Skip to main content

NPT Based Video Watermarking with Non-overlapping Block Matching

  • Chapter
Transactions on Computational Science XI

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 6480))

Abstract

The paper presents a naturalness preserving transform (NPT) based collusion and compression resistant watermarking technique for video. An image that is statistically similar to a video frame is chosen as the watermark and this image is embedded independently in consecutive frames of the video. To enhance the resistance to inter frame collusion based attacks, a non-overlapping block matching is used to determine the region for placing the watermark in consecutive frames. Only a trace of the watermark image is embedded which enhances the robustness of the watermark to different attacks. When a frame and the image become substantially different, another image is chosen as the watermark. The size of the watermark determines the quality of the watermarked video frames. Watermark extraction is blind and requires only the region where the watermark was originally placed. The reconstruction process is iterative and bestows immunity the watermark against noise and lossy compression. Analysis indicates that the watermark is sufficiently immune to second order inter-frame statistical attacks and is quite robust to image level compression. Experimental results confirm these theoretical findings and demonstrate the resistance of the technique to temporal frame averaging, additive noise and JPEG based compression. However, the technique is limited by the fact that the original video sequence (frames) is required for reconstruction based recovery of the watermark from the watermarked video sequence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koz, A., Cigla, C., Alatan, A.A.: Watermarking of Free-view Video. IEEE Transactions on Image Processing 19(7), 1785–1797 (2010)

    Article  Google Scholar 

  2. Doerr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, part 2 52(10), 2955–2964 (2004)

    Article  Google Scholar 

  3. Barni, M., Bartolini, F., Caldelli, R., De Rosa, A., Piva, A.: A robust watermarking approach for raw video. In: Proceedings of the 10th International Packet Video Workshop (2000)

    Google Scholar 

  4. Hartung, F., Girod, B.: Watermarking of Uncompressed and Compressed Video. Signal Processing 66(3), 283–301 (1998)

    Article  MATH  Google Scholar 

  5. Langelaar, G., Lagendijk, R.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing 10(1), 148–158 (2001)

    Article  MATH  Google Scholar 

  6. Lu, C.-S., Chen, J.-R., Liao, H.-Y.M., Fan, K.-C.: Realtime MPEG-2 video watermarking in the VLC domain. In: Proceedings 16th International Conference on Pattern Recognition, vol. 2, pp. 552–555 (2002)

    Google Scholar 

  7. Langelaar Gerrit, C., Lagendijk Reginald, L.: Real-time Labeling of MPEG-2 Compressed Video. J. Visual Communications and Image Representation 9(4), 256–270 (1998)

    Article  Google Scholar 

  8. Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A video watermarking system for broadcast monitoring. In: Proceeding of SPIE- Security Watermarking Multimedia Contents, vol. 3657, pp. 103–112 (1999)

    Google Scholar 

  9. Fridich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceeding Conference Information Technology: Coding and Computing, pp. 178–183 (2000)

    Google Scholar 

  10. Petitcolas, F., Anderson, R.: Evaluation of Copyright Marking Systems. In: Proceedings IEEE multimedia Systems (ICMCS 1999), Florence, Italy, June 7-11 (1999)

    Google Scholar 

  11. Solachidis, V., Pitas, I.: Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transaction Image Processing 10, 1741–1753 (2001)

    Article  MATH  Google Scholar 

  12. Duan, F., King, I., Xu, L., Chan, L.: Intra-block algorithm for digital watermarking. In: Proceedings IEEE 14th International Conference on Pattern Recognition (ICPR 1998), vol. 2, pp. 1589–1591 (1998)

    Google Scholar 

  13. Reyes, R., Cruz, C., Nakano-Miyatake, M., Pérez-Meana, H.: Digital Video Watermarking in DWT Domain Using Chaotic Mixtures. IEEE Latin America Transactions 8, 304–310 (2010)

    Article  Google Scholar 

  14. Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing 9(6), 1123–1129 (2000)

    Article  Google Scholar 

  15. Swanson, M., Zhu, B., Tewfik, A.: Multiresolution Video Watermarking using Perceptual Models and Scene Segmentation. In: Proceedings International Conference on Image Processing (ICIP 1997), Washington, DC, vol. 2, pp. 551–568 (1997)

    Google Scholar 

  16. Chan, P.W., Lyu, M.: A DWT-based Digital Video Watermarking Scheme with Error Correcting Code. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 202–213. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Voloshynovskiy, S., Periera, S., Pun, T., Eggers, J., Su, J.: Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarking. IEEE Communication Magazine 39, 118–126 (2001)

    Article  Google Scholar 

  18. Pireira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Transaction on Image Processing 9, 1123–1129 (2000)

    Article  Google Scholar 

  19. Holliman, M., Macy, W., Yeung, M.: Robust frame-dependent video watermarking. In: Proceedings of the SPIE Security and Watermarking of Multimedia Contents, San Jose, January 24-26, vol. 3971, pp. 186–197 (2000)

    Google Scholar 

  20. Verma, S., Chandra, R., Tomar, G.S., Kim, J.: Video watermark embedding in the compressed domain. In: IET International Conference on Visual Information Engineering, VIE 2006, pp. 53–57 (2006)

    Google Scholar 

  21. Kalker, T., Depovere, G., Haitsma, J., Maes, M.: A video watermarking system for broadcast monitoring. In: Proceeding of SPIE, vol. 3657, pp. 103–112 (1999)

    Google Scholar 

  22. Mobasseri, B.G.: Exploring CDMA for watermarking of digital video. In: Proceeding of SPIE, vol. 3657, pp. 96–102 (1999)

    Google Scholar 

  23. Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution Scene-Based Video Watermarking Using Perceptual Models. IEEE Journal on Selected Areas in Communications 16(4), 540–550 (1998)

    Article  Google Scholar 

  24. Darmstaedtev, V., Delaigle, J.F., Nicholson, D., Macq, B.: A block based watermarking technique for MPEG-2 Signals: Optimization and validation on real TV distribution links. In: Proceeding of European Guf Multimedia Applications, Services and Techniques EC MAST, Berlm, Germany (1998)

    Google Scholar 

  25. Fridrich, J.: Robust bit extraction from images. In: Proceeding of IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540 (1999)

    Google Scholar 

  26. Fridrich, J.: Visual hash for oblivious watermarking. In: Proceeding of SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 286–294 (2000)

    Google Scholar 

  27. Kundur, D., Hatzinakos, D.: Attack characterization for effective watermarking. In: Proceeding IEEE International Conference on Image Processing, vol. 4, pp. 240–244 (1999)

    Google Scholar 

  28. Fei, C., Kundur, D., Kwong, R.: Analysis and Design of Secure Watermark-based Authentication Systems. IEEE Transactions on Information Forensics and Security 1(1), 43–55 (2006)

    Article  Google Scholar 

  29. Su, K., Kundur, D., Hatzinakos, D.: Spatially Localized Image-Dependent Watermarking for Statistical Invisibility and Collusion Resistance. IEEE Transaction on Multimedia 7(1), 52–66 (2005)

    Article  Google Scholar 

  30. Zhang, J., Li, J., Zhang, L.: Video watermark technique in Motion Vector. In: Proceeding of IEEE 14th Brazilian Symposium on Computer Graphics and Image Processing, Brazil, pp. 535–540 (2001)

    Google Scholar 

  31. Biswas, S., Das, S.R., Petriu, E.M.: An adaptive compressed. MPEG-2 video watermarking scheme. IEEE Transactions on. Instrumentation and Measurement 54(5), 1853–1861 (2005)

    Article  Google Scholar 

  32. Mobasseri, B.G., Berger, R.J.: A foundation for watermarking in compressed domain. IEEE Signal Processing Letters 12(5), 399–402 (2005)

    Article  Google Scholar 

  33. Ahmed, A.M., Day, D.D.: Applications of the naturalness preserving transform to image watermarking and data hiding. Digital Signal Processing 14, 531–549 (2004)

    Article  Google Scholar 

  34. Kundur Fei, D., Kwong, R.: Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression. IEEE Transactions on Image Processing 13(2), 126–144 (2004)

    Article  Google Scholar 

  35. Smith, J.R., Camiskey, B.O.: Modulation and information hiding in images. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 207–226. Springer, Heidelberg (1996)

    Google Scholar 

  36. Su, K., Kundur, D., Hatzinakos, D.: Statistical invisibility for collusion-resistant digital video watermarking. IEEE Transaction on Multimedia 7(1), 52–60 (2005)

    Article  Google Scholar 

  37. Ji-Hua, G., Shang, Y., Bei-jing, H.: An NPT Watermarking Algorithm Using Wavelet Image Combination. In: Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI), pp. 378–438 (2010)

    Google Scholar 

  38. Biyari, K.H., Lindsey, W.C.: Statistical distribution of hermitian quadratic forms in complex Gaussian variables. IEEE Trans. Inform. Theory 39(3), 1076–1082 (1993)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bedi, S.S., Verma, S., Tomar, G.S. (2010). NPT Based Video Watermarking with Non-overlapping Block Matching. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science XI. Lecture Notes in Computer Science, vol 6480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17697-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17697-5_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17696-8

  • Online ISBN: 978-3-642-17697-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics