Skip to main content
Log in

Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

In this paper, a blind semi-fragile dual watermarking system for video content authentication and tampering localization is proposed. In this method, two watermarks are tailored for each host video frame. Indeed, the frame index is firstly binary modulated and then, serves as a primary watermark. Subsequently, a second content-based authentication watermark is built up using frame blocks texture features. To improve the security aspect, Torus automorphism mapping is applied under the second watermark before being embedded. The suggested scheme operates in the hybrid domain. In fact, the primary watermark is infused in the host frame following a spatial domain-based embedding technique. However, a frequency domain-based watermarking method, which combines Lifting Wavelet Transform (LWT) and Singular Value Decomposition (SVD), is involved to hide the second watermark. Herein, the most textured blocks are chosen as second watermark holders to enhance the watermarked video perceptual quality. During the detection process, the dissimilarity between the second extracted watermark and its reconstructed version as well as the mismatch between the observed index and the extracted one enable to reveal spatial and temporal tampering, respectively. Experimental results show that the proposed scheme achieves a good visual quality with a large embedding capacity. Furthermore, it can efficiently withstand non-malicious processing while being fragile to frames manipulations and content modification attacks. Moreover, it ensures an accurate tampered areas localization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Availability of Data and Materials

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. N.A. Abbas, Image encryption based on independent component analysis and Arnold’s Cat Map. Egypt Inform. J. 17(1), 139–146 (2015). https://doi.org/10.1016/j.eij.2015.10.001

    Article  Google Scholar 

  2. N.T.B. Abdulla, K.A. Navas, Robust video watermarking resilient to inadvertent attacks, in International Conference on Power Electronics and Renewable Energy Applications (PEREA), pp. 1–5 (2020). https://doi.org/10.1109/PEREA51218.2020.9339797

  3. F. Arab, M. Zamani, VW16E: a robust video watermarking technique using simulated blocks. Intell. Syst. Ref. Libr. 115, 193–221 (2017). https://doi.org/10.1007/978-3-319-44270-9_9

    Article  Google Scholar 

  4. M. Asikuzzaman, M.R. Pickering, An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. 28(9), 2131–2153 (2018). https://doi.org/10.1109/TCSVT.2017.2712162

    Article  Google Scholar 

  5. S. Belilita, N. Amardjia, T. Bekkouche, I. Nouioua, Combining SVD-DCT image watermarking scheme based on Perona-Malik diffusion. Elektron. Elektrotechn. 25(4), 68–74 (2019). https://doi.org/10.5755/j01.eie.25.4.23973

    Article  Google Scholar 

  6. A. Bhardwaj, V.S. Verma, R.K. Jha, Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed. Tools Appl. 77(15), 19659–19678 (2018). https://doi.org/10.1007/s11042-017-5340-3

    Article  Google Scholar 

  7. B. Chen, G.W. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001). https://doi.org/10.1109/18.923725

    Article  MathSciNet  Google Scholar 

  8. G. Chen, C. Kang, D. Wang, X Zhao, Y Huang, A robust video watermarking algorithm based on spatial domain, in International Conference on Energy and Environmental Protection (ICEEP), pp. 412–419 (2018). https://doi.org/10.2991/iceep-18.2018.71

  9. H. Chen, W. Xu, N. Broderick, J. Han, An adaptive denoising method for Raman spectroscopy based on lifting wavelet transform. J. Raman Spectrosc. 49(4), 1–11 (2018). https://doi.org/10.1002/jrs.5399

    Article  Google Scholar 

  10. L. Chen, Y. Yi, L. Kai, T. Lihua, A semi-fragile video watermarking algorithm based on H.264/AVC. Wirel. Commun. Mob. Comput. 2020, 8848553–8848563 (2020). https://doi.org/10.1155/2020/8848553

    Article  Google Scholar 

  11. S.C. Chu, H.C. Huang, Y. Shi et al., Genetic watermarking for zerotree-based applications. Circuits Syst. Signal Process. 27, 171–182 (2008). https://doi.org/10.1007/s00034-008-9025-z

    Article  Google Scholar 

  12. I. Daubeches, W. Sweldens, Factoring wavelet transform into lifting steps. J. Fourier Anal. Appl. 4(3), 247–269 (1998). https://doi.org/10.1007/BF02476026

    Article  MathSciNet  Google Scholar 

  13. B. Dhanalaxmi, S. Tadisetty, Multimedia cryptography—a review, in International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 764–766 (2017). https://doi.org/10.1109/ICPCSI.2017.8391817

  14. D. Dhaou, S. Ben Jabra, E. Zagrouba, An efficient anaglyph 3d video watermarking approach based on hybrid insertion, in International Conference on Computer Analysis of Images and Patterns, pp. 96–107 (2019). https://doi.org/10.1007/978-3-030-29891-3_9

  15. M.E. Farfoura, S.J. Horng, J.M. Guo et al., Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed. Tools Appl. 75(13), 7465 (2016). https://doi.org/10.1007/s11042-015-2672-8

    Article  Google Scholar 

  16. E. Farri, P. Ayubi, A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map. Nonlinear Dyn. 93(4), 1875–1897 (2018). https://doi.org/10.1007/s11071-018-4295-x

    Article  Google Scholar 

  17. S. Fekri-Ershad, Texture classification approach based on energy variation. Int. J. Multimed. Technol. 2(2), 52–55 (2012)

    Google Scholar 

  18. B. Feng, X. Li, Y. Jie, C. Guo, H. Fu, A novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration. Mobile Netw. Appl. 25, 82–94 (2020). https://doi.org/10.1007/s11036-018-1186-9

    Article  Google Scholar 

  19. V.R. Folifack Signing, T. Fozin Fonzin, M. Kountchou et al., Chaotic Jerk system with Hump structure for text and image encryption using DNA coding. Circuits Syst. Signal Process. 40, 4370–4406 (2021). https://doi.org/10.1007/s00034-021-01665-1

    Article  Google Scholar 

  20. M. Ghadi, L. Laouamer, L. Nana, A. Pascu, A blind spatial domain-based image watermarking using texture analysis and association rules mining. Multimed. Tools Appl. 78, 15705–15750 (2019). https://doi.org/10.1007/s11042-018-6851-2

    Article  Google Scholar 

  21. A. Hammami, A. Ben Hamida, C. Ben Amar, A robust blind video watermarking scheme based on discrete wavelet transform and singular value decomposition, in International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Application, pp. 597–604 (2019). https://doi.org/10.5220/0007685305970604

  22. A. Hammami, A. Ben Hamida, C. Ben Amar, H. Nicolas, Regions based semi-fragile watermarking scheme for video authentication, in International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 96–104 (2020). https://doi.org/10.24132/JWSCG.2020.28.12

  23. A. Hammami, A. Ben Hamida, C. Ben Amar, Blind semi-fragile watermarking scheme for video authentication in video surveillance context. Multimed. Tools Appl. 80, 7479–7513 (2021). https://doi.org/10.1007/s11042-020-09982-4

    Article  Google Scholar 

  24. H.T. Hu, T.T. Lee, Robust complementary dual image watermarking in subbands derived from the Laplacian pyramid, discrete wavelet transform, and directional filter bank. Circuits Syst. Signal Process. 41, 4090–4116 (2022). https://doi.org/10.1007/s00034-022-01975-y

    Article  Google Scholar 

  25. Y. Huang, C. Liu, X. Zha, Y. Li, An enhanced feature extraction model using lifting based wavelet packet transform scheme and sampling-importance-resampling-analysis. Mech. Syst. Signal Process. 23(8), 2470–2487 (2009). https://doi.org/10.1016/j.ymssp.2009.06.003

    Article  Google Scholar 

  26. Q. Huynh-Thu, M. Ghanbari, Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 44(13), 800–801 (2008). https://doi.org/10.1049/el:20080522

    Article  Google Scholar 

  27. M.S. Islam, N. Naqvi, A.T. Abbasi et al., Robust dual domain twofold encrypted image-in-audio watermarking based on SVD. Circuits Syst. Signal Process. 40, 4651–4685 (2021). https://doi.org/10.1007/s00034-021-01690-0

    Article  Google Scholar 

  28. K. Jain, U.S.N. Raju, A digital video watermarking algorithm based on LSB and DCT. J. Inf. Secur. Res. 6(3), 92–97 (2015)

    Google Scholar 

  29. A. Kanhe, G. Aghila, A DCT-SVD-based speech steganography in voiced frames. Circuits Syst. Signal Process. 37, 5049–5068 (2018). https://doi.org/10.1007/s00034-018-0805-9

    Article  Google Scholar 

  30. A. Kerbiche, S. Ben Jabra, E. Zagrouba, V. Charvillat, Robust video watermarking approach based on crowdsourcing and hybrid insertion, in International Conference on Digital Image Computing: Techniques and Applications, pp. 1–8 (2017). https://doi.org/10.1109/DICTA.2017.8227489

  31. M.R. Keyvanpour, N. Khanbani, M. Boreiry, A secure method in digital video watermarking with transform domain algorithms. Multimed. Tools Appl. 80, 20449–20476 (2021). https://doi.org/10.1007/s11042-021-10730-5

    Article  Google Scholar 

  32. M. Khan, F. Masood, A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed. Tools Appl. 78, 26203–26222 (2019). https://doi.org/10.1007/s11042-019-07818-4

    Article  Google Scholar 

  33. V. Klema, A. Laub, The singular value decomposition: its computation and some applications. IEEE Trans. Autom. Control 25(2), 164–176 (1980). https://doi.org/10.1109/TAC.1980.1102314

    Article  MathSciNet  Google Scholar 

  34. R. Mehta, N. Rajpal, V.P. Vishwakarma, A robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform. Int. J. Mach. Learn. Cyber. 8, 379–395 (2017). https://doi.org/10.1007/s13042-015-0331-z

    Article  Google Scholar 

  35. A.A. Mohammed, N.A. Ali, Robust video watermarking scheme using high efficiency video coding attack. Multimed. Tools Appl. 77, 2791–2806 (2018). https://doi.org/10.1007/s11042-017-4427-1

    Article  Google Scholar 

  36. R. Munir, H. Harlili, A secure fragile video watermarking algorithm for content authentication based on Arnold Cat Map, in International Conference on Information Technology (InCIT), pp. 32–37 (2019). https://doi.org/10.1109/INCIT.2019.8912074

  37. I. Nouioua, N. Amardjia, S. Belilita, A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Secur. Commun. Netw. 2018(10), 1–17 (2018). https://doi.org/10.1155/2018/6712065

    Article  Google Scholar 

  38. H. Prasetyo, C.H. Hsia, C.H. Liu, Vulnerability attacks of SVD-based video watermarking scheme in an IoT environment. IEEE Access 8, 69919–69936 (2020). https://doi.org/10.1109/ACCESS.2020.2984180

    Article  Google Scholar 

  39. C. Priya, C. Ramya, Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection. Circuits Syst. Signal Process. 40, 2464–2493 (2021). https://doi.org/10.1007/s00034-020-01585-6

    Article  Google Scholar 

  40. S.P.A. Sathya, S. Ramakrishnan, Fibonacci based key frame selection and scrambling for video watermarking in DWT-SVD domain. Wirel. Pers. Commun. 102, 2011–2031 (2018). https://doi.org/10.1007/s11277-018-5252-1

    Article  Google Scholar 

  41. D. Shukla, M. Sharma, Robust scene-based digital video watermarking scheme using level-3 DWT: approach, evaluation, and experimentation. Radioelectron. Commun. Syst. 61(01), 1–12 (2018). https://doi.org/10.3103/S0735272718010016

    Article  Google Scholar 

  42. P. Simon, V. Uma, Review of texture descriptors for texture classification, in Data Engineering and Intelligent Computing, pp. 159–176 (2018). https://doi.org/10.1007/978-981-10-3223-3_15

  43. K. Staffy, A. Naveen, D.S. Raahat, Video inter-frame forgery detection approach for surveillance and mobile recorded videos. Int. J. Electr. Comput. Eng. 7(2), 831–841 (2017). https://doi.org/10.11591/ijece.v7i2.pp831-841

    Article  Google Scholar 

  44. W. Sweldens, The lifting scheme: a custom design construction of biorthogonal wavelets. Appl. Comput. Harmonic Anal. 3(2), 186–200 (1996). https://doi.org/10.1006/acha.1996.0015

    Article  MathSciNet  Google Scholar 

  45. L. Tian, H. Dai, C. Li, A semi-fragile video watermarking algorithm based on chromatic residual DCT. Multimed. Tools Appl. 79, 1759–1779 (2020). https://doi.org/10.1007/s11042-019-08256-y

    Article  Google Scholar 

  46. Y. Vybornova, A New watermarking method for video authentication with tamper localization, in International Conference on Computer Vision and Graphics (ICCVG), pp. 201–213 (2020). https://doi.org/10.1007/978-3-030-59006-2_18

  47. U.A. Waqas, M. Khan, S.I. Batool, A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed. Tools Appl. 79, 6891–6914 (2020). https://doi.org/10.1007/s11042-019-08570-5

    Article  Google Scholar 

  48. D. Xu, Commutative encryption and data hiding in HEVC video compression. IEEE Access 7, 66028–66041 (2019). https://doi.org/10.1109/ACCESS.2019.2916484

    Article  Google Scholar 

  49. M.A. Yongqiang et al., Research on color image watermarking algorithm based on Quaternion Fourier transform, in Conference Series: Materials Science and Engineering, p. 012050 (2020). https://doi.org/10.1088/1757-899X/799/1/012050

  50. S. Yuxin, T. Chen, X. Min, C. Mingming, L. Zhenkun, A DWT-SVD based adaptive color multi-watermarking scheme for copyright protection using AMEF and PSO-GWO. Expert Syst. Appl. 168, 114414 (2021). https://doi.org/10.1016/j.eswa.2020.114414

    Article  Google Scholar 

  51. J. Zou, RK. Ward, D. Qi, The generalized Fibonacci transformations and application to image scrambling, in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. iii-385 (2004). https://doi.org/10.1109/ICASSP.2004.1326562

Download references

Acknowledgements

The research leading to these results received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the Grant Agreement Number LR11ES48.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amal Hammami.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hammami, A., Ben Hamida, A., Ben Amar, C. et al. Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization. Circuits Syst Signal Process 43, 264–301 (2024). https://doi.org/10.1007/s00034-023-02462-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-023-02462-8

Keywords

Navigation