Skip to main content
Log in

Real-time feedback watermarking authentication scheme for streaming media

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, with the improvement of attack technology and computational capability, how to meet the security application of streaming media data has become a significant issue, especially for systems with a high standard of security. This paper presents a real-time authentication scheme for P2P streaming media transmission system, which can at least meet the application of identity authentication, tamper location, and error retransmission. We first tailor and employ off-the-shelf algorithms to propose two types of watermarking algorithms (the Feature Watermarker and the Identity Watermarker). Then, the sliding window is employed to group and provision the above two types of watermarks in the overall authentication scheme. Several metrics are employed to indicate our watermarking meets the application of invisibility and has a very low false alarm rate and missing alarm rate after computing and choosing viable thresholds. Moreover, we sketch an “Attack List” aiming at detecting and deal with malicious behaviors effectively, including two types of attacks which is irresistible for the common watermarking algorithms (Re-embedded attack and Destruction of watermark). The delay in transmission turns out to be acceptable by reasonably tailoring crucial parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4.
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Wu D et al (2001) Streaming video over the internet: approaches and directions. IEEE Transactions on circuits and systems for video technology 11(3):282–300

    Article  Google Scholar 

  2. Lin ET et al. (2001) "An overview of security issues in streaming video." Information Technology: Coding and Computing, 2001. Proceedings. International conference on. IEEE

  3. Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies[J]. ACM computing surveys (CSUR) 36(4):335–371

    Article  Google Scholar 

  4. Steinmetz, Ralf, and Klaus Wehrle, eds. Peer-to-peer systems and applications. Vol. 3485. Springer, 2005.

  5. Wallach DS (2003) "A survey of peer-to-peer security issues." Software Security—Theories and Systems. Springer, Berlin, Heidelberg, 42–57.

  6. Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Process Mag 17(5):20–46

    Article  Google Scholar 

  7. Ash LE et al. (2010) Real-time streaming media measurement system and method. U.S. Patent No. 7,647,418. 12 Jan.

  8. Farfoura ME, Horng S-J, Guo J-M, Al-Haj A (2016) Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed Tools Appl 75(13):7465–7493. https://doi.org/10.1007/s11042-015-2672-8

    Article  Google Scholar 

  9. Bhardwaj A, Verma VS, Jha RK (2018) Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed Tools Appl 77(15):19659–19678

    Article  Google Scholar 

  10. Joshi AM et al. (2017) "Combined DWT–DCT-based video watermarking algorithm using Arnold transform technique." Proceedings of the international conference on data engineering and communication technology. Springer, Singapore

  11. Ling H, Lu Z, Zou F (2004) "New real-time watermarking algorithm for compressed video in VLC domain." Image Processing, 2004. ICIP'04. 2004 international conference on. Vol. 4. IEEE

  12. Yoo GS, Kim H (2017) Real-time video watermarking techniques robust against re-encoding. J Real-Time Image Proc 13(3):467–477

    Article  Google Scholar 

  13. Abdi L, Abdallah FB, Meddeb A (2017) "Real-time Watermarking Algorithm of H. 264/AVC Video Stream." International Arab Journal of Information Technology (IAJIT)14.2

  14. Sowmya KN, Chennamma HR (2017) "video authentication using watermark and digital signature—a study." proceedings of the first international conference on computational intelligence and informatics. Springer, Singapore

  15. Xu D, Wang R, Wang J (2011) A novel watermarking scheme for H. 264/AVC video authentication. Signal Process Image Commun 26(6):267–279

    Article  Google Scholar 

  16. Li Y (2015) Realizaton of real-time streaming media digital watermarking system and its performance evaluation[J]. Modern electronic technology 38(15):45–49

    Google Scholar 

  17. Cheng C et al. (2012) "A real-time video watermarking algorithm for streaming media." International Journal of Digital Content Technology and its Applications 6.14

  18. Patel S, Katharotiya A, Goyani M (2011) A survey on digital video watermarking. International Journal Comp Tech Appl 2(6):3015–3018

    Google Scholar 

  19. Queluz MP (2001) Authentication of digital images and video: generic models and a new contribution. Signal Process Image Commun 16(5):461–475

    Article  Google Scholar 

  20. Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT) 2(9):165–175

    Google Scholar 

  21. Meerwald, Peter, and Andreas Uhl (2001) "Watermark security via wavelet filter parametrization." Image Processing, 2001. Proceedings. 2001 international conference on. Vol. 3. IEEE

  22. Dietl W, Uhl A (2003) "Watermark security via secret wavelet packet subband structures." IFIP International Conference on Communications and Multimedia Security. Springer, Berlin, Heidelberg

  23. Liu Z et al (2017) A security watermark scheme used for digital speech forensics. Multimedia Tools and Applications 76.7:9297–9317

    Article  Google Scholar 

  24. Bhawna P, Shrivastava V, Pandey A (2018) Hybrid algorithm for enhanced watermark security with robust detection. International Journal on Recent and Innovation Trends in Computing and Communication 6(6):245–249

    Google Scholar 

  25. Wang Y, Weizhang D (2013) Security analysis and improvement of certificateless signature scheme without bilinear pairing [J]. Computer applications 33(08):2250–2252

    Article  Google Scholar 

  26. Jian-Jing F, De-Ren C (2018) Watermarking algorithm of toleration the second compression for video content authentication. J Comput Sci 41(03):558–573

    Google Scholar 

  27. Zhou W, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Key Research and Development Program of China (2017YFB0102500), Natural Science Foundation of Jilin province (20170101133JC), the Korea Foundation for Advanced Studies’ International Scholar Exchange Fellowship for the academic year of 2017-2018, and Jilin University (5157050847, 2017XYB252).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jindong Zhang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, D., Zhang, J., Liu, Y. et al. Real-time feedback watermarking authentication scheme for streaming media. Multimed Tools Appl 79, 12699–12725 (2020). https://doi.org/10.1007/s11042-020-08646-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08646-7

Keywords

Navigation