A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform | Multimedia Tools and Applications Skip to main content
Log in

A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The rapid growth of fast communication networks for digital video transmission has created a need to copyright protection for these media. Digital video can be manipulated easily by users with various motivations. Compression is the most common attack that users can apply on videos in order to eliminate digital video copyright. Proposed technique in this article is specially designed for resisting against compression attacks. This method is presented a blind and robust watermarking method to copyright protection in digital video. In the proposed method, the coefficients of the contourlet transform are extracted and then encrypted watermark embedded into video with using the singular value decomposition (SVD). Embedding watermark in SVD domain increases the robustness of proposed method against attacks. In the embedding process and watermark encryption, pseudo-random numbers generated by the proposed new chaotic map, which is a generalized two-dimensional complex map based on the Newton model. The PSNR, SSIM, BER, and NCC measures examine the performance of the proposed method in terms of robustness and visual quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14):8745–8780

    Google Scholar 

  2. Alenizi F, Kurdahi F, Eltawil A, Aljumah A (2015) Dwt-based watermarking technique for video authentication. In: 2015 IEEE international conference on electronics, circuits, and systems (ICECS). IEEE, pp 41–44

  3. Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of dwt based on svd and abc. Pattern Recogn Lett 94:228–236

    Google Scholar 

  4. Arora SM, et al. (2018) A dwt-svd based robust digital watermarking for digital images. Procedia Comput Sci 132:1441–1448

    Google Scholar 

  5. Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2012) A blind digital video watermarking scheme with enhanced robustness to geometric distortion. In: 2012 International conference on digital image computing techniques and applications (DICTA). IEEE, pp 1–8

  6. Bahrami Z, Tab FA (2018) A new robust video watermarking algorithm based on surf features and block classification. Multimed Tools Appl 77(1):327–345

    Google Scholar 

  7. Barani MJ, Ayubi P, Jalili F, Valandar MY, Azariyun E (2015) Image forgery detection in contourlet transform domain based on new chaotic cellular automata. Secur Commun Netw 8(18):4343–4361

    Google Scholar 

  8. Barani MJ, Valandar MY, Ayubi P (2015) A secure watermark embedding approach based on chaotic map for image tamper detection. In: 2015 7th conference on information and knowledge technology (IKT). IEEE, pp 1–5

  9. Bayoudh I, Jabra SB, Zagrouba E (2017) Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications. Multimed Tools Appl: 1–19

  10. Bhardwaj A, Verma VS, Jha RK (2017) Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed Tools Appl: 1–20

  11. Chen L, Zhao J (2015) Adaptive digital watermarking using rdwt and svd. In: 2015 IEEE international symposium on haptic, audio and visual environments and games (HAVE). IEEE, pp 1–5

  12. Chen L, Zhao J (2017) Robust contourlet-based blind watermarking for depth-image-based rendering 3d images. Signal Process Image Commun 54:56–65

    Google Scholar 

  13. Chen L, Zhao J (2018) Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimed Tools Appl 77(6):7187–7204

    Google Scholar 

  14. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Mateo

    Google Scholar 

  15. El’Arbi M, Koubaa M, Charfeddine M, Amar CB (2011) A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimed Tools Appl 55(3):579–600

    Google Scholar 

  16. Fan M, Wang H (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process Image Commun 66:19–29

    Google Scholar 

  17. Farri E, Ayubi P (2018) A blind and robust video watermarking based on iwt and new 3d generalized chaotic sine map. Nonlinear Dynamics: 1–23

  18. Foundation X (2018) Xiph.org video test media [derf’s collection]. https://media.xiph.org/video/derf/

  19. Furht B (1998) Handbook of Internet and multimedia systems and applications, vol 6. CRC Press, Boca Raton

    Google Scholar 

  20. Gaj S, Rathore AK, Sur A, Bora PK (2017) A robust watermarking scheme against frame blending and projection attacks. Multimed Tools Appl 76(20):20755–20779

    Google Scholar 

  21. Goldberger AL (1996) Non-linear dynamics for clinicians: chaos theory, fractals, and complexity at the bedside. The Lancet 347(9011):1312–1314

    Google Scholar 

  22. Hasnaoui M, Mitrea M (2014) Multi-symbol qim video watermarking. Signal Process Image Commun 29(1):107–127

    Google Scholar 

  23. Himeur Y, Boukabou A (2017) A robust and secure key-frames based video watermarking system using chaotic encryption. Multimed Tools Appl: 1–25

  24. Huang H-Y, Yang C-H, Hsu W-H (2010) A video watermarking technique based on pseudo-3-d dct and quantization index modulation. IEEE Trans Inform Forensics Secur 5(4):625–637

    Google Scholar 

  25. Hubbard J, Schleicher D, Sutherland S (2001) How to find all roots of complex polynomials by Newton’s method. Inventiones Mathematicae 146(1):1–33

    MathSciNet  MATH  Google Scholar 

  26. Jacquin AE (1992) Image coding based on a fractal theory of iterated contractive image transformations. IEEE Trans Image Process 1(1):18–30

    Google Scholar 

  27. Jiang Y-G, Wu Z, Wang J, Xue X, Chang S-F (2018) Exploiting feature and class relationships in video categorization with regularized deep neural networks. IEEE Transactions on Pattern Analysis and Machine Intelligence 40 (2):352–364. https://doi.org/10.1109/TPAMI.2017.2670560

    Article  Google Scholar 

  28. Karmakar A, Phadikar A, Phadikar BS, Maity GK (2016) A blind video watermarking scheme resistant to rotation and collusion attacks. Journal of King Saud University-Computer and Information Sciences 28(2):199–210

    Google Scholar 

  29. Klema V, Laub A (1980) The singular value decomposition: its computation and some applications. IEEE Trans Automatic Control 25(2):164–176

    MathSciNet  MATH  Google Scholar 

  30. Kuehne H, Jhuang H, Garrote E, Poggio T, Serre T (2011) HMDB: a large video database for human motion recognition. In: Proceedings of the international conference on computer vision (ICCV)

  31. Lian S (2008) Multimedia content encryption: techniques and applications, Auerbach Publications

  32. Lin SD, Chen C-F (2000) A robust dct-based watermarking for copyright protection. IEEE Trans Consum Electron 46(3):415–421

    Google Scholar 

  33. Liu H, Xiao D, Zhang R, Zhang Y, Bai S (2016) Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Process Image Commun 45:41–51

    Google Scholar 

  34. Liu X, Zhao R, Li F, Liao S, Ding Y, Zou B (2017) Novel robust zero-watermarking scheme for digital rights management of 3d videos. Signal Process Image Commun 54:140–151

    Google Scholar 

  35. Liu Y, Zhao J (2010) A new video watermarking algorithm based on 1d dft and radon transform. Signal Process 90(2):626–639

    MATH  Google Scholar 

  36. Lu Z-M, Xu D-G, Sun S-H (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process 14(6):822–831

    Google Scholar 

  37. Madine F, Akhaee MA, Zarmehi N (2018) A multiplicative video watermarking robust to h. 264/Avc compression standard. Signal Process Image Commun 68:229–240

    Google Scholar 

  38. Mandelbrot BB (1982) The fractal geometry of nature, vol 1. WH Freeman, New York

    MATH  Google Scholar 

  39. Mansouri A, Aznaveh AM, Torkamani-Azar F, Kurugollu F (2010) A low complexity video watermarking in h. 264 compressed domain. IEEE Trans Inform Forensics Secur 5(4):649–657

    MATH  Google Scholar 

  40. Marszałek M, Laptev I, Schmid C (2009) Actions in context. In: IEEE conference on computer vision & pattern recognition

  41. Masoumi M, Amiri S (2013) A blind scene-based watermarking for video copyright protection. AEU-International Journal of Electronics and Communications 67(6):528–535

    Google Scholar 

  42. Najafi E, Loukhaoukha K (2019) Hybrid secure and robust image watermarking scheme based on svd and sharp frequency localized contourlet transform. Journal of Information Security and Applications 44:144–156

    Google Scholar 

  43. Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Google Scholar 

  44. O’Keeffe GS, Clarke-Pearson K, et al. (2011) The impact of social media on children, adolescents, and families. Pediatrics 127(4):800–804

    Google Scholar 

  45. Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Magazine 18(4):33–46

    Google Scholar 

  46. Preda RO, Vizireanu DN (2010) A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement 43(10):1720–1726

    Google Scholar 

  47. Sabri AQM, Mansoor AM, Obaidellah UH, Faizal ERM, et al. (2017) Metadata hiding for uav video based on digital watermarking in dwt transform. Multimed Tools Appl 76(15):16239–16261

    Google Scholar 

  48. Seitz J (2005) Digital watermarking for digital media, IGI Global

  49. Shao Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12–21

    Google Scholar 

  50. Singh KM (2017) A robust rotation resilient video watermarking scheme based on the sift. Multimed Tools Appl: 1–26

  51. Song H, Yu S, Yang X, Song L, Wang C (2008) Contourlet-based image adaptive watermarking. Signal Process Image Commun 23(3):162–178

    Google Scholar 

  52. Su P-C, Kuo T-Y, Li M-H (2017) A practical design of digital watermarking for video streaming services. J Vis Commun Image Represent 42:161–172

    Google Scholar 

  53. Tekalp AM (2015) Digital video processing. Prentice Hall Press, Englewood Cliffs

    Google Scholar 

  54. Thind DK, Jindal S (2015) A semi blind dwt-svd video watermarking. Procedia Comput Sci 46:1661–1667

    Google Scholar 

  55. Tiwari A, Ojha SK, Pantiukhin D (2017) An effective approach for secure video watermarking based on h. 264 coding standard. In: 2017 3rd international conference on computational intelligence & communication technology (CICT). IEEE, pp 1–5

  56. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inform Secur Appl 34:142–151

    Google Scholar 

  57. Valandar MY, Barani MJ, Ayubi P, Aghazadeh M (2018) An integer wavelet transform image steganography method based on 3d sine chaotic map. Multimed Tools Appl: 1–19

  58. Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11 (2):77–88

    Google Scholar 

  59. Wu C, Zheng Y, Ip W, Chan C, Yung K, Lu Z (2011) A flexible h. 264/Avc compressed video watermarking scheme using particle swarm optimization based dither modulation. AEU-International Journal of Electronics and Communications 65 (1):27–36

    Google Scholar 

  60. Wu D, Kong W, Yang B, Niu X (2009) A fast svd based video watermarking algorithm compatible with mpeg2 standard. Soft Comput 13(4):375–382

    Google Scholar 

  61. Xu D, Wang R, Wang J (2011) A novel watermarking scheme for h. 264/avc video authentication. Signal Process Image Commun 26(6):267–279

    MathSciNet  Google Scholar 

  62. Xu D-W (2007) A blind video watermarking algorithm based on 3d wavelet transform. In: 2007 international conference on computational intelligence and security. IEEE, pp 945–949

  63. Xuemei J, Quan L, Qiaoyan W (2013) A new video watermarking algorithm based on shot segmentation and block classification. Multimed Tools Appl 62(3):545–560

    Google Scholar 

  64. Yadav J, Sehra K (2018) Large scale dual tree complex wavelet transform based robust features in pca and svd subspace for digital image watermarking. Procedia Comput Sci 132:863–872

    Google Scholar 

  65. Yassin NI, Salem NM, El Adawy MI (2014) Qim blind video watermarking scheme based on wavelet transform and principal component analysis. Alexandria Engineering Journal 53(4):833–842

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Milad Jafari Barani.

Ethics declarations

Conflict of interests

All authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jafari Barani, M., Ayubi, P., Yousefi Valandar, M. et al. A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed Tools Appl 79, 2127–2159 (2020). https://doi.org/10.1007/s11042-019-08225-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08225-5

Keywords

Navigation