Sei sulla pagina 1di 8

A Proposed Robust Video Watermarking Algorithm:

Enhanced Extraction from Geometric Attacks


R. Maharajan1, Abeer Alsadoon1, P.W.C. Prasad1, A. M. S. Rahma2, A. Elchouemi3, SMN Arosha Senanayake4
1
School of Computing and Mathematics, Charles Sturt University, Sydney, Australia
2
Computer Science Department, University of Technology, Baghdad, Iraq
3
Hewlett Packard Enterprise
4
Faculty of Science, Universiti Brunei Darussalam

Abstract: This paper proposes a new integrated system based on a Moreover, this algorithm has provided high imperceptibility,
video watermarking algorithm with high imperceptibility, dual security and high payload.
improved security, robust against common image and video
processing attacks and geometric attacks. The proposed However, this algorithm has some limitations regarding
algorithm is based on the features of a selected best algorithm by robustness against geometric attacks and security provided by
Agilandeeswari and Ganesan and its limitations. The advantages traditional Arnold Transform. To overcome these limitations,
of the hybrid transform techniques of Nonsubsampled the proposed algorithm focuses on providing robustness against
Contourlet Transform, Discrete Wavelet Transform and geometric attacks without affecting other types of attacks or
Singular Value Decomposition are utilized for high robustness imperceptibility and improves security by introducing modified
against common attacks. The features of angle invariance and Arnold Transformation.
distance invariability of Log Polar Transform and Inverse Log
Polar Transform are used in the extraction process only to resist This paper is organized as follows: Section I introduces the
geometric attacks without affecting the imperceptibility of project, and section II reviews existing research into face
watermark and watermarked video. Modified Arnold detection. This is followed by a description of the methodology
Transformation is introduced to improve the security of the used in the proposed solution, in section III, together with an
watermark. The experiment shows that the algorithm is analysis and overview of implementation strategies. Results of
extremely robust in terms of most common attacks and geometric the current research into the proposed solution are discussed in
attacks with high imperceptibility and improved security. section IV and results and discussions are presented in section
V. The conclusion is covered under section VI, which also
Keywords Video Watermarking; Authentication; Robustness; considers possible future work.
Imperceptibility; Payload; Security; Key Frames; Non Key Frames;
Modified Arnold Transform;
II. RELATED WORK
I. INTRODUCTION A significant amount of research has been carried out related
to video watermarking. In order to provide an effective and
The fast paced advancement in multimedia and internet robust video watermarking algorithm, [4] focused on
technology has significantly enhanced the level and speed of
distortion resistance based on an additive spread spectrum and
knowledge exchange. Due to this evolution, people nowadays
a periodic watermark concept to protect against piracy of the
can easily share or watch videos through the internet [1].
However, this evolution has equally generated copyright and video files. However, it is less resistant to noise attacks and
authentication issues with videos. Therefore, the need for also the use of the spread spectrum is computationally
protecting the authenticity and integrity of videos is the focus complex. [5] proposed a new video watermarking algorithm
of this research. Digital Video Watermarking Technique is one based on Singular Value Decomposition (SVD) and slope-
of the solutions for copyright protection which is the process of based embedding technique focusing on temporal dimension
embedding digital watermarks so as to hide the copyright attacks. However, this algorithm has provided less robustness
information in the video and protect its ownership [1]. against most of the common attacks.
According to [2], the digital watermarking process has certain Similarly, [6] fused dual transform domains 2D Discrete
factors such as robustness, imperceptibility, security, capacity Wavelet Transform (DWT) and 3D Discrete Cosine
and computational time that are required to be considered. Transform (DCT) with Particle Swarm Optimization (PSO) in
There are several video watermarking schemes proposed by order to improve the robustness of the watermark in the video
researchers focusing on providing high robustness against watermarking. [7] introduced an adaptive video watermarking
image and video processing attacks, temporal attacks and using a human visual system with a fuzzy interference model
geometric attacks. It is a significant challenge to provide to provide high robustness and imperceptibility. However, it is
robustness against almost all kinds of attacks specially in the less resistant to geometric attacks.
case of geometric attacks. Hence, most of the existing The algorithm proposed by [8] used shot boundary detection
algorithms have failed to provide robustness against one type which reduces the computational time and provides robustness
of attack while focusing on others. The algorithm proposed by against temporal attacks and classifying blocks of the
[3], has provided high levels of robustness against most attacks. compressed video. However, this method is less robust against
geometric attacks and other noise attacks. [3] proposed a algorithm and to a much lesser extent on security which,
robust video watermarking scheme using hybrid techniques of however, is also of high importance.
Contourlet Transform (CT) and DWT for enhancing the
robustness and the visual perception. This algorithm has I. PROPOSED WORK
maintained the security using Arnold transform and has A Proposed Robust Video Watermarking Algorithm: Enhanced
achieved high imperceptibility and payload using a bit plane Extraction from Geometric Attacks (PRVWA-EEfGA) is based
slicing. However, CT basically lacks the property of the shift on the existing video watermarking algorithm by [3] with
invariance. Furthermore, the Arnold transformation used in reduction of its limitations.
this scheme is the traditional one which is less secure. [9]
proposed a robust watermarking scheme based on The proposed system has utilized the features of this existing
nonsubsampled contourlet transform (NSCT) which is algorithm by using scene change detection for reducing
computational time, hybrid transform techniques for the
multidirectional as well as shift invariant. However, the
purpose of high robustness against image and video processing
robustness against geometric attacks has not significantly
attacks, temporal attacks and other common attacks, bit plane
improved.
slicing in watermark for high imperceptibility and capacity and
Among all the image and video processing attacks, the most
challenging attacks to be considered when providing a robust finally Arnold Transform and Eigen Vector for dual security.
video watermarking algorithm are geometric attacks, also To reduce the limitation caused by lack of robustness against
known as RST (Rotation, Scaling and Translation) attacks. geometric attacks, the proposed algorithm utilizes a scaling
The schemes presented by [10] and [11] have focused on invariance feature of Nonsubsampled Contourlet Transform in
robustness against geometric attacks using Discrete Fourier the embedding process and distance and angle invariability
Transform (DFT) and Log Polar Mapping (LPM) for images. features of Log Polar and Inverse Log Polar transforms in the
The algorithm used for images can also be applied for video extraction process. Due to the interpolation and discretization
frames. [10] focused on providing a RST invariant property of Log Polar Transform and distortion property of
watermarking for image using approximate Inverse LPM to Inverse Log Polar Transform, this system significantly
get the location to be the watermarked image. However, this enhances robustness against major geometric attacks of
scheme also had drawbacks in the form of ILPM which rotation, scaling and transition. To improve the limitation of
introduces interference distortion. To overcome this drawback, less secure traditional Arnold Transform, modified Arnold
[11] introduced a new scheme which reduces the distortion Transform is introduced. There are two main stages in this
caused by ILPM. However, this scheme failed by not being algorithm, the embedding stage and the extraction stage.
able to extract in the case of fractional angles of rotation
attacks. To reduce this limitation, [12] presented color
watermarking for image using Fourier transform and improved
ULPM. However, improved inverse LPM still provides
distortion effects. Furthermore, although these schemes
focused on geometric attacks, they are all based on DFT which
is less robust and more complex than other transform domains.
Similarly, to provide robustness against RST attacks, Wang et
al. [13] proposed a compressed video watermarking algorithm
focusing on resistance to geometric attacks with invariance of
a Histogram Shape in DWT Domain and the real time
performance by using a fast inter transformation between
Block DCTs and One-Level DWT. However, it is less
resistant against temporal attacks and the video quality is also
degraded. Likewise, to achieve high robustness against
geometric attacks, [14] has used a zero watermarking
algorithm based on PM with 2D DWT and 3D DCT.
However, this algorithm is fixed for authentication only rather
than extracting the original watermark.
From the above research, it is evident that achieving high
robustness against geometric attacks while maintaining the
imperceptibility and robustness against other common attacks Fig. 1. Proposed PRVWA-EEfGA Diagram
represents one of the most challenging features of any video
watermarking algorithm. Most schemes failed to consider The block diagram in fig 1 illustrates the transition between
geometric attacks whereas others did not maintain the two stages of the proposed system. It shows how the
imperceptibility in the case of other common attacks. Most of embedding and extraction occurs. Though embedding and
these proposed solutions have focused on robustness of the extraction are two separate stages, the extraction stage occurs
only after the embedding stage. Fig1 charts the flow from an
input video sample and a watermark sample via obtaining the B. Proposed Video Watermark Extraction Algorithm
watermarked video to finally achieving the extracted (Extraction Stage)
watermark from the watermarked video. Table 1 shows one of In the extraction stage, similar processes such as video pre-
the video frame samples and the watermark sample with its processing and watermark pre-processing are carried out along
size and format which is going to be tested during with watermark detection, extraction and post-processing.
implementation. However, video-preprocessing is performed in the
watermarked video and the original video sample. While
Table 1. Test Video Frame Sample of suzie.avi and Test Watermark
Sample of csulogo.png
performing this task, the additional sub-sections Log Polar
Transform and Inverse Log Polar Transform are applied to the
Sample Video Sample
Videos Forma
Video
Watermar
Watermar Watermar videos together with other transform techniques. In watermark
Size k Format k Size detection, extraction and post-processing, the watermark
Frame t k
scrambled slices and embedded Eigen Vector are obtained
after which processes related to descrambling and
avi
176x14
png 80x80 reconstructing the watermark are performed. While
4 descrambling, modified Arnold Transform is used. The
authentication is done based on comparing Eigen Vector of
extracted watermark and extracted Eigen Vector. Table 3
shows the extracted watermark with its NCC value which
A. Proposed Video Watermark Embedding Algorithm
shows that high robustness of the watermark has been
(Embedding Stage)
maintained against attacks.
In the embedding stage, the flow starts with the input video
sample and the watermark sample. There are further sections Table 3. Extracted watermark with its NCC value
which are video pre-processing, watermark pre-processing and
the embedding process with video post-processing. In video Extracted Robustness
pre-processing, there are sub-sections such as scene change Watermark (NCC)
detection, frame color conversion, Nonsubsampled Contourlet
Transform, Discrete Wavelet transform and Singular Value 0.9973
Decomposition. In video pre-processing, the tasks are
performed with the original input video sample and are related
to reducing the computational time and providing high C. Modified Arnold Transform (mAT)
robustness. In watermark pre-processing, there are sub- The main limitation of using the traditional Arnold
sections such as bit plane slicing, modified Arnold transform, Transformation is that the transform coefficients used are all
and Singular Value Decomposition which are done for the fixed and once it becomes known that traditional Arnold
purpose of enhancing the imperceptibility and the payload. Transform has been used, then one can somehow descramble
Using modified Arnold Transform, a key is obtained which is the image using these fixed coefficients [15]. Based on the
used to scramble the watermark while embedding and which is theory provided by [16], modified Arnold Transformation is
later used to descramble while extracting. introduced in our proposed algorithm. The feature of a matrix
determinant has been utilized to modify this algorithm,
Table 2. Watermarked Video Frame Sample with its PSNR Value extracting the transform coefficients of Arnold transform in
such a way that the determinant of the matrix coefficients is 1.
Watermarked Imperceptibility
Video Frame (PSNR)
a00* a11 a10 * a01 = 1
where a00, a11, a10 and a01 are the transform coefficients

64dB
I. RESULTS AND DISCUSSION
This section tests the implementation of the proposed video
watermarking algorithm in different attack situations. The
In the embedding process with video post-processing, a tests were carried out using Matlab R2015b on 10 sample
watermark embedding process is performed where watermark videos and 10 color images with watermarks of different sizes
slices and Eigen Vector of the watermark are embedded using and formats. The sample videos and watermarks were
components of transformed domains of the video and all the collected from a Google database.
reversals are carried out so as to obtain the final watermarked Since our proposed system has a strong focus on improving the
video. Table 2 shows that the watermarked video frame robustness against geometric attacks without affecting the
sample with its PSNR value. robustness against other attacks, the results and discussions
presented below are centered on the comparisons of robustness
of the current and proposed system in different attack situations
such as several image processing, video processing and
geometric attacks. The quality metrics used are peak signal to
noise ratio (PSNR) which is used to measure the
imperceptibility or quality of the watermarked video frame
against the original video frame and a normalized correlation
coefficient (NCC) is used to evaluate the correlation of the
extracted watermark with the original watermark.
Table 4 shows NCC value for one of the sample videos with a
sample watermark without any attacks. The table shows that in
the absence of attacks, nearly 99% of the watermark can be
extracted. According to table 5, comparing the proposed
system with the current algorithm, 80% to 99% of the
watermark has been extracted from different image processing
and temporal attacked watermarked videos from both of them
which show that the robustness against image processing
attacks and temporal attacks are similar.

Table 4. Result of Extracted watermark with NCC value applied in one of the Fig. 2. Comparison of NCC values for different degrees of rotation between
10 sample watermarked video frames with no attacks current algorithm and proposed algorithm

Proposed Algorithm (PRVWA-EEfGA) : No attacks

Sample
Sample Watermarked Extracted Robustness
Videos
Watermark Video Frame Watermark (NCC)
Frame

0.9973

To evaluate performance of our proposed algorithm in terms of


robustness, three main geometric attacks, rotation attack,
scaling attack and transition attack have been tested. From the
table 6 and fig 2, the resulting values of NCC clearly show that
our proposed algorithm is able to extract 93% to 99% of the
watermark for the rotated watermarked videos. However, the
NCC values of the current algorithm ranged from only 20% to
88% for all tested angles except 1800.
According to table 7 and fig 3, the resulting values of NCC
clearly show that our proposed algorithm is able to extract Fig. 3. Comparison of NCC values for scaling attack and transition attack
between current algorithm and proposed algorithm
97% to 99% of the watermark for the scaled watermarked
videos, whereas, for the scaled watermarked video of the II. CONCLUSION
current algorithm, the NCC values only ranged from 68% to
In conclusion, the need for digital video watermarking in
84%. Similarly, according to table 8 and fig 3, the resulting
todays evolving technological environment is high and
values of NCC clearly show that our proposed algorithm is
development of robust mechanisms is a priority in terms of
able to extract 94% to 99% of the watermark for the translated
copyright protection and authentication. A significant number
watermarked videos, whereas, for the translated watermarked
of algorithms have been introduced in order to provide the
video using the current algorithm, the NCC values only ranged
best possible features required for video watermarking
from 38% to 80%. Furthermore, while increasing the
purposes. Our proposed system is based on the current
robustness of video watermarking algorithm, we have
algorithm provided by [3]. The main contribution of our
maintained the computational time as low as possible. Table 9
proposed system is through the use of Log Polar Transform
shows the computational time for watermark embedding and
and its inverse during extraction only, since the level of
extraction for the current and the proposed algorithms which
watermarked video degradation that occurs does not matter
clearly show that only a slight increase in extraction time has
during extraction. Furthermore, this system provides dual
occurred which is negligible. The comparison table clearly
security with more secure features than the existing algorithm
shows that our proposed algorithm has significantly enhanced
by using modified Arnold transform and authentication with
robustness against rotation attack for all degrees of rotations,
Eigen Vector. Based on a detailed comparison between the
scaling attack and translation attack without affecting other
current and the proposed system, the latter has maintained
factors.
higher imperceptibility, payload, and achieved higher levels of
robustness against several types of attacks, particularly against
Table 5. Result for robustness against different image processing and temporal attacks for current algorithm and proposed algorithm

Robustness for Image Processing Attacks and Temporal Attacks (NCC value)

Sample Sample Frame


Video Water Salt & Pepper Poisson Median Swappi
Gaussian Noise Contrast Histogram Frame Dropping Attack
Frame mark Attack noise Filtering ng
Attack Adjustment Attack 21%,58%,96%
(var=0.03,0.01) Attack Attack Attack
(var=0.1,0.01)
25%

Current Algorithm Agilandeeswari, L., & Ganesan, K. (2015)

0.8438 0.9557 0.7025 0.7497 0.9822 0.9852 0.9993 0.9678 0.9525 0.9368 0.8200 0.9622

Proposed Algorithm (PRVWA-EEfGA)

0.9972 0.9973 0.9968 0.9974 0.9974 0.9974 0.9975 0.9976 0.9405 0.9259 0.7999 0.9622

Table 6. Result for Robustness Against Different Rotation Attacks for Current Table 7. Result for Robustness Against Scaling Attack for Current Algorithm
Algorithm and Proposed Algorithm and Proposed Algorithm: (Resized by Width-100, Height-100 and then resized
to its original size)
Current Algorithm
Proposed Algorithm
Agilandeeswari, L., &
Angle of Sample (PRVWA-EEfGA) Current Algorithm
Ganesan, K. (2015) Proposed Algorithm
Rotation Rotated Agilandeeswari, L., & Ganesan,
(In Video (PRVWA-EEfGA)
K. (2015)
Degree) Frames Extracted Robustness Extracted Robustnes
Watermark (NCC) Watermark s (NCC) Sample Extracted Robustne Sample Extracted Robustne
Videos Waterma ss Videos Waterma ss
Frame rk (NCC) Frame rk (NCC)
1 0.8635 0.9972
0.6815 0.9973

5 0.3013 0.9968
Table 8. Result for Robustness Against Transition Attack for Current
Algorithm and Proposed Algorithm
10 0.3249 0.9970 Transition Value = x=10.3, y=-10.1

Current Algorithm Agilandeeswari, Proposed Algorithm (PRVWA-


L., & Ganesan, K. (2015) EEfGA)
45 0.4057 0.9971

Sample Sample
Extracted Robustnes Extracted Robustnes
Transite Transite
Watermar s Watermar s
135 0.5310 0.9967 d Video d Video
k (NCC) k (NCC)
Frames Frames

0.7266 0.9977
180 0.9999 0.9968

main geometric attacks than the current algorithm.


Furthermore, the proposed system has achieved this without
affecting computational time to any marked degree and also
enhanced the security features by modifying the traditional
Arnold Transformation. There are plans to conduct further
research to reduce computational time while maintaining all
the acquired features.
Table 9. Result for Computational time taken by each frame for embedding [13] L. Wang, H. Ling, F. Zou and Z. Lu, "Real-Time Compressed- Domain
and extraction by Current Algorithm and Proposed Algorithm Video Watermarking Resistance to Geometric Distortions," MultiMedia, vol.
19, no. 1, pp. 70 - 79, 2012.
Embedding and Extraction Time [14] D. Li, L. Qiao and J. Kim, "A video zero-watermarking algorithm based
on LPM," Multimedia Tools and Applications, pp. 1-14, 2015.
Sample [15] G. V. Artist and M. K. Porwal, "Dual Layer Image Scrambling Method
Sample Current
Video Algorithm Using Improved Arnold Transform," American International Journal of
Watermark Proposed Algorithm Research in Science, Technology, Engineering & Mathematics, vol. 9, no. 3,
Frame Agilandeeswari,
(PRVWA-EEfGA) pp. 258-264, 2015.
L., & Ganesan,
K. (2015) [16] Z. Shang, H. Ren and . J. Zhang, "A Block Location Scrambling
Algorithm of Digital Image Based on Arnold Transformation," International
Conference for Young Computer Scientists, pp. 2942-2947, 2008.
0.07s 0.07s
0.06s 0.093s

REFERENCES
[1] S. Bhattacharya, T. Chattopadhyay and A. Pal, "A Survey on Different
Video Watermarking Techniques and Comparative Analysis with Reference
to H.264/AVC," ISCE '06. 2006 IEEE Tenth International Symposium on
Consumer Electronics, pp. 1-6, 2006.
[2] R. Bala, "A Brief Survey on Robust Video Watermarking Techniques,"
The International Journal Of Engineering And Science, vol. 4, no. 2, pp. 41-
45, 2015.
[3] L. Agilandeeswari and . K. Ganesan, "A robust color video watermarking
scheme based on hybrid embedding techniques," Multimedia Tools and
Applications, pp. 1-36, August 2015.
[4] N. K. Dubey and S. Kumar, "An Effective Approach of Distortion-
Resistant Video Watermarking for Piracy Deterrence," International Journal
of Security and Its Applications, vol. 9, no. 1, pp. 283-294, 2015.
[5] H. Chen and Y. Zhu, "A robust video watermarking algorithm based on
singular value decomposition and slope-based embedding technique,"
Multimedia Tools and Applications, vol. 71, no. 3, pp. 991-1012, 2012.
[6] D. Li, D. Jiang and J. W. Kim, "Robust Adaptive Video Watermarking
Algorithm based on Dual Transform Domains," International Journal of
Multimedia and Ubiquitous Engineering, vol. 9, no. 1, pp. 391-402, 2014.
[7] S. Youssef, A. Elfarag and N. Ghatwary, "Adaptive video watermarking
integrating a fuzzy wavelet-based human visual system perceptual model,"
Multimedia Tools and Applications, vol. 73, no. 3, pp. 1545-1573 , 2014.
[8] J. Xuemei, L. Quan and W. Qiaoyan, A new video watermarking
algorithm based on shot segmentation and block classification, Multimedia
Tools and Applications, vol. 62, no. 3, pp. 545-560, 2013.
[9] C. Narasimhulu and K. S. Prasad, "A Robust Watermarking Technique
based on Nonsubsampled Contourlet Transform and SVD," International
Journal of Computer Applications, vol. 16, no. 8, pp. 27-36, 2011.
[10] L. Gong, X. Liu , F. Zheng and N. Zhou, "Flexible multiple-image
encryption algorithm based on log-polar transform and double random phase
encoding technique," Journal of Modern Optics, vol. 60, no. 13, pp. 1074-
1082, 2013.
[11] R. Yang, X. Kang and J. Huang, "Robust Audio Watermarking Based on
Log-Polar Frequency Index," Digital Watermarking, vol. 5450, pp. 124-138,
2009.
[12] J. Ouyang, . G. Coatrieux , B. Chen and H. Shu, "Color image
watermarking based on quaternion Fourier transform and improved uniform
log-polar mapping," Computers and Electrical Engineering, vol. 46, pp. 419-
432, 2015.
Table 6. Result for Robustness Against Different Rotation Attacks for Current
Algorithm and Proposed Algorithm

Current Algorithm
Proposed Algorithm
Angle of Agilandeeswari, L., &
Sample (PRVWA-EEfGA)
Rotatio Ganesan, K. (2015)
Rotated
n
Video
(In Extracted Robustnes Extracted
Frames Robustnes
Degree) Watermar s Watermar
s (NCC)
k (NCC) k

1 0.8635 0.9972

5 0.3013 0.9968

10 0.3249 0.9970

45 0.4057 0.9971

135 0.5310 0.9967

180 0.9999 0.9968

7
8

Potrebbero piacerti anche