Abstract
In this paper, a blind semi-fragile dual watermarking system for video content authentication and tampering localization is proposed. In this method, two watermarks are tailored for each host video frame. Indeed, the frame index is firstly binary modulated and then, serves as a primary watermark. Subsequently, a second content-based authentication watermark is built up using frame blocks texture features. To improve the security aspect, Torus automorphism mapping is applied under the second watermark before being embedded. The suggested scheme operates in the hybrid domain. In fact, the primary watermark is infused in the host frame following a spatial domain-based embedding technique. However, a frequency domain-based watermarking method, which combines Lifting Wavelet Transform (LWT) and Singular Value Decomposition (SVD), is involved to hide the second watermark. Herein, the most textured blocks are chosen as second watermark holders to enhance the watermarked video perceptual quality. During the detection process, the dissimilarity between the second extracted watermark and its reconstructed version as well as the mismatch between the observed index and the extracted one enable to reveal spatial and temporal tampering, respectively. Experimental results show that the proposed scheme achieves a good visual quality with a large embedding capacity. Furthermore, it can efficiently withstand non-malicious processing while being fragile to frames manipulations and content modification attacks. Moreover, it ensures an accurate tampered areas localization.
Similar content being viewed by others
Availability of Data and Materials
The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.
References
N.A. Abbas, Image encryption based on independent component analysis and Arnold’s Cat Map. Egypt Inform. J. 17(1), 139–146 (2015). https://doi.org/10.1016/j.eij.2015.10.001
N.T.B. Abdulla, K.A. Navas, Robust video watermarking resilient to inadvertent attacks, in International Conference on Power Electronics and Renewable Energy Applications (PEREA), pp. 1–5 (2020). https://doi.org/10.1109/PEREA51218.2020.9339797
F. Arab, M. Zamani, VW16E: a robust video watermarking technique using simulated blocks. Intell. Syst. Ref. Libr. 115, 193–221 (2017). https://doi.org/10.1007/978-3-319-44270-9_9
M. Asikuzzaman, M.R. Pickering, An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. 28(9), 2131–2153 (2018). https://doi.org/10.1109/TCSVT.2017.2712162
S. Belilita, N. Amardjia, T. Bekkouche, I. Nouioua, Combining SVD-DCT image watermarking scheme based on Perona-Malik diffusion. Elektron. Elektrotechn. 25(4), 68–74 (2019). https://doi.org/10.5755/j01.eie.25.4.23973
A. Bhardwaj, V.S. Verma, R.K. Jha, Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed. Tools Appl. 77(15), 19659–19678 (2018). https://doi.org/10.1007/s11042-017-5340-3
B. Chen, G.W. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001). https://doi.org/10.1109/18.923725
G. Chen, C. Kang, D. Wang, X Zhao, Y Huang, A robust video watermarking algorithm based on spatial domain, in International Conference on Energy and Environmental Protection (ICEEP), pp. 412–419 (2018). https://doi.org/10.2991/iceep-18.2018.71
H. Chen, W. Xu, N. Broderick, J. Han, An adaptive denoising method for Raman spectroscopy based on lifting wavelet transform. J. Raman Spectrosc. 49(4), 1–11 (2018). https://doi.org/10.1002/jrs.5399
L. Chen, Y. Yi, L. Kai, T. Lihua, A semi-fragile video watermarking algorithm based on H.264/AVC. Wirel. Commun. Mob. Comput. 2020, 8848553–8848563 (2020). https://doi.org/10.1155/2020/8848553
S.C. Chu, H.C. Huang, Y. Shi et al., Genetic watermarking for zerotree-based applications. Circuits Syst. Signal Process. 27, 171–182 (2008). https://doi.org/10.1007/s00034-008-9025-z
I. Daubeches, W. Sweldens, Factoring wavelet transform into lifting steps. J. Fourier Anal. Appl. 4(3), 247–269 (1998). https://doi.org/10.1007/BF02476026
B. Dhanalaxmi, S. Tadisetty, Multimedia cryptography—a review, in International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 764–766 (2017). https://doi.org/10.1109/ICPCSI.2017.8391817
D. Dhaou, S. Ben Jabra, E. Zagrouba, An efficient anaglyph 3d video watermarking approach based on hybrid insertion, in International Conference on Computer Analysis of Images and Patterns, pp. 96–107 (2019). https://doi.org/10.1007/978-3-030-29891-3_9
M.E. Farfoura, S.J. Horng, J.M. Guo et al., Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed. Tools Appl. 75(13), 7465 (2016). https://doi.org/10.1007/s11042-015-2672-8
E. Farri, P. Ayubi, A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map. Nonlinear Dyn. 93(4), 1875–1897 (2018). https://doi.org/10.1007/s11071-018-4295-x
S. Fekri-Ershad, Texture classification approach based on energy variation. Int. J. Multimed. Technol. 2(2), 52–55 (2012)
B. Feng, X. Li, Y. Jie, C. Guo, H. Fu, A novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration. Mobile Netw. Appl. 25, 82–94 (2020). https://doi.org/10.1007/s11036-018-1186-9
V.R. Folifack Signing, T. Fozin Fonzin, M. Kountchou et al., Chaotic Jerk system with Hump structure for text and image encryption using DNA coding. Circuits Syst. Signal Process. 40, 4370–4406 (2021). https://doi.org/10.1007/s00034-021-01665-1
M. Ghadi, L. Laouamer, L. Nana, A. Pascu, A blind spatial domain-based image watermarking using texture analysis and association rules mining. Multimed. Tools Appl. 78, 15705–15750 (2019). https://doi.org/10.1007/s11042-018-6851-2
A. Hammami, A. Ben Hamida, C. Ben Amar, A robust blind video watermarking scheme based on discrete wavelet transform and singular value decomposition, in International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Application, pp. 597–604 (2019). https://doi.org/10.5220/0007685305970604
A. Hammami, A. Ben Hamida, C. Ben Amar, H. Nicolas, Regions based semi-fragile watermarking scheme for video authentication, in International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 96–104 (2020). https://doi.org/10.24132/JWSCG.2020.28.12
A. Hammami, A. Ben Hamida, C. Ben Amar, Blind semi-fragile watermarking scheme for video authentication in video surveillance context. Multimed. Tools Appl. 80, 7479–7513 (2021). https://doi.org/10.1007/s11042-020-09982-4
H.T. Hu, T.T. Lee, Robust complementary dual image watermarking in subbands derived from the Laplacian pyramid, discrete wavelet transform, and directional filter bank. Circuits Syst. Signal Process. 41, 4090–4116 (2022). https://doi.org/10.1007/s00034-022-01975-y
Y. Huang, C. Liu, X. Zha, Y. Li, An enhanced feature extraction model using lifting based wavelet packet transform scheme and sampling-importance-resampling-analysis. Mech. Syst. Signal Process. 23(8), 2470–2487 (2009). https://doi.org/10.1016/j.ymssp.2009.06.003
Q. Huynh-Thu, M. Ghanbari, Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 44(13), 800–801 (2008). https://doi.org/10.1049/el:20080522
M.S. Islam, N. Naqvi, A.T. Abbasi et al., Robust dual domain twofold encrypted image-in-audio watermarking based on SVD. Circuits Syst. Signal Process. 40, 4651–4685 (2021). https://doi.org/10.1007/s00034-021-01690-0
K. Jain, U.S.N. Raju, A digital video watermarking algorithm based on LSB and DCT. J. Inf. Secur. Res. 6(3), 92–97 (2015)
A. Kanhe, G. Aghila, A DCT-SVD-based speech steganography in voiced frames. Circuits Syst. Signal Process. 37, 5049–5068 (2018). https://doi.org/10.1007/s00034-018-0805-9
A. Kerbiche, S. Ben Jabra, E. Zagrouba, V. Charvillat, Robust video watermarking approach based on crowdsourcing and hybrid insertion, in International Conference on Digital Image Computing: Techniques and Applications, pp. 1–8 (2017). https://doi.org/10.1109/DICTA.2017.8227489
M.R. Keyvanpour, N. Khanbani, M. Boreiry, A secure method in digital video watermarking with transform domain algorithms. Multimed. Tools Appl. 80, 20449–20476 (2021). https://doi.org/10.1007/s11042-021-10730-5
M. Khan, F. Masood, A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed. Tools Appl. 78, 26203–26222 (2019). https://doi.org/10.1007/s11042-019-07818-4
V. Klema, A. Laub, The singular value decomposition: its computation and some applications. IEEE Trans. Autom. Control 25(2), 164–176 (1980). https://doi.org/10.1109/TAC.1980.1102314
R. Mehta, N. Rajpal, V.P. Vishwakarma, A robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform. Int. J. Mach. Learn. Cyber. 8, 379–395 (2017). https://doi.org/10.1007/s13042-015-0331-z
A.A. Mohammed, N.A. Ali, Robust video watermarking scheme using high efficiency video coding attack. Multimed. Tools Appl. 77, 2791–2806 (2018). https://doi.org/10.1007/s11042-017-4427-1
R. Munir, H. Harlili, A secure fragile video watermarking algorithm for content authentication based on Arnold Cat Map, in International Conference on Information Technology (InCIT), pp. 32–37 (2019). https://doi.org/10.1109/INCIT.2019.8912074
I. Nouioua, N. Amardjia, S. Belilita, A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Secur. Commun. Netw. 2018(10), 1–17 (2018). https://doi.org/10.1155/2018/6712065
H. Prasetyo, C.H. Hsia, C.H. Liu, Vulnerability attacks of SVD-based video watermarking scheme in an IoT environment. IEEE Access 8, 69919–69936 (2020). https://doi.org/10.1109/ACCESS.2020.2984180
C. Priya, C. Ramya, Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection. Circuits Syst. Signal Process. 40, 2464–2493 (2021). https://doi.org/10.1007/s00034-020-01585-6
S.P.A. Sathya, S. Ramakrishnan, Fibonacci based key frame selection and scrambling for video watermarking in DWT-SVD domain. Wirel. Pers. Commun. 102, 2011–2031 (2018). https://doi.org/10.1007/s11277-018-5252-1
D. Shukla, M. Sharma, Robust scene-based digital video watermarking scheme using level-3 DWT: approach, evaluation, and experimentation. Radioelectron. Commun. Syst. 61(01), 1–12 (2018). https://doi.org/10.3103/S0735272718010016
P. Simon, V. Uma, Review of texture descriptors for texture classification, in Data Engineering and Intelligent Computing, pp. 159–176 (2018). https://doi.org/10.1007/978-981-10-3223-3_15
K. Staffy, A. Naveen, D.S. Raahat, Video inter-frame forgery detection approach for surveillance and mobile recorded videos. Int. J. Electr. Comput. Eng. 7(2), 831–841 (2017). https://doi.org/10.11591/ijece.v7i2.pp831-841
W. Sweldens, The lifting scheme: a custom design construction of biorthogonal wavelets. Appl. Comput. Harmonic Anal. 3(2), 186–200 (1996). https://doi.org/10.1006/acha.1996.0015
L. Tian, H. Dai, C. Li, A semi-fragile video watermarking algorithm based on chromatic residual DCT. Multimed. Tools Appl. 79, 1759–1779 (2020). https://doi.org/10.1007/s11042-019-08256-y
Y. Vybornova, A New watermarking method for video authentication with tamper localization, in International Conference on Computer Vision and Graphics (ICCVG), pp. 201–213 (2020). https://doi.org/10.1007/978-3-030-59006-2_18
U.A. Waqas, M. Khan, S.I. Batool, A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed. Tools Appl. 79, 6891–6914 (2020). https://doi.org/10.1007/s11042-019-08570-5
D. Xu, Commutative encryption and data hiding in HEVC video compression. IEEE Access 7, 66028–66041 (2019). https://doi.org/10.1109/ACCESS.2019.2916484
M.A. Yongqiang et al., Research on color image watermarking algorithm based on Quaternion Fourier transform, in Conference Series: Materials Science and Engineering, p. 012050 (2020). https://doi.org/10.1088/1757-899X/799/1/012050
S. Yuxin, T. Chen, X. Min, C. Mingming, L. Zhenkun, A DWT-SVD based adaptive color multi-watermarking scheme for copyright protection using AMEF and PSO-GWO. Expert Syst. Appl. 168, 114414 (2021). https://doi.org/10.1016/j.eswa.2020.114414
J. Zou, RK. Ward, D. Qi, The generalized Fibonacci transformations and application to image scrambling, in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. iii-385 (2004). https://doi.org/10.1109/ICASSP.2004.1326562
Acknowledgements
The research leading to these results received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the Grant Agreement Number LR11ES48.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hammami, A., Ben Hamida, A., Ben Amar, C. et al. Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization. Circuits Syst Signal Process 43, 264–301 (2024). https://doi.org/10.1007/s00034-023-02462-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00034-023-02462-8