skip to main content
10.1145/3581783.3612842acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Invisible Video Watermark Method Based on Maximum Voting and Probabilistic Superposition

Published: 27 October 2023 Publication History

Abstract

Invisible watermarking is an essential measure for media publishers to declare ownership of their content, in the case of minimizing the impact on the viewing experience. In dealing with active attacks such as noise attacks, filtering attacks, geometric attacks, and lossy compression attacks, existing research still has great limitations. In this paper, through probabilistically superposition of "perturbed watermark obtain by maximum voting method" and "determined Bernoulli distribution" to restore the real embedded watermark, is used to deal with complex attack situations. Specifically, the special embedded watermark is obtained by sampling from the n-fold Bernoulli distribution with parameter p. Secondly, the HAAR wavelet transform is performed on the YUV channel of the video fixed-interval image to extract its low-pass component. Then Discrete Cosine Transform is performed to obtain its frequency domain representation. The watermark information is embedded into the frequency domain representation's singular to realize the embedded invisible watermark of video. The watermark bit of every block is determined by the maximum voting method for the disturbed watermark that performs DCT and SVD operations on the low-pass component of YUV channels. At this time, the determined Bernoulli distribution is probabilistically superimposed on the watermark information to guarantee distribution consistency. Finally, mean value operation and cluster processing are performed on the watermark information to reduce volatility. Experiments show that the method proposed in this paper has apparent advantages in solving Invisible video watermarking. With a PSNR of 41 and a corresponding BAR of 0.86, our team achieves 3rd place on the leaderboard of the Invisible Video Watermark Challenge 2023.

References

[1]
Sa'ed Abed, Suood Abdulaziz Al-Roomi, and Mohammad Al-Shayeji. 2019. Efficient cover image selection based on spatial block analysis and DCT embedding. EURASIP Journal on Image and Video Processing 2019, 1 (2019), 1--14.
[2]
Ali Akbar Attari and Ali Asghar Beheshti Shirazi. 2018. Robust audio watermarking algorithm based on DWT using Fibonacci numbers. Multimedia Tools and Applications 77 (2018), 25607--25627.
[3]
Saeid Fazli and Masoumeh Moeini. 2016. A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127, 2 (2016), 964--972.
[4]
Pengfei Guo, Lin Feng, and Siyu Sun. 2019. A new blind detection algorithm for digital watermarking in grayscale images. Computer Engineering & Science/Jisuanji Gongcheng yu Kexue 41, 1 (2019).
[5]
Guofei. 2020. BlindWatermark. https://github.com/guofei9987/blind_watermark.
[6]
Yuqi He and Yan Hu. 2018. A proposed digital image watermarking based on DWT-DCT-SVD. In 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 1214--1218.
[7]
Xu Jiangfeng and Zhang Shouqiang. 2018. DWT-DCT digital watermarking algorithm based on QR code. Application Research of Computers 35, 5 (2018), 1540--1544.
[8]
Liu Jie. 2022. A DWT-SVD Adaptive Digital Watermarking Algorithm Based on Chaotic Encryption. In Proceedings of the 2022 6th International Conference on Video and Image Processing. 173--181.
[9]
Alexey Kuznetsov and Mateusz Kwa?nicki. 2019. Minimal Hermite-type eigenbasis of the discrete Fourier transform. Journal of Fourier Analysis and Applications 25 (2019), 1053--1079.
[10]
Qi Li, Liu Jie, Qian Zhang, Yanlang Hu, and Qianru Zhang. 2021. A Reliable Digital Watermarking Algorithm Based On DCT-SVD Algorithm. In Proceedings of the 7th International Conference on Communication and Information Processing. 63--69.
[11]
Maurizio Masera, Guido Masera, and Maurizio Martina. 2018. An area-efficient variable-size fixed-point DCT architecture for HEVC encoding. IEEE Transactions on Circuits and Systems for Video Technology 30, 1 (2018), 232--242.
[12]
Lingzhuang Meng, Lianshan Liu, Gang Tian, and Xiaoli Wang. 2021. An adaptive reversible watermarking in IWT domain. Multimedia Tools and Applications 80 (2021), 711--735.
[13]
Aree A Mohammed, Dilman A Salih, Ari M Saeed, and Mohammed Q Kheder. 2020. An imperceptible semi-blind image watermarking scheme in DWT-SVD domain using a zigzag embedding technique. Multimedia Tools and Applications 79, 43--44 (2020), 32095--32118.
[14]
Kshiramani Naik, Saswati Trivedy, and Arup Kumar Pal. 2018. An IWT-based blind and robust image watermarking scheme using secret key matrix. Multimedia Tools and Applications 77 (2018), 13721--13752.
[15]
Xiangming Qi and Ting Gao. 2017. An invisible and robust watermarking algorithm based on the balance of block invisibility and robustness. Journal of Image and Graphics 22, 8 (2017), 1231--1238. https://doi.org/10.11834/jig.20170332
[16]
Vassilios Solachidis and Ioannis Pitas. 2007. Watermarking digital 3-d volumes in the discrete Fourier transform domain. IEEE Transactions on Multimedia 9, 7 (2007), 1373--1383.
[17]
Ruowei Wang, Chenguo Lin, Qijun Zhao, and Feiyu Zhu. 2021. Watermark faker: towards forgery of digital image watermarking. In 2021 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 1--6.
[18]
Zhao Xiaolei,Wang Guangqin, and Xu Xibin. 2020. Robust Digital Watermarking Algorithm Based on DCT-SVD and QR Code. In Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition. 186--190.
[19]
Narima Zermi, Amine Khaldi, Redouane Kafi, Fares Kahlessenane, and Salah Euschi. 2021. A DWT-SVD based robust digital watermarking for medical image security. Forensic science international 320 (2021), 110691.

Cited By

View all
  • (2024)Federated Morozov Regularization for Shortcut Learning in Privacy Preserving Learning with Watermarked Image DataProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681480(4899-4908)Online publication date: 28-Oct-2024

Index Terms

  1. Invisible Video Watermark Method Based on Maximum Voting and Probabilistic Superposition

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM '23: Proceedings of the 31st ACM International Conference on Multimedia
    October 2023
    9913 pages
    ISBN:9798400701085
    DOI:10.1145/3581783
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 October 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. invisible video watermark
    2. maximum voting
    3. probabilistic superposition

    Qualifiers

    • Research-article

    Conference

    MM '23
    Sponsor:
    MM '23: The 31st ACM International Conference on Multimedia
    October 29 - November 3, 2023
    Ottawa ON, Canada

    Acceptance Rates

    Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Federated Morozov Regularization for Shortcut Learning in Privacy Preserving Learning with Watermarked Image DataProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681480(4899-4908)Online publication date: 28-Oct-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media