Video Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Part of the Springer Topics in Signal Processing book series (STSP, volume 11)


Recently, video is the major part in the applications such as Internet multimedia, videophone, video on demand, set-top box, and video conference, which requires a security mechanism to protect it from intentional and unintentional attacks. Video watermarking can serve as an urgent secure component to enhance security and privacy of these applications.


Motion Vector Video Frame Video Content Image Watermark Watermark Technique 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bodo, Y., N. Laurent, and J.-L. Dugelay. 2003. Watermarking video, hierarchical embedding in motion vectors. In Proceedings of the 2003 international conference on image processing, ICIP 2003. IEEE.Google Scholar
  2. 2.
    Barni, M., et al. 2000. A robust watermarking approach for raw video. In Proceedings of the 10th international packet video workshop.Google Scholar
  3. 3.
    Kalker, T., et al. 1999. Video watermarking system for broadcast monitoring. In Electronic imaging’99. International Society for Optics and Photonics.Google Scholar
  4. 4.
    Dittmann, J., M. Stabenau, and R. Steinmetz. 1998. Robust MPEG video watermarking technologies. In Proceedings of the sixth ACM international conference on Multimedia. ACM.Google Scholar
  5. 5.
    Langelaar, G.C., R.L. Lagendijk, and J. Biemond. 1998. Real-time labeling of MPEG-2 compressed video. Journal of Visual Communication and Image Representation 9(4): 256–270.CrossRefGoogle Scholar
  6. 6.
    Kim, S.-W., et al. 1999. Perceptually tuned robust watermarking scheme for digital video using motion entropy masking.Google Scholar
  7. 7.
    Hartung, F., and B. Girod. 1998. Watermarking of uncompressed and compressed video. Signal Processing 66(3): 283–301.CrossRefzbMATHGoogle Scholar
  8. 8.
    Martin, X.N., M. Schmucker, and C. Busch. 2002. Video watermarking resisting to rotation, scaling, and translation. In Proceedings of the SPIE security watermarking of multimedia contents IV. Citeseer.Google Scholar
  9. 9.
    Swanson, M.D., B. Zhu, and A.H. Tewfik. 1998. Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications 16(4): 540–550.CrossRefzbMATHGoogle Scholar
  10. 10.
    Deguillaume, F., et al. 1999. Robust 3D DFT video watermarking. In Electronic imaging’99. International Society for Optics and Photonics.Google Scholar
  11. 11.
    Kucukgoz, M., et al. 2005. Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. In Electronic imaging 2005. International Society for Optics and Photonics.Google Scholar
  12. 12.
    Zhang, L.-H., H.-T. Wu, and C.-L. Hu. 2004. A video watermarking algorithm based on 3D Gabor transform. Journal of Software 15(8): 1252–1258.zbMATHGoogle Scholar
  13. 13.
    Mobasseri, B.G., and D. Cinalli. 2004. Reversible watermarking using two-way decodable codes. In Electronic imaging 2004. International Society for Optics and Photonics.Google Scholar
  14. 14.
    Jordan, F. 1997. Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. ISO/IEC Doc. JTC1/SC 29/QWG 11 MPEG 97/M 2281.Google Scholar
  15. 15.
    Zhang, J., J. Li, and L. Zhang. 2001. Video watermark technique in motion vector. In Proceedings of XIV Brazilian symposium on computer graphics and image processing. IEEE.Google Scholar
  16. 16.
    Yann, B., L. Nathalie, and D. Jean-Luc. 2004. A comparative study of different modes of perturbation for video watermarking based on motion vectors. In Proceedings of the 12th European signal processing conference. IEEE.Google Scholar
  17. 17.
    Bodo, Y., et al. 2004. Video waterscrambling: Towards a video protection scheme based on the disturbance of motion vectors. EURASIP Journal on Advances in Signal Processing 2004(14): 1–14.CrossRefGoogle Scholar
  18. 18.
    Menezes, A.J., P.C. Van Oorschot, and S.A. Vanstone. 1996. Handbook of applied cryptography. Boca Raton: CRC press.Google Scholar
  19. 19.
    Wu, M., et al. 2004. Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine 21(2): 15–27.CrossRefGoogle Scholar
  20. 20.
    Cayre, F., et al. 2003. Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry. Signal Processing: Image Communication 18(4): 309–319.MathSciNetGoogle Scholar
  21. 21.
    Petitcolas, F.A., R.J. Anderson, and M.G. Kuhn. 1998. Attacks on copyright marking systems. In Information hiding. Berlin: Springer.Google Scholar
  22. 22.
    Doerr, G., and J.-L. Dugelay. 2003. A guide tour of video watermarking. Signal Processing: Image Communication 18(4): 263–282.Google Scholar
  23. 23.
    Zong, T., et al. 2014. Robust histogram shape based method for image watermarking.Google Scholar
  24. 24.
    Cheung, W. 2000. Digital image watermarking in spatial and transform domains. In Proceedings of the TENCON 2000. IEEE.Google Scholar
  25. 25.
    Navas, K., et al. 2008. DWT-DCT-SVD based watermarking. In 3rd international conference on communication systems software and middleware and workshops, COMSWARE 2008. IEEE.Google Scholar
  26. 26.
    Kang, X., et al. 2003. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology 13(8): 776–786.CrossRefGoogle Scholar
  27. 27.
    Li, J., et al. 2009. An adaptive secure watermarking scheme for images in spatial domain using fresnel transform. In Information science and engineering (ICISE). IEEE.Google Scholar
  28. 28.
    Ghazy, R.A., et al. 2015. Block-based SVD image watermarking in spatial and transform domains. International Journal of Electronics 102(7): 1091–1113.CrossRefGoogle Scholar
  29. 29.
    Lin, W.-H., et al. 2008. An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Transactions on Multimedia 10(5): 746–757.CrossRefGoogle Scholar
  30. 30.
    Ma, B., et al. 2014. Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimedia Tools and Applications 72(1): 637–666.CrossRefGoogle Scholar
  31. 31.
    Agarwal, H., B. Raman, and I. Venkat. 2014. Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications: 1–39.Google Scholar
  32. 32.
    Wang, Y., and A. Pearmain. 2006. Blind MPEG-2 video watermarking in DCT domain robust against scaling. IEE Proceedings-Vision, Image and Signal Processing 153(5): 581–588.CrossRefGoogle Scholar
  33. 33.
    Bhatnagar, G., and B. Raman. 2012. Wavelet packet transform-based robust video watermarking technique. Sadhana 37(3): 371–388.CrossRefzbMATHGoogle Scholar
  34. 34.
    Khalilian, H., S. Ghaemmaghami, and M. Omidyeganeh. 2009. Digital video watermarking in 3-D ridgelet domain. In 11th international conference on advanced communication technology, ICACT 2009. IEEE.Google Scholar
  35. 35.
    Li, X., and R. Wang. 2007. A video watermarking scheme based on 3D-DWT and neural network. In Ninth IEEE international symposium on multimedia workshops, ISMW’07. IEEE.Google Scholar
  36. 36.
    Huai-Yu, Z., L. Ying, and W. Cheng-Ke. 2004. A blind spatial-temporal algorithm based on 3D wavelet for video watermarking. In 2004 IEEE international conference on multimedia and expo, ICME’04. IEEE.Google Scholar
  37. 37.
    Yassin, N.I., N.M. Salem, and M.I. El Adawy. 2014. QIM blind video watermarking scheme based on wavelet transform and principal component analysis. Alexandria Engineering Journal 53(4): 833–842.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations