Full metadata record
DC FieldValueLanguage
dc.contributor.authorHammami, Amal
dc.contributor.authorHamida, Amal Ben
dc.contributor.authorAmar, Chokri Ben
dc.contributor.authorNicolas, Henri
dc.contributor.editorSkala, Václav
dc.date.accessioned2020-07-24T07:12:47Z-
dc.date.available2020-07-24T07:12:47Z-
dc.date.issued2020
dc.identifier.citationJournal of WSCG. 2020, vol. 28, no. 1-2, p. 96-104.en
dc.identifier.issn1213-6972 (print)
dc.identifier.issn1213-6980 (CD-ROM)
dc.identifier.issn1213-6964 (on-line)
dc.identifier.urihttp://wscg.zcu.cz/WSCG2020/2020-J_WSCG-1-2.pdf
dc.identifier.urihttp://hdl.handle.net/11025/38430
dc.format9 s.cs
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.publisherVáclav Skala - UNION Agencycs
dc.relation.ispartofseriesJournal of WSCGen
dc.rights© Václav Skala - UNION Agencycs
dc.subjectautentizace videacs
dc.subjectčástečně křehké vodoznakycs
dc.subjectdiskrétní vlnková transformacecs
dc.subjectrozklad singulární hodnotycs
dc.titleRegions Based Semi-fragile Watermarking Schemeen
dc.typečlánekcs
dc.typearticleen
dc.rights.accessopenAccessen
dc.type.versionpublishedVersionen
dc.description.abstract-translatedIn this paper, we propose a new semi-fragile watermarking scheme in the frequency domain for surveillance videos authentication. Our system starts operating by generating a binary watermark based on a novel watermark construction process. This latter combines Speeded Up Robust Features (SURF) and Maximally Stable Extremal Regions (MSER) detectors to extract frames relevant features that can resist common attacks while being fragile to intentional manipulations. Furthermore, the watermark security is improved using torus automorphism mapping. For the embedding process, Regions of Interest (ROI) are detected and then used as watermark holders. These regions are decomposed into different frequency sub-bands using Singular Value Decomposition (SVD) as well as Discrete Wavelet Transform (DWT). Then, the watermark is embedded in selected bands following an additive method. A blind detection is conducted to extract the hidden signature from the watermarked video. Evaluation results show that the proposed scheme is suitable for authentication purpose since it efficiently discriminates malicious manipulations from non-malicious ones. Besides, it preserves a high level of perceptual quality.en
dc.subject.translatedvideo authenticationen
dc.subject.translatedsemi-fragile watermarkingen
dc.subject.translateddiscrete wavelet transformen
dc.subject.translatedsingular value decompositionen
dc.identifier.doihttps://doi.org/10.24132/JWSCG.2020.28.12
dc.type.statusPeer-revieweden
Appears in Collections:Volume 28, Number 1-2 (2020)

Files in This Item:
File Description SizeFormat 
Hammami.pdfPlný text1,38 MBAdobe PDFView/Open


Please use this identifier to cite or link to this item: http://hdl.handle.net/11025/38430

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.