Advertisement

Multimedia Tools and Applications

, Volume 76, Issue 15, pp 16239–16261 | Cite as

Metadata hiding for UAV video based on digital watermarking in DWT transform

  • Nasr addin Ahmed Salem Al-Maweri
  • Aznul Qalid Md Sabri
  • Ali Mohammed Mansoor
  • Unaizah Hanum Obaidellah
  • Erma Rahayu Mohd Faizal
  • Joan Lai P C
Article
  • 267 Downloads

Abstract

As the advent of the Unmanned Aerial Vehicles (UAVs) has been increased, the protection of the information within the transmitted or stored video has become a big challenge. Most known drone systems attach metadata of the recorded video in separate files or in the header of the video. Current techniques make the metadata unsecure and easy to get lost and removed as well as it occupies more storage and bandwidth. In this paper, an efficient method is proposed to hide the metadata of UAVs video using the technology of digital watermarking. Discrete Wavelet Transform (DWT) is used to implement the embedding of the information robustly. The middle frequencies coefficients reside on CH3 sub-band are utilized to hide the watermark bits. In addition, a new scrambling algorithm is proposed to secure the information before hiding. The adaption of the proposed video watermarking algorithm to hide the metadata of the UAV video is achieved. The experimental results prove the high performance of the proposed method. The method had unnoticeable impact on the video quality where the PSNR of 44 dB is attained. The experiments show that the method achieves high robustness under various attacks and provides enough capacity for metadata hiding of UAV video.

Keywords

UAV Drones Metadata hiding Video watermarking Copyright protection Image scrambling 

Notes

Acknowledgments

This work is funded under the University of Malaya’s Research Grant (UMRG), grant number RP030A-14AET and the Fundamental Research Grant (FRGS), grant number FP061-2014A.

References

  1. 1.
    Agilandeeswari L and Ganesan K (2015) A robust color video watermarking scheme based on hybrid embedding techniques. Multimedia Tools and Applications, SpringerGoogle Scholar
  2. 2.
    Ahuja R and Bedi SS (2015) Copyright protection using blind video watermarking algorithm based on mpeg-2 structure. In: International Conference on Computing, Communication and Automation (ICCCA2015) IEEE, pp. 1048–1053Google Scholar
  3. 3.
    Alattar AM, Lin ET, Celik MU (2003) Digital watermarking of low bit-rate advanced simple profile mpeg-4 compressed video. IEEE Trans Circuits Syst Video Technol 13:787–800CrossRefGoogle Scholar
  4. 4.
    Al-Maweri NAAS, Adnan WAW, Ramli AR, Samsudin K, Ahmad SMS (2015) A hybrid digital image watermarking algorithm based on dct-dwt and auto-thresholding. Secur Commun Netw 8(18):4373–4395. doi: 10.1002/sec.1371 CrossRefGoogle Scholar
  5. 5.
    Al-Maweri NAAS, Ali R, Adnan WAW, Ramli AR and Rahman SMSAA (2016) State-of-the-art in techniques of text digital watermarking: challenges and limitations. J Comput SciGoogle Scholar
  6. 6.
    Chen Y-H, Huang H-C (2015) Coevolutionary genetic watermarking for owner identification. Neural Comput & Applic 26:291–298CrossRefGoogle Scholar
  7. 7.
    Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU Int J Electron Commun 67(3):189–196, [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1434841112001781 CrossRefGoogle Scholar
  8. 8.
    Gu K, Zhai G, Yang X & Zhang W (2012) An improved full-reference image quality metric based on structure compensation Signal Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific, 1–6Google Scholar
  9. 9.
    Gupta M, Parmar G, Gupta R, Saraswat M (2015) Discrete wavelet transform-based color image watermarking using uncorrelated color space and artificial bee colony. Int J Comput Intell Syst 8(2):364–380. doi: 10.1080/18756891.2015.1001958 CrossRefGoogle Scholar
  10. 10.
    Huang H-C, Fang W-C (2010) Metadata-based image watermarking for copyright protection. Simul Model Pract Theory 18:436–445CrossRefGoogle Scholar
  11. 11.
    Lilien LT, Othmane LB, Pelin A, de Carlo A, Salih RM, Bhargava B (2014) A simulation study of adhoc networking of UAVs with opportunistic resource utilization networks. J Netw Comput Appl 38:3–15CrossRefGoogle Scholar
  12. 12.
    Liu S, Chen DB-W, Gong L, Ji W and Seo S (2015) A real-time video watermarking algorithm for authentication of small-business wireless surveillance networks. Int J Distrib Sensor Netw, HindawiGoogle Scholar
  13. 13.
    Lowenthal MM (2015) Intelligence: from secrets to policy, 6th ed. USA: CQ Press, SAGE PublicationGoogle Scholar
  14. 14.
    Marcinak MP and Mobasseri BG (2005) Digital video watermarking for metadata embedding in uav video. In: Military Communications Conference, IEEEGoogle Scholar
  15. 15.
    Masoumia M, Amirib S (2013) A blind scene-based watermarking for video copyright protection. AEU Int J Electron Commun 67:528–535CrossRefGoogle Scholar
  16. 16.
    Mohammed F, Idries A, Mohamed N, Al-Jaroodi J and Jawhar I (2014) Uavs for smart cities: Opportunities and challenges. In: Unmanned Aircraft Systems (ICUAS), International Conference on, May 2014, pp. 267–273Google Scholar
  17. 17.
    Mstafa RJ & Elleithy KM (2015) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes Multimed Tools ApplGoogle Scholar
  18. 18.
    Mstafa RJ & Elleithy KM (2016) A DCT-based robust video steganographic method using BCH error correcting codes 2016 I.E. Long Island Systems, Applications and Technology Conference (LISAT), pp 1–6Google Scholar
  19. 19.
    Nex F, Remondino F (2013) Uav for 3d mapping applications: a review. Appl Geomatics 6(1):1–15. doi: 10.1007/s12518-013-0120-x CrossRefGoogle Scholar
  20. 20.
    Paganini P (2014) Privacy and security issues for the usage of civil drones. Infosec InistiuteGoogle Scholar
  21. 21.
    Quaritsch M, Kruggl K, Wischounig-Strucl D, Bhattacharya S, Shah M, Rinner B (2010) Networked uavs as aerial sensor network for disaster management applications. E & I Elektrotech Inftech 127:56–63CrossRefGoogle Scholar
  22. 22.
    Rango A, Laliberte A, Steele C, Herrick JE, Bestelmeyer B, Schmugge T, Roanhorse A, Jenkins V (2006) Using unmanned aerial vehicles for rangelands: current applications and future potentials. Environ Pract 8:159–168, [Online]. Available: http://journals.cambridge.org/article_S1466046606060224 CrossRefGoogle Scholar
  23. 23.
    Saleem Y, Rehmani MH, Zeadally S (2015) Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges. J Netw Comput Appl 50:15–31, [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1084804514002811 CrossRefGoogle Scholar
  24. 24.
    Thanh TM, Hiep PT, Tam TM, Tanaka K (2014) Robust semi-blind video watermarking based on frame-patchmatching. AEU Int J Electron Commun 68:1007–1015CrossRefGoogle Scholar
  25. 25.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612CrossRefGoogle Scholar
  26. 26.
    Zhao Y and Zhou Z (2012) Multipurpose blind watermarking algorithm for color image based on DWT and DCT. In: 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp 1–4Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Nasr addin Ahmed Salem Al-Maweri
    • 1
  • Aznul Qalid Md Sabri
    • 1
  • Ali Mohammed Mansoor
    • 1
  • Unaizah Hanum Obaidellah
    • 1
  • Erma Rahayu Mohd Faizal
    • 1
  • Joan Lai P C
    • 2
  1. 1.Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia
  2. 2.UM Centre of Innovation and CommercializationUniversity of MalayaKuala LumpurMalaysia

Personalised recommendations