Abstract
In the last decade there has been a steep rise in the amount of digital media. This has made entertainment comfortable for the consumer but insecure for the producer. With affordable broadband and innumerable methods, protecting proprierty digital media assets is difficult. Digital watermarking is one way to protect these assets. In this paper, we propose an efficient watermarking method for a colour video sequence. This method improves the execution time than existing techniques due to choosing lesser number of frames to embed the watermark, while still maintaing the robustness against various attacks. The robustness is measured using PSNR values and the correlation coefficient.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
In digital watermarking, there is a host signal (cover signal) and a watermark signal. The vulnerability of easily available multimedia assets is due to many factors, like high speed internet, piracy etc. Copyright protection, authentication, traitor tracing are some of major issues in the industry [1]. Digital watermarking is considered to be a tool for verifying the owner and the unauthorized user of a document [2, 3]. Watermarking of an image is usually performed in two domains, viz. Spatial domain and Transform domain. In the spatial domain, the pixels of the host image are directly modified [4]. In the transform domain, the host image is first transformed using transforms like DCT, DWT, DFT, etc., and the watermark is then embedded into the host image [5]. We propose a hybrid method that combines the benefits of transforms like DWT and SVD along with making use of frame differences, a term familiar in video encoding. Instead of adding a watermark into all the frames of an input, a random frame is selected to add the watermark [2, 6], the frame differences are then added to this frame to generate a sequence of watermarked frames. In Sect. 2, the proposed algorithm is explained. In Sect. 3 the experimental setup and results are provided, explaining the improvement of the proposed technique over existing ones. In the end, we conclude that this is a robust as well as efficient algorithm.
2 Proposed Method
Like every other watermarking algorithm, the proposed method too consists of an embedding and an extraction/detection algorithm. In this method, the stability of the singular values of an image is combined with the adaptive nature of DWT. To increase the efficiency of the algorithm, a basis frame is identified to be watermarked. As will be shown later, the novelty in this algorithm is reducing the watermark embedding time and improving the robustness of the embedded watermark too.
2.1 Embedding Algorithm
A frame is chosen randomly from the video sequence. In order to obtain the motion parts, this frame is subtracted from all frames over all channels. DWT is applied to the basis frame, the LL band is chosen and transformed further using DWT. Then the HH subband in this double transformed image is chosen and further processed using SVD. Simultaneously, the watermark image is also transformed using DWT, unlike the basis frame, DWT is applied only once on the watermark image. SVD is applied on the HH sub band. The frame’s modified singular values are obtained by adding the watermark’s singular values. Using this newly obtained singular values, the high frequency sub-band is reconstructed. The low frequency sub-band is reconstructed using IDWT. Using this low frequency sub-band, the watermarked frame is constructed. All the respective frame differences are added to this watermarked frame to obtain all the video frames. The video frames are then used for obtaining the watermarked video (Fig. 1).
2.2 Extracting Algorithm
The watermarked/attacked video frames are divided into RGB channels. DWT is applied to these frames to get the four sub-bands as in the step 3 of the embedding algorithm. DWT is applied to the low frequency sub-bands obtained in the above step as in the step 4 of the embedding algorithm. SVD is applied to second level high-frequency sub-bands (HH). The singular values obtained are then subtracted from the original singular values. These resultant singular values are then used for extracting the watermark from the watermarked or the attacked video.
3 Experimental Results
In our study, we consider two colour videos, one is a standard video called Akiyo video and the other one is a video made locally called Sangsay sports video. These videos consist of 233 and 173 frames respectively and are of dimension 1024\(\,\times \,\)1024. Figure 2 shows a frame each, of the Akiyo video and the Sangsay sports video. In the Akiyo video, there is no change of background whereas in the Sangsay video, there is scene change with lot of motion. It is observed that the algorithm works well for both the cases. The watermark is a gray scale image, logo of our department in college as shown in Fig. 2 and is of size 512\(\,\times \,\)512.
PSNR measures the visual quality of the modified image and is expressed in decibel (dB) scale. There exists a direct proportionality between the quality of the image and the PSNR value of the image. The imperceptibility factor which plays a crucial role in watermarking is measured by PSNRÂ [5, 7]. The PSNR of 40Â dB is regarded to have high frame quality. Here in this paper, we have obtained the PSNR values to be above 65Â dB.
We compare the PSNR of the proposed technique with the existing methods, Pejman Rasti et al. [1], Lai and Tsai [8] and Agoyi et al. [9] in Figs. 3 and 4. The proposed method shows better results. Correlation coefficient is another metric used frequently in measuring the robustness of the watermark. It finds the similarity of the watermark that is extracted and the original embedded watermark.
In order to measure the proposed technique’s robustness, the watermarked video was tested against attacks like frame averaging, cropping, compression, rotation and many more as mentioned in [10].
Figure 5 shows some of the various attacks that have been performed on the watermarked Sangsay sports video. Figure 6 shows the watermark images extracted after various attacks. Table 1 shows the correlation coefficient values of the watermarked Akiyo video frame and its comparison with the existing methods [1, 8, 9]. Table 2 shows the correlation coefficient values of the watermarked Sangsay sports video frame against the same methods.
3.1 Robustness and Efficiency Improvement
To show the robustness of the scheme, we performed multiple attacks on the same frame. It is observed that the correlation coefficient values are very good. Some of the combinations are (i) Gaussian, Poisson and Salt & pepper noise attacks, (ii) Blurring, Rotation and Gaussian noise attacks, (iii) Gaussian noise, Gamma correction and rotation, (iv) Poisson noise, sharpening and flipping, (v) Frame averaging, salt & pepper noise and flipping attacks. Figure 7 shows the frames that have been introduced to multiple attacks and their respective extracted watermarks. Table 3 shows the correlation coefficient results of the frames that have been exposed to multiple attacks. This shows that the proposed technique even survives the multiple attacks as it can extract the watermarks with high visual quality.
This technique includes the watermark being embedded only in the basis frame, much in contrary to other techniques where all the frames are watermarked by repeating the same embedding steps for each frame. Because of this, the execution time of the proposed embedding algorithm is very less in comparison to the other techniques. The proposed algorithm takes 3.975Â s to embed a watermark in a video whereas the other technique takes 95.020Â s. The time taken for embedding the watermark decreases by 24x.
4 Conclusion
The proposed technique of adding a watermark to all the frames by actually adding it to only a single frame, which is selected randomly, is the novelty of this algorithm. Since this scheme embeds watermark in all the color channels of all the frames, it survives temporal attacks like FDAS (frame dropping, averaging and swapping). The watermark is found even if multiple frames are dropped. If on a lower bandwidth, the watermarked video can be transferred as a pair of, watermarked frame and the frame differences. The recipient can reconstruct the watermarked video using this single frame and the differences. The watermark can be extracted from any of the frames to prove the authenticity of the media being transmitted. This method is robust against various attacks and even combinations of them. It outperforms the existing video watermarking schemes on the correlation coefficient and PSNR values.
References
Rasti, P., Samiei, S., Agoyi, M., Escalera, S., Anbarjafari, G.: Robust non-blind color video watermarking using QR decomposition and entropy analysis. J. Vis. Commun. Image Represent. 38, 838–847 (2016)
Shaik, A.F., Anjaneyulu, S.: A hybrid DWT-SVD method for digital video watermarking using random frame selection. Int. J. Eng. Sci. 6(6), 43–48 (2016)
Dorr, G.J., Dugelay, J.-L.: Video watermarking, overview and challenges. Multimedia Communications, Image Group (2003)
Zhang, L., Li, A.: A novel watermark algorithm for non-compressed digital video. In: 2010 Second International Workshop on Education Technology and Computer Science (ETCS), vol. 1, pp. 268–271. IEEE (2010)
Agilandeeswari, L., Muralibabu, K.: A robust video watermarking algorithm for content authentication using discrete wavelet transform (DWT) and singular value decomposition (SVD). Int. J. Secur. Appl. 7(4), 145–158 (2013)
Rathod Jigisha, D., Modi, R.V.: A hybrid DWT-SVD method for digital video watermarking. Int. J. Adv. Res. Comput. Commun. Eng. 2(7), 2771–2775 (2013)
Thind, D.K., Jindal, S.: A semi blind DWT-SVD video watermarking. Procedia Comput. Sci. 46, 1661–1667 (2015)
Lai, C.-C., Tsai, C.-C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Measur. 59(11), 3060–3063 (2010)
Agoyi, M., Çelebi, E., Anbarjafari, G.: A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. Signal Image Video Process. 9(3), 735–745 (2015)
Sharma, H., Kumar, A., Mandoria, H.L.: Study and comparison analysis of a video watermarking scheme for different attacks. Int. J. Res. Manag. Technol. 4, 51–56 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Sharma, S.S., Thapa, S., Pavan Tanay, C. (2017). A Robust Color Video Watermarking Technique Using DWT, SVD and Frame Difference. In: Shankar, B., Ghosh, K., Mandal, D., Ray, S., Zhang, D., Pal, S. (eds) Pattern Recognition and Machine Intelligence. PReMI 2017. Lecture Notes in Computer Science(), vol 10597. Springer, Cham. https://doi.org/10.1007/978-3-319-69900-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-69900-4_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69899-1
Online ISBN: 978-3-319-69900-4
eBook Packages: Computer ScienceComputer Science (R0)