Multimedia Tools and Applications

, Volume 74, Issue 21, pp 9157–9174 | Cite as

A novel robust video fingerprinting-watermarking hybrid scheme based on visual secret sharing

  • Xiyao Liu
  • Yuesheng ZhuEmail author
  • Ziqiang Sun
  • Mengge Diao
  • Liming Zhang


In this paper, a novel robust Video Fingerprinting-Watermarking Hybrid Scheme (VFWHS) is proposed by applying fingerprinting technique to zero-watermarking algorithm for enhancing the performance of video Digital Rights Management (DRM). In the VFWHS, the content-based feature of the original video is extracted by an improved 3D-DCT fingerprinting algorithm and stored in a video fingerprint database for retrieval, while the watermark-based feature of the watermark image is extracted by a 2D-DCT fingerprinting algorithm for copyright identification. According to the visual secret sharing scheme, a master share is generated from the content-based feature while an ownership share is generated from the master share and the watermark-based feature. The ownership share is then stored in an ownership database. When a video is queried, its content-based features are generated, and a process of similarity measurement is executed to obtain the matched feature with the relevant ownership share. The copyright ownership can be identified by stacking the master share generated from the queried video with the relevant ownership share. Our experimental results demonstrate that the VFWHS can obtain the relevant ownership share precisely for reliable copyright identification in the mass content processing which cannot be achieved by the zero-watermarking algorithms, and provide explicit copyright identification to avoid possible copyright dissension which cannot be achieved by the fingerprinting algorithms.


Digital rights management Visual secret sharing Fingerprinting Zero-watermarking 3D-DCT 



The authors would like to thanks Mr. Dennis D. Zhu for the kind support and valuable comments on this paper. This work is supported by the 973 Program of China under Grant 2012CB315904; and Shenzhen Engineering Laboratory for Broadband Wireless Network Security.


  1. 1.
    Chan CS, Chang CC, Vo HP (2012) A user-friendly image sharing scheme using JPEG-LS median edge predictor. JIHMSP 3(4):340–351Google Scholar
  2. 2.
    Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297zbMATHGoogle Scholar
  3. 3.
    Coskun B, Sankur B, Memon N (2006) Spatio–temporal transform based video hashing. IEEE Trans Multimed 8(6):1190–1208CrossRefGoogle Scholar
  4. 4.
    Esmaeili MM, Fatourechi M, Ward RK (2011) A robust and fast video copy detection system using content-based fingerprinting. IEEE Trans Inf Foren Sec 6(1):213–226CrossRefGoogle Scholar
  5. 5.
    Gao G, Jiang G (2013) A lossless copyright authentication scheme based on Bessel-fourier moment and extreme learning machine in curvature-feature domain. J Syst Softw 86(1):222–232CrossRefGoogle Scholar
  6. 6.
    Gao G, Jiang G (2013) Bessel-fourier moment-based robust image zero-watermarking. Multimed Tools Appl. doi: 10.1007/s11042-013-1701-8 Google Scholar
  7. 7.
    Guo C, Chang CC (2013) A construction for secret sharing scheme with general access structure. JIHMSP 4(1):1–8MathSciNetGoogle Scholar
  8. 8.
    Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489–501CrossRefGoogle Scholar
  9. 9.
    Joly A, Buisson O, Frelicot C (2007) Content-based copy retrieval using distortion-based probabilistic similarity search. IEEE Trans Multimed 9(2):293–306CrossRefGoogle Scholar
  10. 10.
    Lee MC, Chan RKW, Adjeroh DA (1997) Quantization of 3D-DCT coefficients and scan order for video compression. J Vis Commun Image Represent 8(4):405–422CrossRefGoogle Scholar
  11. 11.
    Lee SJ, Jung SH (2001) A survey of watermarking techniques applied to multimedia. In Proc. of Int. Symp. Industrial electronics (ISIE), pp 272–277Google Scholar
  12. 12.
    Lee S, Yoo CD (2008) Robust video fingerprinting for content-based video identification. IEEE Trans Circ Syst Evid 18(7):983–988CrossRefGoogle Scholar
  13. 13.
    Lian S, Nikolaidis N, Sencar HT (2010) Content-based video copy detection - a survey. In: Sencar HT, Velastin S, Nikolaidis N, Lian S (eds) Intelligent multimedia analysis for security applications. Springer-Verlag Berlin and Heidelberg GmbH & Co. K, pp 253–273Google Scholar
  14. 14.
    Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110CrossRefGoogle Scholar
  15. 15.
    Naor M, Shamir A (1995) Visual cryptography. In: advances in cryptology-EUROCRYPT’94, pp 1–12Google Scholar
  16. 16.
    Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: Int. Conf. on industrial informatics (INDIN), pp 709–716Google Scholar
  17. 17.
    Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional fourier transform and visual cryptography. Signal Process 92(6):1480–1491CrossRefGoogle Scholar
  18. 18.
    Singh TR, Singh KM, Roy S (2013) Video watermarking scheme based on visual cryptography and scene change detection. AEU Int J Electron Commun 67(8):645–651CrossRefGoogle Scholar
  19. 19.
    Sun J, Wang J, Zhang J, Nie X, Liu J (2012) Video hashing algorithm with weighted matching based on visual saliency. IEEE Signal Proc Let 19(6):328–331CrossRefGoogle Scholar
  20. 20.
    Sun Z, Zhu Y, Liu X, Zhang L (2013) A robust video fingerprinting algorithm based on centroid of spatio-temporal gradient orientations. KSII Trans Internet Inf 7(11):2754–2768Google Scholar
  21. 21.
    Tsai HH, Tseng HC, Lai YS (2010) Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine. J Syst Softw 83(6):1015–1028CrossRefGoogle Scholar
  22. 22.
    Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Int 31(4):757–762CrossRefGoogle Scholar
  23. 23.
    Wang ZH, Pizzolatti MS, Chang CC (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Xiyao Liu
    • 1
  • Yuesheng Zhu
    • 1
    Email author
  • Ziqiang Sun
    • 1
  • Mengge Diao
    • 1
  • Liming Zhang
    • 2
  1. 1.Communication and Information Security Lab, Shenzhen Graduate SchoolPeking UniversityShenzhenChina
  2. 2.Faculty of Science and TechnologyUniversity of MacauMacaoChina

Personalised recommendations