2. Media security by information hiding for videos, images, and audio

  • Metadata Hiding
  • Content Authentication
  • Copyright Protection



  • Metadata Hiding (Embedding Metadata in MPEG Video with Data hiding techniques)

      Recently, the retrieval and the summary of the multimedia contents using metadata are paid to attention. Because the pairs of the multimedia content and its metadata are needed for the retrieval and the summary, it is necessary to store the pairs to use them at any time. To achieve this, we propose to embed the metadata in the multimedia content with data hiding techniques (Figure 1).
      In our research, we adopt the MPEG video as the multimedia content and the metadata in the MPEG-7 format, and examine and consider the new embedding methods and the new services using our methods. Here, we present our proposed "embedding method robust to video editing" (Figure 2). With this method, we can extract the embedded metadata from the edited video created by cutting or uniting the scenes and shots. In this method, we create the metadata for each scene or shot from the original metadata and embed the created metadata in the corresponding scene or shot of the video.

    Figure 1 Figure 2

    ƒExample„

    original video DL embeded video DL   metadata(xml)

    list



    Content Authentication

      The tampering of the multimedia contents becomes a big problem by the development of the multimedia and the network technology. The tampering of the multimedia contents might be result in an fatal result, and the technique for detecting the tampering is hoped for. Thus, that the content is not tampered is called "integrity", and authenticating the integrity of the content is called content authentication. In this laboratory, we pay attention to the digital watermarking as a means to authenticate contents, and research.

    list



    Copyright Protection - Estimation of Recording Location

       The improvement of recording devices eased bootleg recording, that he or she records performance in a theater or in a hall. One of the solutions for this problem is to utilize digital watermarking techniques. Digital watermarking can embed the copyright information in contents. However, this solution is not sufficient for a restraint of bootleg recording since it is difficult to specify who did the piracy act from copyright information. In our laboratry, we conducted a research on estimating of recording location using audio watermarking which is included in recorded signal. This research is supported by THE HARA RESEARCH FUNDATION.


    list

    INTRODUCTION