STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Research on the Application of Digital Watermarking Technology in Video Data Traceability
DOI: https://doi.org/10.62517/jbdc.202301108
Author(s)
Xiaoming Fan*, Lei Song, Shuo Bao
Affiliation(s)
Beijing Police College, Beijing, China * Corresponding Author
Abstract
Artificial intelligence technology represented by “deep fake” provides convenience for criminals to forge identities and confuses the public, which has a great impact on the credibility of video data and great harm to society. As an information hiding technology, digital watermarking can embed specific information into the target data without affecting the quality of the data itself, which is an important means of data right confirmation and source tracking, and has important application value in video data traceability. This paper focuses on the application of digital watermark technology in video data traceability, empirically evaluates and analyzes the application effect of digital watermark technology in video data traceability, and puts forward corresponding improvement suggestions, which provides a new reference for the construction of network trusted video system.
Keywords
Video Data; Digital Watermark; Video Traceability
References
[1]Li Y, Wang H, Barni M. (2021) A survey of deep neural network watermarking techniques. Neurocomputing, 461: 171-193. [2]Wang Y F, Zhou Y M, Qian Z X. (2022) Review of robust video watermarking. Journal of Image and Graphics, 27 (01):27-42. [3]Xia D, Wang L, Song Y. (2023) Review of deep neural network model digital watermarking technology. Science Technology and Engineering, 23 (5): 1799-1811. [4]Herschel M, Diestelkämper R, Ben Lahmar H. (2017) A survey on provenance: What for? What form? What from?. The VLDB Journal, 26: 881-906. [5]Wang F, Zhao H. (2020) Research and practice progress on data traceability. Advances in Information Science, 13 (00): 313-353. [6]Chen S, Zhang L. (2022) Analysis of the development of digital copyright protection in the context of Metaverse. Media, 384 (19): 78-80. [7]Yang F, Shen S, Shen D. (2022) Method on multi-granularity data provenance for data fusion. Computer Sience, 49 (05): 120-128. [8]Chen B. (2019) Digital video source identification and forgery detection technology for safe cities. Xidian University. [9]Kaur H, Jindal N. (2020) Image and video forensics: A critical survey. Wireless Personal Communications, 112: 1281-1302. [10]Li Y. (2007) Data provenance’s annotation schema and description model. Data Analysis and Knowledge Discovery, 7: 10-13. [11]Deng Z, Wei Y. (2014) Study on the method of provenance in science workflow for data publishing. Library & Information, 3: 61-66. [12]Fan H. (2002) Tracing Data Lineage Using Automed Schema Transformation Pathways. Springer-Verlag, 2002: 50-53. [13]Ram S, Liu J. (2009) A New Perspective on Semantics of Data Provenance. SWPM, 2009. [14]Liu Q, Yang S, Liu J. (2020) A discrete wavelet transform and singular value decomposition-based digital video watermark method. Applied Mathematical Modelling, 85: 273-293. [15]Zhang Y, Chen K, Zhou G. (2021) Research progress of neural networks watermarking technology. Journal of Computer Research and Development, 58: 964-976. Li Y, Tondi B, Barni M. (2021) Spread-transform dither modulation watermarking of deep neural network. Journal of Information Security and Applications, 63: 103004.
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved