Full metadata record
DC poleHodnotaJazyk
dc.contributor.authorHammami, Amal
dc.contributor.authorHamida, Amal Ben
dc.contributor.authorAmar, Chokri Ben
dc.contributor.authorNicolas, Henri
dc.contributor.editorSkala, Václav
dc.date.accessioned2020-07-24T07:12:47Z-
dc.date.available2020-07-24T07:12:47Z-
dc.date.issued2020
dc.identifier.citationJournal of WSCG. 2020, vol. 28, no. 1-2, p. 96-104.en
dc.identifier.issn1213-6972 (print)
dc.identifier.issn1213-6980 (CD-ROM)
dc.identifier.issn1213-6964 (on-line)
dc.identifier.urihttp://wscg.zcu.cz/WSCG2020/2020-J_WSCG-1-2.pdf
dc.identifier.urihttp://hdl.handle.net/11025/38430
dc.format9 s.cs
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.publisherVáclav Skala - UNION Agencycs
dc.relation.ispartofseriesJournal of WSCGen
dc.rights© Václav Skala - UNION Agencycs
dc.subjectautentizace videacs
dc.subjectčástečně křehké vodoznakycs
dc.subjectdiskrétní vlnková transformacecs
dc.subjectrozklad singulární hodnotycs
dc.titleRegions Based Semi-fragile Watermarking Schemeen
dc.typečlánekcs
dc.typearticleen
dc.rights.accessopenAccessen
dc.type.versionpublishedVersionen
dc.description.abstract-translatedIn this paper, we propose a new semi-fragile watermarking scheme in the frequency domain for surveillance videos authentication. Our system starts operating by generating a binary watermark based on a novel watermark construction process. This latter combines Speeded Up Robust Features (SURF) and Maximally Stable Extremal Regions (MSER) detectors to extract frames relevant features that can resist common attacks while being fragile to intentional manipulations. Furthermore, the watermark security is improved using torus automorphism mapping. For the embedding process, Regions of Interest (ROI) are detected and then used as watermark holders. These regions are decomposed into different frequency sub-bands using Singular Value Decomposition (SVD) as well as Discrete Wavelet Transform (DWT). Then, the watermark is embedded in selected bands following an additive method. A blind detection is conducted to extract the hidden signature from the watermarked video. Evaluation results show that the proposed scheme is suitable for authentication purpose since it efficiently discriminates malicious manipulations from non-malicious ones. Besides, it preserves a high level of perceptual quality.en
dc.subject.translatedvideo authenticationen
dc.subject.translatedsemi-fragile watermarkingen
dc.subject.translateddiscrete wavelet transformen
dc.subject.translatedsingular value decompositionen
dc.identifier.doihttps://doi.org/10.24132/JWSCG.2020.28.12
dc.type.statusPeer-revieweden
Vyskytuje se v kolekcích:Volume 28, Number 1-2 (2020)

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
Hammami.pdfPlný text1,38 MBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/38430

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.