Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 47 - Number 24
Year of Publication: 2012
Authors:
Lamri Laouamer
Abdelhamid Benhocine
Laurent Nana
Anca Pascu
10.5120/7501-0353

Lamri Laouamer, Abdelhamid Benhocine, Laurent Nana and Anca Pascu. Article: Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics. International Journal of Computer Applications 47(24):1-5, June 2012. Full text available. BibTeX

@article{key:article,
	author = {Lamri Laouamer and Abdelhamid Benhocine and Laurent Nana and Anca Pascu},
	title = {Article: Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {47},
	number = {24},
	pages = {1-5},
	month = {June},
	note = {Full text available}
}

Abstract

The images authentication transmitted through the communication networks must verify the proof of the originality and robustness against the hacker attacks. The existing techniques such as the cryptographic methods are not sufficient. An effectiveness and robust solution is proposed in this paper. This solution is based on the watermarking of the video and especially the Motion JPEG stream. We focused on one of the major properties of the JPEG image which is the quantization matrix. The watermarking is performed on this matrix. We detail the obtained results against several attacks.

References

  • Bartolini, F. Tefas, A. Barni, M. Pitas, I, " Image authentication techniques for surveillance applications ", Proceedings of the IEEE, Vol. 89, Issue 10, October 2004.
  • Rey, C. and Dugelay, J. L, "A survey of watermarking algorithms for image authentication", EURASIP Journal on Applied Signal Processing, June 2002, pp. 613– 621.
  • Boult, T. E, "PICO: privacy through invertible cryptographic obscuration", Proceedings of the Computer Vision for Interactive and Intelligent Environment CVIIE'05, 2005.
  • Lin, C. and Chang, S, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. On Circuits and Systems of Video Technology, vol. . 11, no. 2, February 2001, pp. 153–168.
  • Sun, Q. B. , Chang, S. F. , Kurato, M. and Suto, M, "A new semi-fragile image authentication framework combining ECC and PKI infrastructure", ISCAS02, Phoenix, USA, May 2002.
  • Kesavan Gopal, Madhavi Latha , "Watermarking of Digital Video Stream for Source Authentication", IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 1, July 2010.
  • Julien Le Guen and Cédric Bernier, " Utilisation des wifibots", équipe MaIA, 2007.
  • Che-Yen Wen and Kun-Ta Yang," Image authentication for digital image evidence", Forensic Science Journal, Vol 5, pages1-11, 2006.
  • Thamodaran. K, Kuppusamy K, "A Noval Security Mechanism for Image Authentication and Copyright Protection", International Journal of Computer Applications, July 2010.
  • Benhocine A, Laouamer L, Nana L et Pascu A, "A New Approach Against Color Attacks of Watermarked Images". Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), IEEE Computer Society. Harbin, Chine. pp. 969-972. Août 2008.