Multimedia Tools and Applications

, Volume 77, Issue 20, pp 26769–26791 | Cite as

A robust video watermarking based on feature regions and crowdsourcing

  • Asma KerbicheEmail author
  • Saoussen Ben Jabra
  • Ezzeddine Zagrouba
  • Vincent Charvillat


Video watermarking technique aims at resolving insecurity problems. Recently, many approaches have been proposed in order to satisfy the new constraints of video applications such as robustness to collusion attacks, high level of security and signature invisibility. In this paper, a new video watermarking approach based on feature regions is proposed. The originality of this approach is to use crowdsourcing technique in order to detect feature regions. First, video summary is generated. This summary is then used to detect the first type of feature regions based on crowdsourcing technique. On the other hand, mosaic is generated from original video to detect the second type of feature region browsed by the moving objects. Finally, the signature is embedded into the mosaic generated after merging these two types of feature regions using multi-frequential watermarking scheme. Experimental results have shown a high level of invisibility thanks to the efficient choice of the embedded target. Moreover, the proposed approach is robust against several attacks especially to collusion attacks.


Video watermarking Crowdsourcing Feature regions Collusion attacks Video mosaic 


  1. 1.
    Amri S, Barhoumi W, Zagrouba E (2009) Traitement de l’ombrage en vue d’une détection précise des objets mobiles dans des vidéos complexes, Traitement et Analyse de l’Information : Méthodes et ApplicationsGoogle Scholar
  2. 2.
    Azeem N, Ahmad I, Roohullah S, Tahir M, Ullah F, Khan F, Sharayu B, Nishigandha J (2016) A new robust video watermarking technique using H.264/AAC codec luma components based on DCT. IJARIIE-ISSN(O)-2395-4396, 2(3)Google Scholar
  3. 3.
    Bayoudh I, Jabra SB, Zagrouba E (2015) On line video watermarking a new robust approach of video watermarking based on dynamic multi-sprites generation. In: International conference on computer vision theory and applications, At Berlin Germany VISAPPGoogle Scholar
  4. 4.
    Bernstein MS, Little G, Miller RC, Hartmann B, Ackerman MS, Karger DR, Crowell et Katrina Panovich D (2010) Soylent: a word processor with a crowd inside. In: Proceedings of the 23nd Annual ACM symposium on user interface software and technology. ACM, pp 313–322Google Scholar
  5. 5.
    Bhardwaj A, Khuteta A (2017) Digital video watermarking techniques: a review. Int J Eng Comput Sci (IJECS) 6(5):21328–21332. CrossRefGoogle Scholar
  6. 6.
    Carlier A, Charvillat V, Ooi W T, Grigoras R, Morin G (2010) Crowd-sourced automatic zoom and scroll for video retargeting. In: ACM Multimedia, pp 201–210Google Scholar
  7. 7.
    Carlier A, Guntur R, Charvillat V, Ooi WT (2011) Combining content-based analysis and crowdsourcing to improve user interaction with zoomable video ACMMM’11, pp 43–52Google Scholar
  8. 8.
    Datta S, Nath A (2014) Data authentication using digital watermarking. International Journal of Advance Researchin Computer Science and Management StudiesGoogle Scholar
  9. 9.
    Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU - Int J Electron Commun 67(3):189–196CrossRefGoogle Scholar
  10. 10.
    Gottlieb L, Choi J, Kelm P, Sikora et Gerald Friedland T (2012) Pushing the limits of mechanical turk: qualifying the crowd for video geo-location. In: Proceedings of the ACM multimedia 2012 workshop on crowdsourcing for multimedia. ACM, pp 23–28Google Scholar
  11. 11.
    Guan G, Wang Z, Mei S, Ott M, He M, Feng DD (2014) A top-down approach for video summarization. ACM Trans Multimed Comput Commun Appl 11 (1):1–21CrossRefGoogle Scholar
  12. 12.
    Howe J (2006) The rise of crowdsourcing. Wired Mag 14(6):1–4Google Scholar
  13. 13.
    Jain K, Raju USN (2015) A digital video watermarking algorithm based on LSB and DCT. Journal of Information Security ResearchGoogle Scholar
  14. 14.
    Joshi AM, Gupta S, Girdhar M, Agarwal P, Sarker R (2017) Combined DWT–DCT-based video watermarking algorithm using Arnold transform technique. In: Proceedings of the international conference on data engineering and communication technology, pp 455–463Google Scholar
  15. 15.
    Kerbiche A, Jabra SB, Zagrouba E (2012) A robust video watermarking based on image mosacing and multifrequential embedding. In: The IEEE International conference on intelligent computer communication and processing (ICCP’2012). Cluj-Napoca, pp 159–166Google Scholar
  16. 16.
    Kerbiche A, Jabra SB, Zagrouba E (2012) Tatouage video robust basé sur les régions d’intérêt. In: The African Conference on research in computer science and applied mathematics (CARI’2012). Algiers, pp 332–339Google Scholar
  17. 17.
    Kirthika A, Senthilkumar A, Nithya T (2016) DWT based watermarking system for video authentication using region of interest. Middle-East Journal of Scientific Research 24 (Special Issue on Innovations in Information, Embedded and Communication Systems), 166–170Google Scholar
  18. 18.
    Koubaa M, Elarbi M, Ben Amar C, Nicolas H (2012) Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimedia Tools and ApplicationsGoogle Scholar
  19. 19.
    Mao A, Kamar E, Chen Y, Horvitz E, Schwamb ME, Lintott CJ, Smith et Arfon M (2013) Volunteering versus work for pay: incentives and tradeoffs in crowdsourcing. In: First AAAI Conference on human computation and crowdsourcingGoogle Scholar
  20. 20.
    Morten G, Fish CM (2016) Mitigation of collusion attacks against watermarked content. Patent Application PublicationGoogle Scholar
  21. 21.
    Oleson D, Sorokin A, Laughlin GP, Hester V, Le et Lukas Biewald J (2011) Programmatic gold: targeted and scalable quality assurance in crowdsourcing. Human Comput 11:11Google Scholar
  22. 22.
    Rana S, Sur A (2015) 3D video watermarking using DT-DWT to resist synthesis view attack. In: 23rd European signal processing conference (EUSIPCO)Google Scholar
  23. 23.
    Salvador A, Carlier A, Giro-i Nieto X, Marques O, Charvillat V (2013) Crowdsourced object segmentation with a game. In: ACM CrowdMMGoogle Scholar
  24. 24.
    Srinivasa Rao Ch, Bharathi Devi VS (2016) Comparative analysis of HVS based robust video watermarking scheme, microelectronics, electromagnetics and telecommunications. Proceed ICMEET 372:103–110Google Scholar
  25. 25.
    Swati S, Hayat K, Shahid Z (2014) A watermarking scheme for high efficiency video coding (HEVC). PLoS One, 9(8)CrossRefGoogle Scholar
  26. 26.
    Tyagi S, Singh HV, Agarwal R (2017) Image watermarking using genetic algorithm in DCT domain. International Conference on Inventive Systems and Control (ICISC)Google Scholar
  27. 27.
    Venugopala PS, Jain S, Sarojadevi H, Niranjan Chiplunkar N (2016) Study of possible attacks on image and video watermark. International conference on computing for sustainable global development (INDIACom)Google Scholar
  28. 28.
    Verma AK, Singhal M, Patvardhan C (2013) Robust temporal video watermarking using YCbCr color space in Wavelet domain. In: 2013 IEEE 3rd International on advance computing conference (IACC), pp 1195–1200Google Scholar
  29. 29.
    Zagrouba E, Barhoumi W, Amri S (2009) An efficient image-mosaicing method based on multifeature matching. Springer Machine Vision and ApplicationsGoogle Scholar
  30. 30.
    Zhao Y, Zhu Q (2014) Evaluation on crowdsourcing research: current status and future direction. Inf Syst Front, 1–18Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Laboratory LIMTIC, High Institute of Computer ScienceUniversity of Tunis El ManarArianaTunisia
  2. 2.Laboratory IRIT, Team of Research VORTEX ENSEEIHT, INP ToulouseUniversity of ToulouseToulouseFrance

Personalised recommendations