A Compressed Domain Robust Video Watermarking Resists Geometric Attack
DOI:
https://doi.org/10.32628/CSEIT241051060Keywords:
Image Processing, Video Water Marking, Digital Water Marking, Geometric AttackAbstract
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, illegal usage, and unauthorized sharing. To address these challenges, digital watermarking emerges as a crucial tool, serving purposes such as authentication, maintaining integrity, and identifying rightful owners. In the realm of video watermarking, two primary categories exist: watermarking in the compressed domain and watermarking in the uncompressed domain. Compressed domain watermarking involves expedited data processing through partial video decoding, whereas uncompressed domain watermarking requires more time. This article proposes a novel video watermarking methodology designed specifically to withstand geometric attacks. The proposed method aims to dynamically embed watermarks within video content, thereby enhancing resilience against various geometric distortions. Geometric attacks, including scaling, rotation, cropping, and translation, pose significant challenges in digital watermarking and are thus a focal point of this research. The objective is to integrate this approach with complex video coding standards, leveraging compression domain techniques to fortify resistance against geometric attacks. Tests show that the suggested video watermarking system works well. Not only does it excel in safeguarding against geometric attacks, but it also mitigates perceptual quality degradation, thus ensuring a balance between robustness and visual fidelity. As the prevalence of video content continues to grow, robust watermarking techniques like the one presented here play a vital role in preserving intellectual property rights and ensuring the integrity of multimedia content in the digital age.
Downloads
References
H. Ding et al., “A Compressed-Domain Robust Video Watermarking against Recompression Attack,” IEEE Access, vol. 9, pp. 35324–35337, 2021, doi: 10.1109/ACCESS.2021.3062468. DOI: https://doi.org/10.1109/ACCESS.2021.3062468
X. C. Sun, Z. M. Lu, Z. Wang, and Y. L. Liu, “A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT,” Multimed. Tools Appl., vol. 80, no. 9, pp. 13491–13511, 2021, doi: 10.1007/s11042-020-10392-9. DOI: https://doi.org/10.1007/s11042-020-10392-9
N. T. B. Abdulla and K. A. Navas, “Robust Video Watermarking Resilient to Inadvertent Attacks,” 2020 IEEE Int. Conf. Power Electron. Renew. Energy Appl. PEREA 2020, pp. 1–5, 2020, doi: 10.1109/PEREA51218.2020.9339797. DOI: https://doi.org/10.1109/PEREA51218.2020.9339797
L. Pan, X. Shu, and M. Zhang, “A key frame extraction algorithm based on clustering and compressive sensing,” Int. J. Multimed. Ubiquitous Eng., vol. 10, no. 11, pp. 385–396, 2015, doi: 10.14257/ijmue.2015.10.11.37. DOI: https://doi.org/10.14257/ijmue.2015.10.11.37
R. Shoitan, M. M. Moussa, and S. M. Elshoura, “A robust video watermarking scheme based on Laplacian pyramid, SVD, and DWT with improved robustness towards geometric attacks via SURF,” Multimed. Tools Appl., vol. 79, no. 35–36, pp. 26837–26860, 2020, doi: 10.1007/s11042-020-09258-x. DOI: https://doi.org/10.1007/s11042-020-09258-x
Z. Lv, H. Guan, Y. Huang, S. Zhang, and Y. Zheng, “Enhancing Feature Point-Based Video Watermarking against Geometric Attacks with Template,” Wirel. Commun. Mob. Comput., vol. 2021, 2021, doi: 10.1155/2021/3364680. DOI: https://doi.org/10.1155/2021/3364680
Z. Ma, W. Zhang, H. Fang, X. Dong, L. Geng, and N. Yu, “Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry,” IEEE Trans. Circuits Syst. Video Technol., vol. 31, no. 12, pp. 4826–4839, 2021, doi: 10.1109/TCSVT.2021.3055255. DOI: https://doi.org/10.1109/TCSVT.2021.3055255
A. Mansouri and A. Mahmoudi-Aznaveh, “Toward a secure video watermarking in compressed domain,” J. Inf. Secur. Appl., vol. 48, 2019, doi: 10.1016/j.jisa.2019.102370. DOI: https://doi.org/10.1016/j.jisa.2019.102370
S. Gaj, A. Sur, and P. K. Bora, “Prediction mode based H.265/HEVC video watermarking resisting re-compression attack,” Multimed. Tools Appl., vol. 79, no. 25–26, pp. 18089–18119, 2020, doi: 10.1007/s11042-019-08301-w. DOI: https://doi.org/10.1007/s11042-019-08301-w
J. Sun, X. Jiang, J. Liu, F. Zhang, and C. Li, “An anti-recompression video watermarking algorithm in bitstream domain,” Tsinghua Sci. Technol., vol. 26, no. 2, pp. 154–162, 2021, doi: 10.26599/TST.2019.9010050. DOI: https://doi.org/10.26599/TST.2019.9010050
R. Munir and Harlili, “A Secure Fragile Video Watermarking Algorithm for Content Authentication Based on Arnold Cat Map,” Proc. 2019 4th Int. Conf. Inf. Technol. Encompassing Intell. Technol. Innov. Towar. New Era Hum. Life, InCIT 2019, pp. 32–37, 2019, doi: 10.1109/INCIT.2019.8912074. DOI: https://doi.org/10.1109/INCIT.2019.8912074
P. Garg and R. R. Kishore, “Performance comparison of various watermarking techniques,” Multimed. Tools Appl., vol. 79, no. 35–36, pp. 25921–25967, 2020, doi: 10.1007/s11042-020-09262-1. DOI: https://doi.org/10.1007/s11042-020-09262-1
M. S. V. Kavita Sahu, “Key Frame Extraction From Video Sequence : A Survey,” Int. Res. J. Eng. Technol., vol. 04, no. 05, pp. 1346–1350, 2017, [Online]. Available: https://www.irjet.net/archives/V4/i5/IRJET-V4I5404.pdf
S. Jadon and M. Jasim, “Unsupervised video summarization framework using keyframe extraction and video skimming,” 2020 IEEE 5th Int. Conf. Comput. Commun. Autom. ICCCA 2020, pp. 140–145, 2020, doi: 10.1109/ICCCA49541.2020.9250764. DOI: https://doi.org/10.1109/ICCCA49541.2020.9250764
S. Y. Wang and T. Yagasaki, “Block selection: A method for segmenting page image of various editing styles,” Proc. Int. Conf. Doc. Anal. Recognition, ICDAR, vol. 1, pp. 128–133, 1995, doi: 10.1109/ICDAR.1995.598959. DOI: https://doi.org/10.1109/ICDAR.1995.598959
C. V. Sheena and N. K. Narayanan, “Key-frame Extraction by Analysis of Histograms of Video Frames Using Statistical Methods,” Procedia Comput. Sci., vol. 70, pp. 36–40, 2015, doi: 10.1016/j.procs.2015.10.021. DOI: https://doi.org/10.1016/j.procs.2015.10.021
M. Asikuzzaman and M. R. Pickering, “An Overview of Digital Video Watermarking,” IEEE Trans. Circuits Syst. Video Technol., vol. 28, no. 9, pp. 2131–2153, 2018, doi: 10.1109/TCSVT.2017.2712162. DOI: https://doi.org/10.1109/TCSVT.2017.2712162
C. Sharma and A. Bhaskar, “WITHDRAWN: A review on video watermarking techniques for compressed domain with optimization algorithms,” Mater. Today Proc., no. xxxx, 2020, doi: 10.1016/j.matpr.2020.11.319. DOI: https://doi.org/10.1016/j.matpr.2020.11.319
Y. Tan, J. Qin, X. Xiang, W. Ma, W. Pan, and N. N. Xiong, “A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding,” IEEE Access, vol. 7, no. c, pp. 25026–25036, 2019, doi: 10.1109/ACCESS.2019.2896304. DOI: https://doi.org/10.1109/ACCESS.2019.2896304
B. Nemade, J. Nair, and B. Nemade, "Efficient GDP Growth Forecasting for India through a Novel Modified LSTM Approach," Communications on Applied Nonlinear Analysis, vol. 31, no. 2s, pp. 339-357, 2024. DOI: https://doi.org/10.52783/cana.v31.653
B. Marakarkandy, B. Nemade, S. Kelkar, P. V. Chandrika, V. A. Shirsath, and M. Mali, "Enhancing Multi-Channel Consumer Behavior Analysis: A Data-Driven Approach using the Optimized Apriori Algorithm," Journal of Electrical Systems, vol. 20, no. 2s, pp. 700–708, 2024. DOI: https://doi.org/10.52783/jes.1536
B. Nemade, N. Phadnis, A. Desai, and K. K. Mungekar, "Enhancing connectivity and intelligence through embedded Internet of Things devices," ICTACT Journal on Microelectronics, vol. 9, no. 4, pp. 1670-1674, Jan. 2024, doi: 10.21917/ijme.2024.0289.
B. C. Surve, B. Nemade, and V. Kaul, "Nano-electronic devices with machine learning capabilities," ICTACT Journal on Microelectronics, vol. 9, no. 3, pp. 1601-1606, Oct. 2023, doi: 10.21917/ijme.2023.0277.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.