Skip to main content
Log in

A robust video watermarking technique for the tamper detection of surveillance systems

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A digital watermark embeds an imperceptible signal into data such as audio, video and images, for different purposes including authentication and tamper detection. A real-time video surveillance application requires a large quantity of sequences to be processed, which makes computational efficiency an additional constraint on video watermarking for surveillance systems. As a result, spatial domain schemes are a more efficient than frequency domain schemes. This paper focuses on video watermarking, particularly with respect to the Audio Video Interleaved (AVI) form of video file format. It proposes two new watermarking schemes which seem to offer a high degree of imperceptibility and efficient tamper detection. Both schemes were subjected to nine different types of common attack, which revealed one scheme, VW8F, to be superior, particularly in terms of imperceptibility. VW8F was then compared with a range of similar schemes by other authors. The results show that VW8F offers both improved imperceptibility (average PSNR of 47.87 dB) and proven efficiency at detecting a wider range of tampering compared to the other similar schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30

Similar content being viewed by others

References

  1. Agarwal H, Ahuja R, Bedi S (2012) Highly Robust and Imperceptible Luminance Based Hybrid Digital Video Watermarking Scheme for Ownership Protection. International Journal of Image, Graphics & Signal Processing 4(11)

  2. Amira H, Rhouma R, Belghith S (2010) An Eigen value based Watermarking scheme for tamper detection in gray level images. Systems Signals and Devices (SSD), 2010 7th International Multi-Conference on 1–5

  3. Chaluvadi SB, Prasad MV (2009) Efficient image tamper detection and recovery technique using dual watermark. Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on 993–998

  4. Chang X, Wang W, Zhao J, Zhang L (2011) A survey of digital video watermarking. Natural Computation (ICNC), 2011 Seventh International Conference on 61–65

  5. Chimanna MA, Khot S (2013) Robustness of video watermarking against various attacks using Wavelet Transform techniques and Principle Component Analysis. Information Communication and Embedded Systems (ICICES), 2013 International Conference on 613–618

  6. Do H, Choi D, Choi H, Kim T (2008) Digital video watermarking based on histogram and temporal modulation and robust to camcorder recording. Signal Processing and Information Technology, 2008. ISSPIT 2008. IEEE International Symposium on 330–335

  7. Giovanni B, Francesco F, Concetta P, Alfio P (2009) Dependable integrated surveillance systems for the physical security of metro railways. Third ACM/IEEE International Conference on Distributed Smart Cameras

  8. Giovanni G, Pierpaolo M, Alessandro C, Stefano D, Ugo P, Francesco F (2013) White paper on industrial applications of computer vision and pattern recognition. Lect Notes Comput Sci 8157:721–730

    Article  Google Scholar 

  9. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46

    Article  Google Scholar 

  10. Hasnaoui M, Mitrea M (2012) Semi-fragile watermarking for video surveillance applications. Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European 1782–1786

  11. He HJ, Zhang JS, Tai HM (2011) A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. Multimed Tools Appl 52:307–324

    Article  Google Scholar 

  12. Huo YR, He HJ, Chen F (2014) A semi-fragile image watermarking algorithm with two-stage detection. Multimed Tools Appl 72(1):123–149

    Article  Google Scholar 

  13. Ishtiaq M, Jaffar MA, Khan MA, Jan Z, Mirza AM (2009) Robust and imperceptible watermarking of video streams for low power devices. In Signal Processing, Image Processing and Pattern Recognition (pp. 177–184)

  14. Junxiao X, Qingbin L, Zhiyong L (2011) A novel digital video watermarking algorithm. Procedia Eng 24:90–94

    Article  Google Scholar 

  15. Liu M (2012) Study of Digital Video Watermarking. Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on 77–80

  16. Liu Z, Li Q, Guan S, Peng X (2009) A robust watermarking algorithm based on differential energy and QIM for uncompressed video. Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP’09. Fifth International Conference on 382–385

  17. Luo T, Jiang GY, Wang XD, Yu M, Shao F, Peng ZJ (2014) Stereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing. Multimed Tools Appl 73(3):1077–1102

    Article  Google Scholar 

  18. Nithyanandam S, Gayathri K, Raja K, Priyadarsini P (2011) Recent Trends in Secure Personal Authentication for Iris Recognition Using Novel Cryptographic Algorithmic Techniques. Process Automation, Control and Computing (PACC), 2011 International Conference on 1–6

  19. Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51(1):133–162

    Article  Google Scholar 

  20. Sinha S, Bardhan P, Pramanick S, Jagatramka A, Kole DK, Chakraborty A (2011) Digital video watermarking using discrete wavelet transform and principal component analysis. Int J Wisdom Based Comput 1(2):7–12

    Google Scholar 

  21. Su P.-C., Wu C.-Y., Chen Y.-C. (2008) A digital video watermarking scheme for annotating traffic surveillance videos. Multimedia Signal Processing, 2008 I.E. 10th Workshop on 742–747

  22. Tokar T, Kanocz T, Levicky D (2009) Digital watermarking of uncompressed video in spatial domain. Radioelektronika, 2009. RADIOELEKTRONIKA’09. 19th International Conference 319–322

  23. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  24. Van Schyndel R (2010) A Hardware-based Surveillance Video Camera Watermark. Digital Image Computing: Techniques and Applications (DICTA), 2010 International Conference on 343–348

  25. Wang N, Kim C.-H. (2009) Color image of tamper detection and recovery using block-based watermarking. Embedded and Multimedia Computing, 2009. EM-Com 2009. 4th International Conference on 1–6

  26. Xu D, Zhang J, Pang B (2010) A Digital Watermarking Scheme Used for Authentication of Surveillance Video. Computational Intelligence and Security (CIS), 2010 International Conference on 654–658

  27. Yu PF, Yu PC, Xu D (2014) Palmprint authentication based on DCT-based watermarking. Appl Mech Mater 457:893–898

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farnaz Arab.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arab, F., Abdullah, S.M., Hashim, S.Z.M. et al. A robust video watermarking technique for the tamper detection of surveillance systems. Multimed Tools Appl 75, 10855–10885 (2016). https://doi.org/10.1007/s11042-015-2800-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2800-5

Keywords

Navigation