tools and Applications 76.7:9297–9317
Bhawna P, Shrivastava V, Pandey A (2018) Hybrid algorithm for enhanced watermark security with robust detection. International Journal on Recent and Innovation Trends in Computing and Communication 6(6):245–249
Wang Y, Weizhang D (2013) Security analysis and improvement of certificateless signature scheme without bilinear pairing [J]. Computer applications 33(08):2250–2252
Jian-Jing F, De-Ren C (2018) Watermarking algorithm of toleration the second compression for video content authentication. J Comput Sci 41(03):558–573
Zhou W, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Acknowledgments
This work is supported in part by the National Key Research and Development Program of China (2017YFB0102500), Natural Science Foundation of Jilin province (20170101133JC), the Korea Foundation for Advanced Studies’ International Scholar Exchange Fellowship for the academic year of 2017-2018, and Jilin University (5157050847, 2017XYB252).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Han, D., Zhang, J., Liu, Y. et al. Real-time feedback watermarking authentication scheme for streaming media. Multimed Tools Appl 79, 12699–12725 (2020). https://doi.org/10.1007/s11042-020-08646-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08646-7