Robust multiplicative video watermarking using statistical modeling

Document Type: ORIGINAL RESEARCH PAPER

Authors

Abstract

The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. The hidden message is inserted through multiplying/dividing these coefficients by a constant parameter which controls the power of the watermark. The watermark extraction relies on a maximum likelihood-based procedure, observing the distribution of the watermarked coefficients. The performance of the proposed scheme has been verified via simulations and found to be superior to some of the well-known existing video watermarking methods.

Keywords


[1] G. Döerr, “A Guide Tour of Video Watermarking,” Signal Processing: Image Communication, vol. 18, pp. 263-282, Apr. 2003.

[2] Y. Chen and H. Huang, “A New Shot-Based Video Watermarking,” in Computer Communication Control and Automation (3CA), International Symposium on, vol. 2, pp. 53-58, 2010.

[3] M. Belhaj, M. Mitrea, F. Preteux, and S. Duta, “MPEG-4 AVC robust video watermarking based on QIM and perceptual masking,” in Communications (COMM), 8th International Conference on, pp. 477-480,2010.

[4] D. Xu, R. Wang, and J. Wang, “Low complexity video watermarking algorithm by exploiting CAVLC in H. 264/AVC,” in Wireless Communications, Networking and Information Security (WCNIS), IEEE International Conference on, pp. 411-415, 2010.

[5] L. Zhang, Y. Zhu, and L. L.-M. Po, “A novel watermarking scheme with compensation in bit stream domain for H.264/AVC,” IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1758-1761, Mar. 2010.

[6] G. Langelaar, R. Lagendijk, and J. Biemond, “Real-Time Labeling of MPEG-2 Compressed Video,” Journal of Visual Communication and Image Representation, vol. 9, no. 4, pp. 256-270, 1998.

[7] S. K. Bavipati and X. Su, “Secure Compressed Domain Watermarking for H.264 Video,” Seventh International Conference on Information Technology: New Generations, pp. 387-391, Apr. 2010.

[8] S. N. Biswas, S. Nahar, S. R. Das, E. M. Petriu, M. H. Assaf, and V. Groza, “MPEG-2 digital video watermarking technique,” in IEEE International Instrumentation and Measurement Technology Conference Proceedings, pp. 225-229, IEEE, May 2012.

[9] R. Lancini, F. Mapelli, and S. Tubaro, “A Robust Video Watermarking Technique In the Spatial Domain,” in Video/Image Processing and Multimedia Communications 4th EURASIP-IEEE Region 8 International Symposium on VIProm-Com, no. June, pp. 251-256, 2002

[10] P. Chan and M. Lyu, “A DWT-based digital video watermarking scheme with error correcting code,” in Proceedings of Fifth International Conference on Information and Communications Security, pp. 202-213, Springer, 2003.

[11] F. Deguillaume, G. Csurka, J. O’Ruanaidh, and T. Pun, “Robust 3D DFT Video Watermarking,” in Proceedings of IS & T/SPIE Electronic Imaging, vol. 3657, pp. 113-124, 1999.

[12] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” in Computer Graphics and Image Processing, Proceedings of XIV Brazilian Symposium on, pp. 179-182, 2001.

[13] C. Kung, J. Jeng, Y. Lee, H. Hsiao, and W. Cheng, “Video watermarking using motion vector,” in Proc. of 16th IPPR Conference on computer vision, graphics and image processing, no. Cvgip, pp. 547-551, 2003.

[14] B. Barakli and C. Vural, “A new reversible video watermarking method-based on motion compensated interpolation,” in 20th Signal Processing and Communications Applications Conference (SIU), pp. 1-4, IEEE, Apr. 2012.

[15] B. Mobasseri, “Direct Sequence Watermarking of Digital Video Using M-Frames,” in Proceedings International Conference on Image Processing (ICIP-98), vol. 2, pp. 399-403, 1998.

[16] A. M. Kothari and V. V. Dwivedi, “Transform Domain Video Watermarking: Design, Implementation and Performance Analysis,” in International Conference on Communication Systems and Network Technologies, pp. 133-137, IEEE, May 2012.

[17] S. a. M. Al-Taweel and P. Sumari, “Robust Video Watermarking Based On 3D-DWT Domain,” in TENCON , IEEE Region 10 Conference, pp. 1-6, Nov. 2010.

[18] P. Campisi, “Video watermarking in the 3DDWT domain using perceptual masking,” in IEEE International Conference on Image Processing(ICIP), pp. 997-1000, 2005.

[19] R. Reyes, C. Cruz, M. Nakano-Miyatake, and H. Perez-Meana, “Digital Video Watermarking in DWT Domain Using Chaotic Mixtures,” Latin America Transactions, IEEE (Revista IEEE America Latina), vol. 8, no. 3, pp. 304-310, 2010.

[20] R. O. Preda, “Robust wavelet-based video watermarking scheme for copyright protection using the human visual system,” Journal of Electronic Imaging, vol. 20, p. 013022, Jan. 2011.

[21] M. Swanson and A. Tewfik, “Multi resolution Scene-Based Video Watermarking Using Perceptual Models,” IEEE Journal on Selected Areasin Communications, vol. 16, pp. 540-550, May 2002.

[22] J. Sun, N. Yang, J. Liu, X. Yang, X. Li, and L. Zhang, “Video watermarking scheme based on spatial relationship of DCT coefficients,” in Intelligent Control and Automation (WCICA), 8th World Congress on, pp. 56-59, 2010.

[23] E. E. Abdallah, A. Ben Hamza, and P. Bhattacharya, “Video watermarking using wavelet transform and tensor algebra,” Signal, Image and Video Processing, vol. 4, pp. 233-245, Apr. 2009.

[24] X. Guo-juan and W. Rang-ding, “A Blind Video Watermarking Algorithm Resisting to Rotation Attack,” International Conference on Computer and Communications Security, pp. 111-114, Dec. 2009.

[25] C.-X. Wang, X. Nie, X. Wan, W. B. Wan, and F. Chao, “A Blind Video Watermarking Scheme Based on DWT,” Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 1, pp. 434-437, Sept. 2009.

[26] R. C. Motwani, M. C. Motwani, B. D. Bryant, F. C. Harris Jr., and A. S. Agarwal, “Watermark Embedded Optimization for 3D Mesh Objects Using Classification Based Approach,” International Conference on Signal Acquisition and Processing, pp. 125-129, Feb. 2010.

[27] D. Pu, Y. Lu, and J. Dai, “Video watermarking approach based on temporal difference and discrete wavelet transform,” in Computer Science and Information Technology (ICCSIT), 3rd IEEE International Conference on, vol. 1, pp. 346-350, 2010.

[28] M. A. Akhaee, S. M. E. Sahraeian, B. Sankur, and F. Marvasti, “Robust Scaling-Based Image Watermarking Using Maximum- Likelihood Decoder With Optimum Strength Factor,” IEEE Transactions on Multimedia, vol. 11, pp. 822-833, Aug. 2009.

[29] I. I. Cox, J. Kilian, F. F. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking For Multimedia,” Image Processing, IEEE Transactions on, vol. 6, no. 12, pp. 1673-1687, 2002.

[30] M. Barni, F. Bartolini, A. D. Rosa, and A. Piva, “A new decoder for the optimum recovery of non-additive watermarks,” IEEE transactions on image processing, vol. 10, pp. 755-66, Jan. 2001.

[31] J. Wang, G. Liu, Y. Dai, J. Sun, Z. Wang, and S. Lian, “Locally optimum detection for Barni’s multiplicative watermarking in DWT domain,” Signal Processing, vol. 88, pp. 117-130, Jan. 2008.

[32] S. Vassilios and P. Ioannis, “Optimal Detector for Multiplicative Watermarks Embedded in the DFT Domain of Non-White Signals,” EURASIP Journal on Advances in Signal Processing, vol. 1900, no. 16, pp. 2522-2532, 2004.

[33] T. Ng and H. Garg, “Maximum Likelihood Detection in Image Watermarking Using Generalized Gamma Model,” in Conference Record of the Thirty-Ninth Asilomar Conference on Signals, Systems and Computers, no. 2, pp. 1680-1684, 2006.

[34] M. Akhaee, N. KhademiKalantari, and F. Marvasti, “Robust Audio and Speech Watermarking Using Gaussian and Laplacian Modeling,” Signal Processing, vol. 90, pp. 2487-2497, Aug. 2010.

[35] M. A. Akhaee, M. E. Sahraeian, and F. Marvasti, “Contourlet-based image watermarking using optimum detector in a noisy environment.,” IEEE transactions on image processing : (a publication of the IEEE Signal Processing Society), vol. 19, pp. 967-80, Apr. 2010.

[36] R. Narayanan, S. Ponnappan, and SE, “Effects of uncorrelated and correlated noise on image information content,” REMOTE SENSING, no. C, pp. 7031-7033, 2001.

[37] A. B. Watson, G. Y. Yang, J. a. Solomon, and J. Villasenor, “Visibility of Wavelet Quantization Noise,” Image Processing, IEEE Transactions on, vol. 6, pp. 1164-75, Aug. 2002.

[38] E. Lam, “Statistical modeling of the wavelet coefficients with different bases and decomposition levels,” in Vision, Image and Signal Processing, IEE Proceedings-, vol. 151, pp. 203-206, 2004.

[39] K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin, “Low Complexity Image Denoising Based On Statistical Modeling of Wavelet Coefficients,” Signal Processing Letters, IEEE, vol. 6, no. 12, pp. 300-303, 1999.

[40] A. Petrosian and F. Meyer, Wavelets in Signal and Image Analysis: From Theory to Practice. Computational Imaging and Vision, Springer,

2001.

[41] [Available], “http://www.irisa.fr/vista/actions/hollywood2.”

[42] S. Tai and S. Yang, “A fast method for image noise estimation using laplacian operator and adaptive edge detection,” in Communications, Control and Signal Processing, ISCCSP, 3rd International Symposium on, no. March, pp. 1077-1081, Mar. 2008.

[43] C. Liu, W. Freeman, R. Szeliski, and S. Kang, “Noise estimation from a single image,” in Computer Vision and Pattern Recognition, IEEE Computer Society Conference on, vol. 1, pp. 901-908, 2006.

[44] D. Donoho and J. Johnstone, “Ideal Spatial Adaptation By Wavelet Shrinkage,” Biometrika, vol. 81, no. 3, p. 425, 1994.

[45] R. K. Pearson, Exploring data in engineering, the sciences, and medicine. Oxford; New York: Oxford University Press, 2011.

[46] X. Gong and H. Lu, “Towards fast and robust watermarking scheme for H. 264 video,” in 10th IEEE International Symposium on Multimedia, pp. 649-653, Dec. 2008.

[47] L. Zhang, Y. Zhu, and L.-M. Po, “A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC,” in IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1758-1761, IEEE, 2010.

[48] X. Gong and H.-M. Lu, “Towards Fast and Robust Watermarking Scheme for H.264 Video,” in Tenth IEEE International Symposium on Multimedia, pp. 649-653, IEEE, Dec. 2008.

[49] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, pp. 283-301, May 1998.

[50] D. Xu, R. Wang, and J. Wang, “Video watermarking based on spatiotemporal JND profile,” Digital Watermarking, vol. 5450, pp. 327- 341,2009.

[51] M. Bahoura and H. Ezzaidi, “Real-time implementation of discrete wavelet transform on FPGA,” in IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, pp. 191 194, IEEE, Oct. 2010.

[52] R. Jiang and D. Crookes, “FPGA implementation of 3D discrete wavelet transform for real-time medical imaging,” in Circuit Theory and

Design, ECCTD. 18th European Conference on, pp. 519-522, 2007.