Skip to main content

Highly Secured Multilayered Motion Vector Watermarking

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 488))

Abstract

With the recent development in multimedia, video has become a powerful medium of information. To exploit the temporal redundancy during video compression, motion vector estimation is required. Now-a-days internet and digital media has become very popular, which made data authentication and data security a challenging task. Digital watermarking was introduced to provide data authentication. Though, it was not enough to prevent the unauthorized access of data by third parties. To prevent unauthorized access, data is encrypted using a secret key known only to the user. This process is known as cryptography. In this paper, an algorithm has been proposed to embed the watermark inside calculated motion vector. The position of watermark bit inside the motion vector will depend on a key provided by user. The correlation values between the four original and recovered experimental video frames are 0.97, 0.98, 0.98 and 0.91 respectively whereas structural similarity index metric (SSIM) between them are 0.97, 0.87, 0.90 and 0.68, respectively. The high correlation values and SSIM shows the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dey, N., Acharjee, S., Biswas, D., Das, A., Chaudhuri, S.S.: Medical Information Embedding in Compressed Watermarked Intravascular Ultrasound Video. Scientific Bulletin of the Politehnica University of Timisoara - Transactions on Electronics and Communications 57(71), 1–7 (2012)

    Google Scholar 

  2. Dey, N., Mukhopadhyay, S., Das, A., Chaudhuri, S.S.: Using DWT analysis of P, QRS and T Components and Cardiac Output Modified by Blind Watermarking Technique within the Electrocardiogram Signal for Authentication in the Wireless Telecardiology. I. J. Image, Graphics and Signal Processing 4(7), 33–46 (2012)

    Article  Google Scholar 

  3. Dey, N., Roy, A.B., Das, A., Chaudhuri, S.S.: Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 347–357. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. ChakrabortyS., M.P., Pal, A.K., Biswas, D., Dey, N.: Reversible color image watermarking using trigonometric functions. In: International Conference on Electronic Systems, Signal Processing and Computing Technologies, pp. 105–110 (2014)

    Google Scholar 

  5. Dey, N., Das, P., Das, A., Chaudhuri, S.S.: DWT-DCT-SVD based intravascular ultrasound video watermarking. In: Second World Congress on Information and Communication Technologies, pp. 224–229 (2012)

    Google Scholar 

  6. Dey, N., Das, P., Das, A., Chaudhuri, S.S.: DWT-DCT-SVD Based Blind Watermarking Technique of Gray Scale Image in Electrooculogram Signal. In: International Conference on Intelligent Systems Design and Applications, pp. 680–685 (2012)

    Google Scholar 

  7. Tirkel, A.Z., Rankin, G.A., Schyndel, R.M.V., Ho, W.J., Mee, N.R.A., Osborne, C.F.: Electronic Water Mark, DICTA 1993, pp. 666–673. Macquarie University (1993)

    Google Scholar 

  8. Johnson, N.F.: An Introduction to Watermark Recovery from Images. In: Proceedings of the SANS Intrusion Detection and Response, pp. 9–13 (1999)

    Google Scholar 

  9. Matheson, L.R., Mitchell, S.G., Tarjan, R.E., Zane, F., Shamoon, T.G.: Robustness and Security of Digital Watermarks. IEEE Transactions on Image Processing 10(10), 227–240 (2001)

    Google Scholar 

  10. Lu, C.S., Liao, H.Y.M.: Multipurpose Watermarking for Image Authentication and Protection. IEEE Transactions on Image Processing 10(10), 1579–1592 (2001)

    Article  MATH  Google Scholar 

  11. Kumari, G.S.N., Kumar, B.V., Sumalatha, L., Krishna, V.V.: Secure and Robust Digital Watermarking on Grey Level Images. International Journal of Advanced Science and Technology 11, 1–8 (2009)

    Google Scholar 

  12. Maity, S.P., Kundu, M.K.: Robust and Blind Spatial Watermarking in Digital Image. In: Proc. 3rd Indian Conf. on Computer Vision, Graphics and Image Processing, pp. 388–393 (2002)

    Google Scholar 

  13. Dey, N., Maji, P., Das, P., Das, A., Chaudhuri, S.S.: An Edge Based Watermarking Technique of Medical Images without Devalorizing Diagnostic Parameters. In: International Conference on Advances in technology and Engineering, pp. 1–5 (2013)

    Google Scholar 

  14. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  15. Omura, J.: Novel applications of cryptography in digital communications. IEEE Communications Magazine 28(5), 21–29 (1990)

    Article  Google Scholar 

  16. Gabidulin, E.M., Ourivski, A.V., Honary, B., Ammar, B.: Reducible rank codes and their applications to cryptography. IEEE Transactions on Information Theory 49(12), 3289–3293 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  17. Kaps, J.P., Arlington, V.A., Gaubatz, G., Sunar, B.: Cryptography on a Speck of Dust. Computer 40(2), 38–44 (2007)

    Article  Google Scholar 

  18. Acharjee, S.: Motion Vector Estimation for Video Compression, MTechdiss (2013), https://dspace.jdvu.ac.in/handle/123456789/27771

  19. Netravali, A.N., Robbins, J.D.: Motion compensated television coding-part1. Bell Syst. Tech. J. 58, 631–670 (1979)

    Article  MATH  Google Scholar 

  20. Bergmann, H.C.: Displacement estimation based on the correlation of image segments. In: International Conference on Image Processing, pp. 215–219 (1982)

    Google Scholar 

  21. Zeng, X., Zhenyong, C., Ming, C., Zhang, X.: Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion. J. Inf. Sci. Eng. 27(2), 465–479 (2009)

    Google Scholar 

  22. http://www.cipr.rpi.edu/resource/sequences/sequences/sif/yuv/sif_yuv_tennis.tgz

  23. http://www.cipr.rpi.edu/sequences/sif/yuv/sif_yuv_foreman.tgz

  24. http://www.cipr.rpi.edu/resource/sequences/

  25. Chu, T.C., Ranson, W.F., Sutton, M.A.: Applications of digital-image-correlation techniques. Experimental Mechanics 25(3), 232–244 (1985)

    Article  Google Scholar 

  26. Choi, S.S., Cha, S.H., Tappert, C.: A survey of binary similarity and distance measures. Journal of Systemics, Cybernetics and Informatics 8(1), 43–48 (2010)

    Google Scholar 

  27. Eldar, Y.C., Nehorai, A.: Mean-Squared Error Beamforming for Signal Estimation: A Competitive Approach. In: Robust Adaptive Beamforming, pp. 5143–5154 (2005)

    Google Scholar 

  28. Tian, J.: Wavelet based reversible Watermarking for authentication. In: Security and Watermarking of Multimedia Contents, vol. 4675, pp. 667–671 (2002)

    Google Scholar 

  29. Weng, S., Zhao, Y., Pan, J.S., Ni, R.: Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs. IEEE Signal Processing Letters 15, 721–724 (2008)

    Article  Google Scholar 

  30. Wu, H.T., Cheung, Y.M.: Reversible Watermarking by Modulation and Security Enhancement. IEEE Transactions on Instrumentation and Measurement 59(1), 221–228 (2010)

    Article  Google Scholar 

  31. Acharjee, S., Chaudhuri, S.S.: A new fast motion vector estimation algorithm for video compression. In: International Conference on Informatics, Electronics & Vision (ICIEV), pp. 1216–1219 (2012)

    Google Scholar 

  32. Acharjee, S., Dey, N., Biswas, D., Das, P., Chaudhuri, S.S.: A novel Block Matching Algorithmic Approach with smaller block size for motion vector estimation in video compression. In: 12th International Conference on Intelligent Systems Design and Applications, pp. 668–672 (2012)

    Google Scholar 

  33. Acharjee, S., Dey, N., Biswas, D., Das, P., Chaudhuri, S.S.: A novel Block Matching Algorithmic Approach with smaller block size for motion vector estimation in video compression. In: 12th International Conference on Intelligent Systems Design and Applications, pp. 668–672 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Acharjee, S., Chakraborty, S., Samanta, S., Azar, A.T., Hassanien, A.E., Dey, N. (2014). Highly Secured Multilayered Motion Vector Watermarking. In: Hassanien, A.E., Tolba, M.F., Taher Azar, A. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2014. Communications in Computer and Information Science, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-13461-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13461-1_13

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13460-4

  • Online ISBN: 978-3-319-13461-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics