Highly Robust and Imperceptible Luminance Based Hybrid Digital Video Watermarking Scheme for Ownership Protection
Автор: Himanshu Agarwal, Rakesh Ahuja, S.S.Bedi
Журнал: International Journal of Image, Graphics and Signal Processing(IJIGSP) @ijigsp
Статья в выпуске: 11 vol.4, 2012 года.
Бесплатный доступ
In this paper a hybrid digital video watermarking scheme based on discrete wavelet transform and singular value decomposition is proposed. Unlike the most existing watermarking schemes, the used watermark is a gray scale image instead of a binary watermark. The watermark is embedded in the original video frames by first converted it into YCbCr color space and than decomposing the luminance part (Y component) into four sub-bands using discrete wavelet transform and finally the singular values of LL sub-band are shaped perceptually by singular values of watermark image. The experimental result shows a tradeoff between imperceptibility and resiliency against intentional attacks such as rotation, cropping, histogram stretching, JPEG compression on individual frames, Indeo5 video compression and unintentional attacks like frame swapping, frame averaging, frame insertion and different types of noise addition. Superiority of the proposed scheme is carried out by comparison with existing schemes to reveal its efficiency for practical applications.
Video watermarking, Wavelet transform, Singular Value Decomposition, Ownership protection
Короткий адрес: https://sciup.org/15012459
IDR: 15012459
Текст научной статьи Highly Robust and Imperceptible Luminance Based Hybrid Digital Video Watermarking Scheme for Ownership Protection
Due to the rapid development of the internet and the distribution of digital media through it, the digital data can be reproduced very easily which drives to urgent need to resolve ownership protection issues. Therefore, the field of digital watermarking grows extremely fast in these few years. Recently the video watermarking problem has generated a flurry of research activity in the area of digital watermarking of electronic content for ownership protection. A powerful watermarking scheme usually poses the following key properties [1]: (1) imperceptibility, (2) robustness, (3) capacity (4) unambiguity. But it is impossible to design a scheme which covers all features at once. Thus we make tradeoffs between aforementioned properties. The watermark used in the proposed video watermarking scheme is a gray scale logo instead of a binary logo due to its relevance in many practical situations and also the gray scale watermark has grater possibilities of survival under a number of popular attacks because gray-scale watermark carries a very high amount of watermark contents to preserve a certain degree of contextual relationship effect [2].
According to the processing methods video watermarking schemes mainly classified in two categories: Spatial domain and transform domain [3]. Spatial domain watermarking alters the pixel values of the original image directly. Such methods have very low computational complexity but they are vulnerable to attacks [3, 4]. In contrast the transform domain techniques, for example discrete cosine transformation (DCT), discrete wavelength transformation (DWT) and singular value decomposition (SVD) proved to be more robust and imperceptible due to disperse of watermark making it difficult for attacker to extract the embedded watermark [5] .
Lama et al. [5] design the video watermarking algorithms using SVD transform and achieving fair level of imperceptibility but fail to achieve reasonable robustness against most of the attacks. Radu and Dragos [6] proposed video watermarking scheme in wavelet domain. They embed the watermark in wavelet coefficient of LH, HL and HH sub-bands of second wavelet decomposition and achieve some resilience against different attacks in the spatial and compressed domain. But the shortcoming of this method is that embedding watermark in multiple sub-bands of the wavelet domain is not well suited for video applications. Ming et al. [7] also design a video watermarking scheme based on MPEG-2 but it is limited to low bit rate MPEG-2 compression and synchronization attacks. Our paper shows a combination of discrete wavelet transforms and the singular value decomposition schemes to provide better results as compared to use them individually, by using the following advantages inherited with SVD and DWT [5]: 1) If the watermark is embedded in the low frequencies bands of wavelet transform than it provide some resilience against compression and when embed in the high frequencies bands it provide robustness against noise addition and several type of filters. 2) Wavelets are easily adoption for human visual systems. 3) SVD is widely use in watermarking applications for improving the robustness.
Till now the techniques used for video watermarking are lagging behind, because of poor anti-attack technology and characteristics of the digital products that they are easy to copy and transfer. Facing the popularity of communication networks, digital video ownership protection and authentication is the critical issues which need to be solved. The proposed video watermarking scheme is an effective technique to solve these problems by retaining imperceptibility and robustness against various attacks.
The rest of the paper is organized as follows. In section two, we briefly introduce the concept of SVD and DWT transformation techniques for understanding our scheme. In section three, we propose our video watermarking method, where we describe the watermark embedding and extraction process. In section four, we presents the experimental results and in section five, same are compare with existing work done by previous researchers. The conclusions of our study are stated in section six.
-
II. Preliminaries
Since the details of the SVD and DWT are found in Refs. [2] and [8], this paper gives only a brief overview as below.
-
A. Singular Value Decomposition (SVD)
SVD is extensively used in a variety of image processing applications because it reveals several essential properties: 1) SVD of an image does not change significantly when a small perturbation is added to the image. Because of this property SVD has been used in watermarking methods to improving the robustness. 2) The SVD image matrix containing many small values compared with the first singular value so if we neglect these smaller values in reconstruction of an image, it does not degrade the quality of the image. Due to this reason it is widely used in compression of images. 3) Singular value of an image specifies the brightness of an image layer and the singular vector represents the geometry of the image.
The SVD technique decomposes a matrix A of size M x N in three matrices: U, S and V according to the following equation,
A = U x S x VT u1,1 ..
u 2,1 ..
u 1, M
u 2, M
° 1,1 0
.
.
x
x
v 1,1
v 2,1
v N ,1
u M ,1
u M , M
° 2,2
.
.
.
.
°
T
^ 1, N
v 2, N
v N , N
where U and V given in Eq.(1) are the orthogonal matrices of size M x M and N x N respectively, with the properties of U T U = I and V T V = I , here I is the identity matrix. S is the diagonal matrix of M x N containing the eigen values (σ i,i ) of matrix A arranged in a descending order.
-
B. Discrete Wavelet Transform (DWT)
DWT is an important tool for multiresolution decomposition of images or video frames and are widely used in image and video processing due to its following inherited benefits over the sinusoids based transform:
-
1) It has an ability to analyze the signal in both time and frequency domain simultaneously.
-
2) Wavelet exhibit constant shape because they are generated from only one function
In wavelet investigation, an orthonormal set of functions, as well as a nonorthogonal, but linearly independent basis are employed [2]. A 2D wavelet transform decompose an image into four components:
-
1) Approximation Coefficients
-
2) Horizontal Coefficients
-
3) Vertical Coefficients
-
4) Diagonal Coefficients
Approximation coefficients are also called as base image which represents the low frequency part. The horizontal, vertical and diagonal coefficients are called detail coefficients and represent the high frequency part along horizontal, vertical and diagonal of the image.
Let I be an image (or frame of an video), after decomposed by wavelet transformation, the consequent of the first level decomposition is
I = Iw LL1 + Iw LH1 + Iw HL1 + Iw HH1
where Iw LL1 represent the base image (approximation) and Iw LH1 , Iw HL1 , Iw HH1 are the first level vertical, horizontal and diagonal details. The approximation and detail images obtained from decomposition are usually structured as shown in Fig. 1.
Image or |
|
Frame |
|
X |
LL |
HL |
|
LH |
HH |
Fig. 1 Wavelet Decomposition
We can get the nth level decomposition by recursively applying 2D wavelet on individual coefficients of the derived components to get more fine details of the image (frame).
-
III. Proposed Watermarking Scheme
In the propose method, we take the size of the watermark is equal to the approximation part of the first level decomposition of the image, derived by applying discrete wavelet transform on the original image.
-
A. Embedding Procedure
Step 1. Convert the RGB video frame into YCbCr color space by using the following equations, Y = 0.299 x R + 0.587 x G + 0.114 x B
Cb = 0.596 x R - 0.275 x G - 0.321 x B (2)
Cr = 0.212 x R - 0.523 x G - 0.311 x B
Step 2. Decompose the luminance part of the frame by apply DWT, resulting in approximation part LL1 and detail parts LH1, HL1 and HH1 respectively.
Step 3. Decompose the approximation part (LL1 subband) of DWT by apply singular value decomposition, resulting U F , S F and V F matrices, where S F represents the singular values of approximation part in descending order.
SVD (LL1) = UF x SF x VF (3)
Step 4. Apply singular value decomposition on the watermark W, by which watermark is decomposed into three matrices U W , S W and V W , where S W contains the singular values of the watermark in descending order.
SVD (W) = UW x SW x VW (4)
Step 5. Modify the singular values of the approximation part by singular values of the watermark as,
SF* = SF + a SW, (5)
where a is the scale coefficient, to balance the tradeoff between the robustness and imperceptibility. Its value is taken as 0.01 in this paper.
Step 6. For getting the modified wavelet approximation coefficient, inverse SVD is applied on the modified singular values S F * and U W , V W values obtained from Eq. (4).
Step 7. Apply inverse DWT on the modified approximation part and all detail parts to get the modified luminance part Y' of the frame.
Step 8. Reconstruct the video frame (watermarked video frame) from the modified luminance part Y ' and chrominance part Cb and Cr of the original frame by convert the YCbCr into RGB color space using the following equations,
R' = Y' + 0.956 x Cb + 0.620 xCr
G' = Y' - 0.272 x Cb - 0.647 x Cr(6)
B' = Y' - 1.108 x Cb + 1.705 xCr
-
B. Extraction Procedure
Step 1. Convert the RGB video frame into YCbCr color space.
Step 2. Decompose the luminance part of the frame by apply DWT, resulting in approximation part LL1 and detail parts LH1, HL1 and HH1.
Step 3. Decompose the approximation part (LL1 subband) of DWT by apply singular value decomposition, resulting U F , S F * and V F matrices, ad getting the singular values of approximation part S F *.
Step 4. Extract singular values of the watermark from approximation part,
Sw* = (SF*- SF)/a (7)
Step 5. Extract the watermark image W' by using the inverse SVD as
W'=UW x Sw* x VTW (8)
-
IV. Expirenmental Setup and Results
The imperceptibility and robustness of the proposed video watermarking scheme is demonstrated using MATLAB by considering standard color video sequence Rhino in 240 x 320 pixels with the frame rate of 15 fps and a length of 114 frames. The two standard gray-scale images logo.tif and cameraman.tif are of same size 120 x 160 pixels (by resizing it so that its size is equal to the size of LL band of the video frame) are selected as watermark. Transparency (imperceptibility) of the watermark is estimated by PSNR (peak signal to noise ratio). If the PSNR is higher than we get the less distorted frame. PSNR is measured in decibels (dB) as:
PSNR = 10logw f ' (9)
N xN
Fig.2 shows the tenth frame in the original video with the corresponding watermarked and attacked frames. Through figure we can conclude that frames can not be distinguished by the Human Visual System (HSV).
Robustness which is the ability of a persistent association method to withstand signal modifications under different attacks is computed by the correlation coefficient (CC) [10]. CC between embedded gray-scale watermark image (W) and extracted watermark image (W') is given as,
SS ( W mn - w )( w mn - w ')
CC= m n=
J flZ( Wmn - w )2 YlZ(wmn - w ')21
у \ m n ) \ m n where W and W' are the image matrices of the same size and W and W ′ are the mean value of embedded watermark image and extracted watermark image respectively. The original and extracted watermarks are shown in Fig. 3.

Fig. 2 (a) Original Frame
Fig. 2 (b) Watermarked Frame

Fig. 2 (c). JPEG Compressed Frame (Q =25)

Fig. 3 (a) Original Watermarks

Fig. 3 (b) Extracted Watermarks. JPEG Compression (Q=25)
Results of the Test obtained are summarized in Table:
Attack Type |
PSNR Value |
CC |
Extracted Watermark |
Cropping (40 Columns) |
19.2870 |
0.9218 |
Г r ■ 1 МИВ Iw^k^I |
Rotation (0.5o Degree) |
31.5955 |
0.8913 |
M *1B LSI |
Salt and Peeper Density 0.01 |
29.8433 |
0.6948 |
|
Speckle Noise Variance 0.001 |
33.5889 |
0.8699 |
M*TB |Жу№ |
Poisson Noise |
35.1739 |
0.8593 |
mVtb ж)№ 1 Я |
JPEG Compression Quality Factor Q =25 |
33.9343 |
0.8691 |
ЬЙЗДГ |
Indeo5 Compression Quality Factor Q =25 |
33.5694 |
0.8691 |
1 M*tB |
Frame Swapping (Swap Six Frames) |
32.7610 |
0.8530 |
l^^^-l |
Frame Averaging (Average Two Frames) |
32.9146 |
0.8579 |
I M NTB Ix^ : t^ |
Frame Insertion (Ten Frames Inserted) |
24.1094 |
0.9173 |
I M *TH IwrXlKS |
Intensity Adjustment Between [.2 .3 .1] to [.6 .7 1] |
21.1467 |
0.9645 |
Attack Type |
PSNR Value |
CC |
Extracted Watermark |
|
Cropping (40 Columns) |
19.2875 |
0.9057 |
ч^кп ^<—-^ $w * х ДгЖ - х -л* |
|
Rotation (0.5o Degree) |
31.6002 |
0.8500 |
X |
|
Salt and Peeper Density 0.01 |
29.8398 |
0.6061 |
- Х'1 |
|
Speckle Noise Variance 0.001 |
33.6066 |
0.8394 |
■та* |
|
Poisson Noise |
35.1980 |
0.8655 |
||
JPEG Compression Quality Factor Q =25 |
33.9736 |
0.8434 |
||
Indeo5 Compression Quality Factor Q =25 |
33.8426 |
0.8426 |
Ввс^1 |
|
Frame Swapping (Swap Six Frames) |
32.8024 |
0.8316 |
||
Frame Averaging (Average Two Frames) |
32.9579 |
0.8368 |
||
Frame Insertion (Ten Frames Inserted) |
24.1123 |
0.9110 |
||
Intensity Adjustment Between [.2 .3 .1] to [.6 .7 1] |
21.1473 |
0.9660 |
-
V. Comparison With The Previous Work
Results obtained from the Table. I and Table. II are compared with the existing work which shows in Table. III. Superiority of the proposed scheme is carried out by comparison made with existing schemes which reveal the efficiency of proposed scheme for practical applications.
TABLE III. COMPARISON BETWEEN CORRELATION COEFFICIENTS OF THE PROPOSED SCHEME AND THE EXISTING METHODS
Attack Type |
[11] |
[12] |
[13] |
[14] |
Proposed Scheme |
JPEG Compression |
0.812 |
0.510 |
0.65 |
- |
0.8691 |
Frame Averaging |
0.661 |
0.482 |
- |
- |
0.8579 |
Contrast Adjustment |
- |
- |
- |
0.5192 |
0.9645 |
-
VI. Conclusions
In this paper we proposed a robust video watermarking scheme for ownership protection based on wavelet transform and singular valued decomposition. Eleven different types of attacks were applied to the watermarked video in the proposed system. Simulation results shows that the proposed scheme achieve good resilience against most of the geometric and video specific attacks. A comparison with different algorithms reveals the superiority of the proposed scheme.
According to the experimental results summarized in the Table.1 and Table.2 above, the proposed watermarking scheme can achieved the following features:
-
1) In the proposed scheme, we embed the watermark on the SVD coefficients achieved by taking LL band through DWT of video frame, so the scheme has certain robustness and it preserve the transparency of the watermark in the video sequence.
-
2) The proposed scheme also shows considerable amount of resistance against the various types of noise even if the watermark is shaped in the low frequencies of the video frame through DWT.
-
3) The capacity of embedding is good enough as the size of the embedded watermark is greater than the size of watermarks use by most of the previous researchers [2, 9].
Acknowledgment
The authors would like to thank Mr. Farooq Husian Associate professor, Moradabad Institute of Technology, Moradabad (U.P) India for the careful reading of the paper and for constructive, focused comments and suggestions.
Список литературы Highly Robust and Imperceptible Luminance Based Hybrid Digital Video Watermarking Scheme for Ownership Protection
- Jamal Ali Hussein, “Luminance-based Embedding Approach for Color Image Watermarking”, I.J. Image, Graphics and Signal Processing, 2012, 3, 49-55
- Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman, “Robust gray-scale logo watermarking in wavelet domain”, Computers and Electrical Engineering 3 (2012), doi 10.1016/j.compeleceng.2012.02.002.
- N. Nikolaidis, I. Pitas, “Robust image watermarking in the spatial domian”, Signal Processing 66 (3) (1998) 385-403.
- J. C. Liu, S. Y. Chen, “Fast two layer image watermarking without referring to the original image and watermark”, Image and Vision Computing 19 (14) (2001) 1083-1097.
- Lama Rajab, Tahani Al-Khatib, Ali Al-Haj “Video Watermarking Algorithms Using the SVD Transform”, European Journal of Scientific Research, ISSN 1450-216X Vol.30 No.3 (2009), pp.389-401.
- Radu O. Preda, Dragos N. Vizireanu, “A robust digital watermarking scheme for video copyright protection in wavelet domain”, Measurement 43 (2010) 1720-1726.
- Ming-Shi Wang , Wei-Che Chen, “A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography”,Computer Standards & Interfaces 31 (2009) 757–762.
- Guoliang Zeng, “Face Recognition with Singular Value Decomposition”, CISSE Proceeding,2006.
- Saeed Rastegara, Fateme Namazi, Khashayar Yaghmaie, Amir Aliabadian, “Hybrid watermarking algorithm based on Singular Value Decomposition and Radon transform” , Int. J. Electron. Commun. (AEÜ) 65 (2011) 658–663.
- J. Zhang, A. Ho, G. Qiu, P. Marziliano, Robust video watermarking of H./ AVC, IEEE Transactions on Circuits and System-II : Express Briefs 54(February) (2007) 205-209.
- X. Niu and S. Sun, "A New Wavelet-Based Digital Watermarking for Video," in Proceedings of the 9th IEEE Digital Signal Processing Workshop, 2000, pp. 241-245.
- C. Hsu, “DCT-Based Watermarking for Video," IEEE Trans. Consumer Electronics, vol. 44, no. 1, pp. 206-216, Jan. 1998.
- M. R. Saghavi, A. M. Rajukar, R. Mathur, K. S. Kotecha, “A Robust scheme for digital video watermarking based on scrambling of watermark,” I. J. Computer Applications Vol. 35 (2) Dec. 2011.
- S. Sinha, P. Bardhan, Swarnali. P, A. Jagatramka, D. K. kole, A. Chakarborty, “Digital Video watermarking using DWT and Principal component analysis,” I. J. Wisdom based computing Vol.1 (2) Aug-2011.