CFP last date
22 April 2024
Reseach Article

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

by Lamri Laouamer, Abdelhamid Benhocine, Laurent Nana, Anca Pascu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 24
Year of Publication: 2012
Authors: Lamri Laouamer, Abdelhamid Benhocine, Laurent Nana, Anca Pascu
10.5120/7501-0353

Lamri Laouamer, Abdelhamid Benhocine, Laurent Nana, Anca Pascu . Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics. International Journal of Computer Applications. 47, 24 ( June 2012), 1-5. DOI=10.5120/7501-0353

@article{ 10.5120/7501-0353,
author = { Lamri Laouamer, Abdelhamid Benhocine, Laurent Nana, Anca Pascu },
title = { Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 24 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number24/7501-0353/ },
doi = { 10.5120/7501-0353 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:42:40.745155+05:30
%A Lamri Laouamer
%A Abdelhamid Benhocine
%A Laurent Nana
%A Anca Pascu
%T Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 24
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The images authentication transmitted through the communication networks must verify the proof of the originality and robustness against the hacker attacks. The existing techniques such as the cryptographic methods are not sufficient. An effectiveness and robust solution is proposed in this paper. This solution is based on the watermarking of the video and especially the Motion JPEG stream. We focused on one of the major properties of the JPEG image which is the quantization matrix. The watermarking is performed on this matrix. We detail the obtained results against several attacks.

References
  1. Bartolini, F. Tefas, A. Barni, M. Pitas, I, " Image authentication techniques for surveillance applications ", Proceedings of the IEEE, Vol. 89, Issue 10, October 2004.
  2. Rey, C. and Dugelay, J. L, "A survey of watermarking algorithms for image authentication", EURASIP Journal on Applied Signal Processing, June 2002, pp. 613– 621.
  3. Boult, T. E, "PICO: privacy through invertible cryptographic obscuration", Proceedings of the Computer Vision for Interactive and Intelligent Environment CVIIE'05, 2005.
  4. Lin, C. and Chang, S, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. On Circuits and Systems of Video Technology, vol. . 11, no. 2, February 2001, pp. 153–168.
  5. Sun, Q. B. , Chang, S. F. , Kurato, M. and Suto, M, "A new semi-fragile image authentication framework combining ECC and PKI infrastructure", ISCAS02, Phoenix, USA, May 2002.
  6. Kesavan Gopal, Madhavi Latha , "Watermarking of Digital Video Stream for Source Authentication", IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 1, July 2010.
  7. Julien Le Guen and Cédric Bernier, " Utilisation des wifibots", équipe MaIA, 2007.
  8. Che-Yen Wen and Kun-Ta Yang," Image authentication for digital image evidence", Forensic Science Journal, Vol 5, pages1-11, 2006.
  9. Thamodaran. K, Kuppusamy K, "A Noval Security Mechanism for Image Authentication and Copyright Protection", International Journal of Computer Applications, July 2010.
  10. Benhocine A, Laouamer L, Nana L et Pascu A, "A New Approach Against Color Attacks of Watermarked Images". Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), IEEE Computer Society. Harbin, Chine. pp. 969-972. Août 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Mjpeg Video Stream Quantization Matrix Watermarking Attacks.