Robust Dual Watermarking Scheme for Video Derived from Strategy Fusion

Full Text (PDF, 1623KB), PP.19-27

Views: 0 Downloads: 0

Author(s)

Neeta Deshpande 1,* Archana Rajurkar 2 R.R.Mathalkar 3

1. Department of Computer Engineering SGGS, Shri Ramamnand teerth University, Nanded, Maharashtra India

2. Department of Computer Engineering MGM, Nanded, India

3. SGGS, Department of Electronics Engineering Nanded, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2014.05.03

Received: 6 Jan. 2014 / Revised: 6 Feb. 2014 / Accepted: 11 Mar. 2014 / Published: 8 Apr. 2014

Index Terms

Watermarking, video, algorithm, Embedding watermark, extraction techniques

Abstract

Current paper proposes a novel robust dual watermarking scheme that entrench a decipherable sample in the spatial domain and an invisible watermark in frequency domain of a color video. Visible watermark facilitate in the protection of publicly accessible data thus providing an imperative contribution for avoiding illegal duplication of data. The adaptive visible watermarking algorithm exploits various histogram features and not only embeds a visible watermark in the spatial domain but also facilitates its extraction and removal thus endowing with the facet of reconstruction of the video. For enhancing the robustness of the scheme and increasing the degree of protection of the watermark, invisible watermark is scrambled in parts and embedded in various frames of the video in DCT domain. These dual watermarks are embedded in host video. The robustness of the scheme is verified with various signal processing attacks, geometric attacks and video watermarking attacks like frame averaging. Reconstruction of the video helps the authorized subscribers to refurbish the original video.

Cite This Paper

Neeta Deshpande, Archana Rajurkar, R.R.Mathalkar,"Robust Dual Watermarking Scheme for Video Derived from Strategy Fusion", IJIGSP, vol.6, no.5, pp.19-27, 2014. DOI: 10.5815/ijigsp.2014.05.03

Reference

[1]F. Deguillaume, S. Voloshynovskiy, and T. Pun. Hybrid robust watermarking resistant against copy attack. In EUSIPCO'02, Toulouse, France, 2002.

[2]I. G. Langelaar and R.Lagendijk, “Watermarking digital image and video data: A state-of-the-art overview,” IEEE Signal Processing Magazine, vol. 17, pp. 20–46, 2000.

[3]J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman “Electronicmarking and identification techniques to discourage document copying,” IEEE J. Select. Areas Commun., vol. 13, pp. 1495–1504, Oct. 1995. 

[4]S. Low, N. Maxemchuk, J. Brassil, and L. O’Gorman, “Document marking and identification using both line and word shifting,” in Proc. Infocom ’95, Boston, MA, Apr. 1995

[5]Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

[6]F. M. Boland, J. J. K. ó Ruanaidh, and W. J. Dowling, “Watermarking digital images for copyright protection,” in Proc. Int. Conf. Image Processing and Its Applications,

[7]F. M. Boland, J. J. K. ó Ruanaidh, and W. J. Dowling, “Watermarking digital images for copyright protection,” in Proc. Int. Conf. Image Processing and Its Applications, vol. 410, Edinburgh, U.K., July 1995.

[8]M. S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, “Contentbased watermarking of images,” in Proc. ACM Multimedia ’98, Bristol, U.K., Sept. 1998

[9]L. Boney, A. H. Tewfik, and K. H. Hamdy, “Digital watermarks for audio signals,” in Proc. EUSIPCO 1996, Trieste, Italy, Sept. 1996.

[10]F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” in Proc. SPIE Digital Compression Technologies and Systems for Video Commun., vol. 2952, Oct. 1996, pp. 205–213.

[11]F. Jordan, M. Kutter, and T. Ebrahimi, “Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video,” ISO/IEC Doc. JTC1/SC29/WG11 MPEG97/M2281, July 1997.

[12]S. D. Lin and C. F. Chen, “A Robust DCT-Based Watermarking for copyright Protection,” IEEE Trans. on Consumer Electronics, Vol. 46, No. 3, pp. 415?421, Aug 2000.

[13]Mohan S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, “Adaptive visible watermarking of images.” Proc. 1999 IEEE Int. Conf. on Multimedia Computing and Systems, Vol. 1, pp. 568 –573, 1999.

[14]Saraju P. Mohanty, K.R. Ramakrishnan, and Mohan S. Kankanhalli, “A DCT domain visible watermarking technique for images.” Proc. 2000 IEEE Int. Conf. on Multimedia and Expo, Vol. 2, pp.1029 –1032, 2000.

[15]Pei-Min Chen, “A visible watermarking mechanism using a statistic approach,” Proc. 5th Int. Conf. on Signal Processing, Vol. 2, pp. 910 –913, 2000. 

[16]Yongjian Hu and Sam Kwong, “Wavelet domain adaptive visible watermarking,” Electronics Letters, Vol. 37, pp. 1219 –1220, Sept. 2001.

[17]Y. Shih and Y. T. Wu, “Combinational image watermarking in the spatial and frequency domains,” Pattern Recognition, vol. 36, no. 4, pp. 969–975, Apr. 2003.

[18]S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kanakanhalli, “A dual watermarking technique for images,” in Proc. 7th ACM Int. Multimedia Conf. (ACMMM), vol. 2. FL, Oct.–Nov. 1999, pp. 49–51.

[19]Y. Hu, S. Kwong, and J. Huang, “Using invisible watermarks to protect visibly watermarked images,” in Proc. 2004 Int. Symp. Circuits Syst., vol. 5. pp. 584–587. 

[20]Pei-Yu Lin, Jung-San Lee, and Chin-Chen Chang, Fellow, IEEE “ Dual digital watermarking for Internet media based on hybrid strategies” IEEE trans on circuits and systems for video technology pp 1169-1177 Aug 2009

[21]Seung-Jin Kim1, Suk-Hwan Lee1, Kwang-Seok Moon2, Woo-Hyun Cho2, In-Taek Lim3, Ki-Ryong Kwon3, and kuhn-Il Lee1 “A New Digital Video Watermarking Using the Dual Watermark Images and 3D DWT” ieee tencon south korea pp291-294 , 2004 

[22]Gandhe,S.T.; Potdar, U.; Talele, K.T.; S.P.I.T., Mumbai, India , Dual Watermarking in Video Using Discrete Wavelet Transform machine Vision pp 216-219 , 2009 

[23]C.H.Lee and Y.K.Lee, “ An adaptive image watermarking technique for copyright protection”, IEEE transactions on consumer electronics, Vol 45, No 4, November 1999 pp.1005-1015 

[24]http://metalab.uniten.edu.my//....Chapter%202_5%20-%20feature.

[25]Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, Information Hiding|A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062{1078}, July 1999

[26]Fabing Duana and Derek Abbot ,” The application of nonlinear bistable detectors to DCT-domain watermarking schemes, proc of SPIE vol 6802,680215(2008)

[27]Mrs Neeta Deshpande, Mr Mahesh Sanghavi , Dr. Archana Rajurkar , Dr R.R. Manthalkar , “Visimark1_0 :- An Assistant tool for evaluating the robustness of video watermarking Algorithms, I.J. Information Technology and Computer Science, 2013, 05, 10-21 Published Online April 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2013.05.02 pp 10-21.