Multimedia Tools and Applications

, Volume 77, Issue 1, pp 327–345 | Cite as

A new robust video watermarking algorithm based on SURF features and block classification

  • Zhila Bahrami
  • Fardin Akhlaghian Tab


In this paper, we propose a robust block classification based semi-blind video watermarking algorithm using visual cryptography and SURF (Speed-Up Robust Features) features to enhance the robustness, stability, imperceptibility and real-time performance. A method of selecting the best frames in each shot and the best regions or blocks within best frames is proposed to avoid employing frame–by-frame method for generating owner’s share in order to enhance robustness as well as reducing time complexity. In our method, Owner’s share is generated using the classification of selected robust blocks within the chosen frames along with corresponding watermark information. In extraction process, the SURF features are employed to match the feature points of selected frames with all frames to detect selected frames. Moreover, we resynchronize the embedded regions from distorted video to original sequence using SURF feature points matching. Afterwards, based on these matched feature points, rotation and scaling parameters are estimated next, selected blocks are retrieved using side information being stored eventually, watermark information is reconstructed successfully. Selecting Best frames, best regions, and employing surf features make our method to be highly robust against various kinds of attacks including image processing attacks, geometrical attacks and temporal attacks. Experimental results confirm the superiority of our scheme in case of being applicable in the real world, enhancing robustness and exploiting idea imperceptibility, over previous related methods.


Digital video watermarking SURF features Block classification Visual cryptography 


  1. 1.
    Al-Taweel SA, Suma P (2009) Robust video watermarking based on 3D–DWT domain. In TENCON 2009–2009 I.E. Region 10 Conference 2009 Jan 23 (pp. 1–6)Google Scholar
  2. 2.
    Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Transactions on Information Forensics and Security 9(9):1502–1517CrossRefGoogle Scholar
  3. 3.
    Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. ComputVision Image Understand 10:346–359CrossRefGoogle Scholar
  4. 4.
    Bhattacharya S, Chattopadhyay, T and Pal A (2006) A survey on different video watermarking techniques and comparative analysis with reference to H. 264/AVC. In Consumer Electronics. ISCE’06. IEEE Tenth International Symposium on, pp. 1–6Google Scholar
  5. 5.
    Campisi P, Neri A (2005) Video watermarking in the 3D–DWT domain using perceptual masking. In Image Processing, ICIP 2005. IEEE International Conference on 2005 Sep 11, Vol. 1, pp. I–997Google Scholar
  6. 6.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. Image Processing, IEEE Transactions on 14(2):253–266CrossRefGoogle Scholar
  7. 7.
    Chan PW, Lyu MR (2003) A DWT-based digital video watermarking scheme with error correcting. In Code, Proceedings Fifth International Conference on Information and Communications Security ICICSGoogle Scholar
  8. 8.
    Chang CC, Hsiao JY, Yeh JC (2002) A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Imaging science journal 50(3):133–140CrossRefGoogle Scholar
  9. 9.
    Chen H, Zhu Y (2014) A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique. Multimed Tools Appl 71(3):991–1012CrossRefGoogle Scholar
  10. 10.
    Chen WJ, Chang CC, Le TH (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301CrossRefGoogle Scholar
  11. 11.
    Chen Y, Tsai D-S, Horng G (2012) Comment on Bcheating prevention in visual cryptography. IEEE Trans Image Process 21:3319–3323MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Cvejic N, Seppänen T (2005) Increasing robustness of LSB audio steganography by reduced distortion LSB coding. J UCS 11(1):56–65Google Scholar
  13. 13.
    Fallahpour M, Shirmohammadi S, Semsarzadeh M, Zhao J (2014) Tampering detection in compressed digital video using watermarking. IEEE Trans Instrum Meas 63(5):1057–1072CrossRefGoogle Scholar
  14. 14.
    He D, Sun Q, Tian Q (2004) A secure and robust object-based video authentication system. EURASIP Journal on Advances in Signal Processing 1:1–6Google Scholar
  15. 15.
    Ho YK, Wu MY (2004) Robust object-based watermarking scheme via shape self-similarity segmentation. Pattern Recogn Lett 25(15):1673–1680CrossRefGoogle Scholar
  16. 16.
    Hsu CS, Hou YC (2005a) A visual cryptography and statistics based method for ownership identification of digital images. In Proceedings of World Academy of Science, Engineering and Technology 2:172–175Google Scholar
  17. 17.
    Hsu CS, Hou YC (2005b) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003CrossRefGoogle Scholar
  18. 18.
    Hu C, Tzeng W (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Huang HY, Lin YR, Hsu WH (2008) Robust technique for watermark embedding in a video stream based on a block-matching algorithm. Opt Eng 47:037402–037402CrossRefGoogle Scholar
  20. 20.
    Khalilian H, Bajic IV (2013) Video watermarking with empirical PCA-based decoding. IEEE Trans Image Process 22(12):4825–4840MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Process Mag 17(5):20–46CrossRefGoogle Scholar
  22. 22.
    Lee JS, Kim WY (2004) A New Object-Based Image Watermarking Robust to Geometrical Attacks. In: Aizawa K, Nakamura Y, Satoh S (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3332. Springer, Berlin, HeidelbergGoogle Scholar
  23. 23.
    Ling H, Wang L, Zou F, Lu Z, Li P (2011) Robust video watermarking based on affine invariant regions in the compressed domain. Signal Process 91(8):1863–1875CrossRefzbMATHGoogle Scholar
  24. 24.
    Masoumi M, Amiri S (2013) A blind scene-based watermarking for video copyright protection. AEU-Intern J Electron Comm 67(6):528–535CrossRefGoogle Scholar
  25. 25.
    Megha KD, Vaidya NP, Patel AP (2013) Digital watermarking: data hiding techniques using DCT-DWT algorithm. International Journal of Advanced Research in Computer and Communication Engineering.Google Scholar
  26. 26.
    Schlauweg M, Pröfrock D, Zeibich B, Müller E (2008) Self-synchronizing robust texel watermarking in Gaussian scale-space. In Proceedings of the 10th ACM workshop on Multimedia and security. Sep 22 pp. 53–62Google Scholar
  27. 27.
    Shih FY, Wu SY (2003) Combinational image watermarking in the spatial and frequency domains. Pattern Recogn 36(4):969–975CrossRefGoogle Scholar
  28. 28.
    Singh TR, Singh KM, Roy S (2013) Video watermarking scheme based on visual cryptography and scene change detection. AEU-Intern J Electron Comm 67(8):645–651CrossRefGoogle Scholar
  29. 29.
    Sun, Tanfeng et al. (2009a) A novel differential energy video watermarking based on Watson visual model. Electronic Commerce and Security, 2009. ISECS’09. Second International Symposium on. Vol. 1Google Scholar
  30. 30.
    Sun T, Jiang X, Shi S, Lin Z, Fu G (2009b) A novel differential energy video watermarking based on Watson visual model. In Electronic Commerce and Security ISECS’09 Second International Symposium on May 22 1:179–183CrossRefGoogle Scholar
  31. 31.
    Sun Z, Liu J, Sun J, Sun X, Ling J (2009c) A motion location based video watermarking scheme using ICA to extract dynamic frames. Neural Comput & Applic 18:507–514CrossRefGoogle Scholar
  32. 32.
    Swanberg D, Shu CF, Jain RC (1993) Knowledge-guided parsing in video databases. In IS &T/SPIE’s symposium on electronic imaging: science and technology. Intern Soc Optics Photon 14:13–24Google Scholar
  33. 33.
    Swanson MD, Zhu B, Tewfik AH (1998) Multiresolution scene-based video watermarking using perceptual models. Selected Areas in Communications, IEEE Journal 16(4):540–550CrossRefzbMATHGoogle Scholar
  34. 34.
    Thanh TM, Hiep PT, Tam TM, Tanaka K (2014) Robust semi-blind video watermarking based on frame-patch matching. AEU-Intern J Electron Comm 68(10):1007–1015CrossRefGoogle Scholar
  35. 35.
    Viet-Quoc P, Miyaki T, Yamasaki T, Aizawa K (2008) Robust object-based watermarking using feature matching. IEICE Trans Inf Syst 91(7):2027–2034Google Scholar
  36. 36.
    Wang Z, Bovik AC, Sheikh HR, Simon celli EP (2004) Image quality assessment: from error visibility to structural similarity. Image Processing, IEEE Transactions on 13(4):600–612CrossRefGoogle Scholar
  37. 37.
    Wang G, Liu F, Yan W (2016) 2D barcodes for visual cryptography. Multimedia Tools Appl 75(2):1223–1241CrossRefGoogle Scholar
  38. 38.
    Weir J, Yan W (2012) Authenticating VC shares using 2D Barcodes. In: IWDW 2012: 196–210. Springer (LNCS 7128)Google Scholar
  39. 39.
    Wu CH et al. (2010) A flexible H.264/AVC compressed video watermarking scheme using particle swarm optimization based dither modulation. Int J Electron Commun (AEU)Google Scholar
  40. 40.
    Xuemei J, Quan L, Qiaoyan W (2013) A new video watermarking algorithm based on shot segmentation and block classification. Multimed Tools Appl 62(3):545–560CrossRefGoogle Scholar
  41. 41.
    Yassin NI, Salem NM, El Adawy MI (2012) Block based video watermarking scheme using wavelet transform and principle component analysis. IJCSI Inter J Compr Sci Issues 9(1):296–301Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer EngineeringUniversity of KurdistanKurdistanIran

Personalised recommendations