Skip to main content
Log in

An efficient video watermarking based security model

  • Technical Paper
  • Published:
Microsystem Technologies Aims and scope Submit manuscript

Abstract

Watermarking is defined as about hiding any valuable information set in the particular digital media by itself through modifying the particular graphic contents. In our proposed method, the process of watermarking is performed from video data. In this work group search optimization is used to determine the position, selection for watermarking. The proposed framework includes the following stages particularly, frame conversion, preprocessing, watermark image selection, watermarking position selection and inverse watermarking. Initially, the input video is segregated into a number of frames. Then in preprocessing, both the input and the original image are resized and the original image is transformed by discrete wavelet transform. Then the secret data to be embedded is selected and replaced in the watermark position determined through the Group Search Optimization (GSO) Algorithm. Finally, inverse watermarking is performed to retrieve the secret data. The proposed technique is implemented in the working platform of MATLAB which shows improved results by using GSO as compared to without GSO method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Asikuzzaman M, Pickering MR (2017) An overview of digital video watermarking. In: IEEE transactions on circuits and systems for video technology, accepted article

  • Asikuzzaman M, Alam MJ, Lambert AJ (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Trans Inf Forens Secur 9(9):1502–1517

    Article  Google Scholar 

  • Bloom JA, Cox IJ, Kalker T, Linnartz J-PMG, Miller ML, Traw CBS (1999) Copy protection of DVD video. Proceed IEEE 87(7):1267–1276

    Article  Google Scholar 

  • Bors AG, Luo M (2013) Optimized 3D watermarking for minimal surface distortion. IEEE Trans Image Process 22(5):1822–1835

    Article  Google Scholar 

  • Deng H, Zhang J, Chai X (2014) The design and implementation of flash animation watermarking. In: IEEE workshop on electronics, computer and applications, pp 489–491

  • Dhar PK, Khan MI, Chowdhury S (2011) An efficient image watermarking system based on error correcting codes in DCT domain. MIST J Galaxy 3(3)

  • Eggers JJ, Bauml R, Tzschoppe R, Girod B (2003) Scalar costa scheme for information embedding. IEEE Trans Signal Process 51(4):1003–1019

    Article  MathSciNet  MATH  Google Scholar 

  • Fallahpour M, Shirmohammadi S, Semsarzadeh M, Zhao J (2014) Tampering detection in compressed digital video using watermarking. IEEE Trans Inst Measurement 63(5):1057–1072

    Article  Google Scholar 

  • Gogoi M, Bhuyan HK, Mahanta K, Das DJ, Dutta A (2013) Image and video based double watermark extraction spread spectrum watermarking in low variance region. Int J Adv Comput Sci Appl 4(6):112–116

    Google Scholar 

  • Golikeri A, Nasiopoulos P, Wang ZJ (2007) Robust digital video watermarking scheme for H. 264 advanced video coding standard. J Electron Imaging 16(4):1–14

    Article  Google Scholar 

  • He S, Saunders JR (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973–990

    Article  Google Scholar 

  • Isac B, Santhi V (2011) A study on digital image and video watermarking schemes using neural networks. Int J Comput Appl 12(9):1–6

    Google Scholar 

  • Jadhav A, Kolhekar M (2014) Digital watermarking in video for copy right protection. In: International conference on electronic systems, signal processing and computing technologies, pp 140–144

  • Kalker T, Depovere G, Haitsma J, Maes M (1999) A video watermarking system for broadcast monitoring. In: Proceedings of the SPIE, pp 103–112

  • Khalilian H, Bajic IV (2013) Video watermarking with empirical PCA-based decoding. IEEE Trans Image Process 22(12):4825–4840

    Article  MathSciNet  MATH  Google Scholar 

  • Kuppusamy K, Thamodaran K (2012) Optimized image watermarking scheme based on PSO. Spring Int Conf Model Optim Comput 38:493–503

    Google Scholar 

  • Leena GD, Dhayanithy SS (2013) Robust image watermarking in frequency domain. Int J Innov Appl Stud 2(4):582–587

    Google Scholar 

  • Meng J, Chang SF (1998) Embedding visible video watermarks in the compressed domain. In: IEEE image processing conference, pp 474–477

  • Morimoto N (1999) Digital watermarking technology with practical applications informing science. Spec Issue Multimed Inf Technnl 2(4):107–111

    Google Scholar 

  • Preda RO, Oprea C, Pirnog I, Perişoară LA (2012) Robust digital video watermarking in the spatial and wavelet domain. In: 7th international conference on digital telecommunications, pp 78–83

  • Rao TS, Kurra RR (2016) Integrity based video watermarking using gaussian based DWT embedding and extraction process. Int J Appl Eng Res 11(5):3235–3240 (ISSN:0973-4562)

    Google Scholar 

  • Sarkar R, Ravi S (2012) A survey of digital video watermarking. Int J Comput Sci Appl 1(2):3015–3018

    Google Scholar 

  • Sharma V, Mann PS (2017) A review on various optimized image watermarking techniques. Int J Comput Appl 162(2):26–30

    Google Scholar 

  • Shojanazeri H, Adnan WAW, Ahmad SMS (2015) Video watermarking techniques for copyright protection and content authentication. Int J Comput Inf Syst Indus Manage Appl 5:652–660

    Google Scholar 

  • Siast J, Stankowski J, Grajek T, Domański M (2013) Digital watermarking with local strength adjustment for AVC-compressed HDTV bitstreams. In: 30th picture coding symposium, pp 53–56

  • Song C, Sudirman S, Merabti M (2009) Recent advances and classification of watermarking techniques in digital images. In: International conference, pp 1–6

  • Sourav Bhattacharya T, Chattopadhyay, Arpan Pal (2006) A survey on different video watermarking techniques and comparative analysis with reference to H. 264/AVC. In: IEEE 10th International symposium on Consumer Electronics, pp 1–6

  • Stutz T, Autrusseau F, Uhl A (2014) Non-blind structure-preserving substitution watermarking of H.264/CAVLC inter-frames. IEEE Trans Multimed 16(5):1337–1349

    Article  Google Scholar 

  • Sundararajan M, Yamuna G (2013) DWT based scheme for video watermarking. In: IEEE international conference on communication and signal processing, pp 460–464

  • Xu D, Wang R, Wang J (2011) A novel watermarking scheme for H. 264/AVC video authentication. J Image Commun 26(6):267–279

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahesh Chandra.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, G., Gupta, V.K. & Chandra, M. An efficient video watermarking based security model. Microsyst Technol 24, 2539–2548 (2018). https://doi.org/10.1007/s00542-017-3689-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00542-017-3689-x

Navigation