Robust Watermarking Techniques for Stereoscopic Video Protection Afef Chammem
Total Page:16
File Type:pdf, Size:1020Kb
Robust watermarking techniques for stereoscopic video protection Afef Chammem To cite this version: Afef Chammem. Robust watermarking techniques for stereoscopic video protection. Other [cs.OH]. Institut National des Télécommunications, 2013. English. NNT : 2013TELE0008. tel-00917964 HAL Id: tel-00917964 https://tel.archives-ouvertes.fr/tel-00917964 Submitted on 12 Dec 2013 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE DE DOCTORAT CONJOINT TELECOM SUDPARIS et L’UNIVERSITE PIERRE ET MARIE CURIE Spécialité : Informatique et Télécommunication Ecole doctorale : Informatique, Télécommunications et Electronique de Paris Méthodes de tatouage robuste pour la protection de l'imagerie numérique 3D Présentée par Afef Chammem Soutenu le 27 Mai 2013 à paris Devant le jury composé de : Prof. Touradj Ebrahimi Head of the MMSPG, EPFL Rapporteur Prof. Laurent Lucas Head of the SIC Group, URCA Rapporteur Prof. Patrick Gallinari Head of the LIP6, UPMC Président Dr. Frédéric Dufaux CNRS Research Director, TelecomParisTech Examinateur Prof. Faouzi Ghorbel Head of the CRISTAL Lab, ENSI Examinateur Head of the New Formats and New Coding Project, Mme. Maryline Clare Examinateur Orange Labs Prof. Françoise Preteux Deputy Scientific Director, Mines ParisTech Directeur de thèse HDR. Mihai Mitrea Associate Professor, Telecom SudParis Co-Directeur de thèse Thèse n°2013TELE0008 Table of Contents Table of Contents Abstract ...................................................................................................................................................... 1 Chapter 1 Context ................................................................................................................................... 5 1.1. Stereoscopic content .......................................................................................................................................... 7 1.1.1. Content proliferation .................................................................................................... 8 1.1.2. Device explosion ......................................................................................................... 14 1.1.3. Potential protection techniques .................................................................................. 17 1.2. Watermarking properties .............................................................................................................................. 18 1.2.1. Watermarking applicative panorama ......................................................................... 18 1.2.2. Main watermarking constraints ................................................................................. 20 1.2.3. From 2D to stereoscopic video watermarking ........................................................... 26 1.2.4. Theoretical framework for stereo watermarking ...................................................... 28 1.3. Thesis structure ................................................................................................................................................. 30 Chapter 2 Objectives ........................................................................................................................... 31 2.1. Disparity maps computation ........................................................................................................................ 33 2.1.1. Basic concepts ............................................................................................................. 33 2.1.2. Block matching disparity map computation in the literature .................................... 33 2.1.3. Conclusion ................................................................................................................... 38 2.2. Watermarking embedding techniques..................................................................................................... 38 2.2.1. Principles ..................................................................................................................... 38 2.2.2. State-of-the-art ............................................................................................................ 39 2.2.3. Discussion ................................................................................................................... 43 2.3. Conclusion and thesis objectives ................................................................................................................ 48 Chapter 3 A new insertion domain: 3D Video-New Three Step Search ............................ 51 3.1. Method presentation ....................................................................................................................................... 53 3.1.1. Principles ..................................................................................................................... 53 3.1.2. Pseudo-code and flowchart......................................................................................... 53 3.2. Experimental validation ................................................................................................................................. 58 3.2.1. Test bed ....................................................................................................................... 58 3.2.2. Horizontal and vertical displacements tendency ....................................................... 59 3.2.3. Visual investigation of the disparity maps.................................................................. 60 3.2.4. Reconstructed image quality assessment ................................................................... 62 3.2.5. Computational cost ..................................................................................................... 67 3.3. Discussion ............................................................................................................................................................ 70 3.4. Conclusion ............................................................................................................................................................ 70 i A.Chammem, Robust watermarking techniques for stereoscopic content protection Chapter 4 A reliable watermarking technique: Fast-IProtect ............................................. 71 4.1. IProtect: hybrid embedding technique .................................................................................................... 73 4.1.1. IProtect embedding scheme ....................................................................................... 73 4.1.2. IProtect detection ........................................................................................................ 78 4.2. Towards Fast-IProtect .................................................................................................................................... 78 4.2.1. Statistical models for watermarking attacks .............................................................. 80 4.2.2. Monte Carlo simulation for watermarking attacks ..................................................... 83 4.2.3. Experimental validation .............................................................................................. 86 4.3. Conclusion ............................................................................................................................................................ 87 Chapter 5 Stereoscopic watermarking benchmark ................................................................ 89 5.1. Embedding procedure .................................................................................................................................... 92 5.2. Embedding domains ........................................................................................................................................ 94 5.3. Transparency evaluation ............................................................................................................................... 96 5.3.1. Subjective protocol ..................................................................................................... 96 5.3.2. Objective assessment ................................................................................................ 104 5.4. Robustness evaluation .................................................................................................................................. 107 5.5. Computational cost ........................................................................................................................................ 110 5.5.1. Processing time ......................................................................................................... 110 5.5.2. Algorithmic complexity ............................................................................................. 110 5.6. Discussion .......................................................................................................................................................... 111 Chapter 6 Conclusion and future work .....................................................................................