Next Article in Journal
Trade-Offs among Sensing, Reporting, and Transmission in Cooperative CRNs
Next Article in Special Issue
Integrated Navigation Algorithm Based on Multiple Fading Factors Kalman Filter
Previous Article in Journal
Effective Free-Driving Region Detection for Mobile Robots by Uncertainty Estimation Using RGB-D Data
Previous Article in Special Issue
Bayesian Cramér-Rao Lower Bounds for Prediction and Smoothing of Nonlinear TASD Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF

1
College of Electronic and Information Engineering, Shandong University of Science and Technology, Qingdao 266590, China
2
Department of Electrical Engineering and Information Technology, Shandong University of Science and Technology, Jinan 250031, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(13), 4752; https://doi.org/10.3390/s22134752
Submission received: 18 May 2022 / Revised: 19 June 2022 / Accepted: 20 June 2022 / Published: 23 June 2022
(This article belongs to the Collection Multi-Sensor Information Fusion)

Abstract

:
Video watermarking is an important means of video and multimedia copyright protection, but the current watermarking algorithm is difficult to ensure high robustness under various attacks. In this paper, a video watermarking algorithm based on NSCT, pseudo 3D-DCT and NMF has been proposed. Combined with NSCT, 3D-DCT and NMF, the algorithm embeds the encrypted QR code copyright watermark into the NMF base matrix to improve the anti-attack ability of the watermark under the condition of invisibility. The experimental results show that the algorithm ensures the invisibility of the watermark with a high signal-to-noise ratio of the video, and meanwhile has high ability and robustness against common single and combined attacks, such as filtering, noise, compression, shear, rotation and so on. The issue that the video watermarking algorithm has poor resistance to various attacks, especially the shearing attack, has been solved in this paper; thus, it can be used for digital multimedia video copyright protection.

1. Introduction

In recent years, the number of online videos has escalated, and it is very easy to publish and obtain video resources. The ensuing digital video copyright issues and data security issues frequently occur, and illegal intruders use modern technical means to arbitrarily access, copy, modify and disseminate media files, seriously threatening the legitimate interests of copyright holders, and even causing harm to personal and property safety [1,2,3]. As an effective method for multimedia copyright protection, video watermarking algorithms with better robustness and more comprehensive attack resistance are urgently needed; a challenging task to combat the current pervasiveness of a large quantity of digital media and tampering tools.
At present, the research of digital watermarking technology for video is mainly based on spatial domain [4,5,6], compression domain [7,8,9,10,11,12] and transform domain [13,14,15,16,17,18,19,20,21]. The principle of the video watermarking algorithm in the spatial domain is to embed watermark data on the basis of a processing pixel value of a video frame image. For example, [4] proposed a fragile watermarking algorithm based on the logic graph, which embeds the watermark into the least significant components of the modified image pixels. However, on the whole, the spatial domain watermarking algorithm has poor anti-attack ability and a narrow application range [5,6]. The video watermarking algorithm based on the compressed domain is a branch of video watermarking, which is usually combined with video coding standards, including video watermarking algorithms based on MPEG-X [7,8], AVC (Advanced Video Coding)/H.264 standard [9,10] and HEVC/H.265 standard [11,12].
Transform domain video watermarking is also an important branch of video experiments, and has a vast range of transform and decomposition methods that can be applied, and that have better robustness. This kind of algorithm is designed to embed and extract the watermark in the transform domain. DWT (Discrete Wavelet Transform) [13], DCT (Discrete Cosine Transform) [14] and SVD (Singular Value Decomposition) [15] are commonly used to transform the image into the transformation domain, which then enables us to embed the watermark in the transform domain. Combining graph-based transformation, singular value decomposition and hyperchaotic encryption, Sharma et al. [16] proposed a video watermarking algorithm, which can solve the address quality loss of data well; however, the algorithm is complex, and the anti-rotation attack performance is poor. Video is a combination of two-dimensional space and one-dimensional time, and three-dimensional transformation is more comprehensive and more suitable than two-dimensional transformation. Fu et al. proposed a watermarking algorithm acting on the 3D-DCT domain. Compared to the algorithm for embedding watermarks on the 2D-DCT coefficients, its robustness is better, but its computational complexity is higher and it takes a longer time [17]. The authors of [18,19] proposed a pseudo 3D-DCT (Pseudo Three-dimensional Cosine Transform) domain video zero-watermarking algorithm; the algorithm performs pseudo 3D-DCT on the moving target centroid block of the keyframe image. The XOR operation of the keyframe eigenvalue sequence is constructed by the AC coefficient, and the encrypted watermark sequence generates a zero watermark, but the anti-rotation attack ability of the algorithm needs to be improved. Li et al. proposed a watermarking algorithm based on DWT and pseudo 3D-DWT, which improved the robustness of the algorithm and the security of the watermark [20]. In addition to the classic transform domain, such as DCT, the DWT and NSCT (Non-Subsampled Contourlet Transform) [21] with multiresolution, and NMF (Non-negative Matrix Factorization) with good robustness against shearing, have also been applied to digital watermarking.
The current transform domain video watermarking algorithm commonly uses 2D transform, whereas the video sequence is a 3D signal; the 3D characteristics of the video frame can be fully utilized to improve the robustness and real-time performance of the algorithm. However, the current video watermarking algorithm based on 3D transform needs a large amount of computation. It is complex, time-consuming, the anti-interference ability is not comprehensive, and the robustness is not strong under certain attacks. A video watermarking algorithm based on pseudo-3D-DCT, NSCT and NMF, which is proposed in this paper, is designed to embed the encrypted watermark into the NMF decomposition of the 3D-DCT of the low frequency component of the NSCT of the keyframe set. The experimental results show that the algorithm combines the advantages of three kinds of changes, and has a good performance in invisibility and robustness. Compared to similar algorithms, this algorithm has more significant advantages in anti-rotation and anti-shearing attacks. On the whole, without increasing the amount of computation, this algorithm takes into account the invisibility and robustness, realizes a more comprehensive anti-jamming effect, and focuses on solving the issues of the poor robustness of most algorithms against shearing and rotation attacks.
In comparison with existing transforms and combinations of transforms, the algorithm suggested in this paper combines the features of three transforms; namely, pseudo 3D-DCT, NSCT and NMF, and is effective in terms of robustness and complete attack resistance. Among these, the usage of pseudo 3D-DCT extracts the video’s temporal information, and the computation is smaller and faster than other transformations, such as pseudo 3D-DWT and 3D-DCT. NSCT is utilized to synthesize the two-dimensional contour features of the frame image in order to improve the resistance of the algorithm to translation and rotation, reduce the number of operations, and enhance the robustness of the algorithm. The dimensionality reduction effect of NMF and the partial perception of the whole are utilized to improve the resistance of the algorithm to shearing attacks. The innovation of this work lies in the effective selection and integration of three transformations as the core of the algorithm, and the performance of the algorithm is tested through numerous experiments, which better achieves the requirements of multimedia high-standard copyright determination with high rapidity, high robustness and wide applicability.
Section 2 focuses on the principles of the three transformations of pseudo 3D-DCT, NSCT and NMF involved in the algorithm. Section 3 illustrates the video watermark embedding algorithm proposed in this paper, containing the algorithm flowcharts, steps and reference examples; in addition, the method of embedding intensity selection and optimization results are given. Section 4 illustrates the video watermark extraction algorithm, giving the algorithm flow, steps and examples as reference. Section 5, experimental results and analysis, shows the anti-attack effect of the algorithm in this paper, and provides a comparison with similar algorithms. From the experimental results, the algorithm in this paper has advantages in terms of the robustness and comprehensiveness of its anti-attack ability. Section 6 summarizes the contents of this paper, and explains the significance of our findings for subsequent research, and the direction of optimization and improvement.

2. Related Theories

The algorithm proposed in this paper combines pseudo 3D-DCT, NMF and NSCT to improve the robustness of the video watermarking algorithm. The basic principles of these transformations are as follows.

2.1. Pseudo 3D-DCT of Images

DCT is a commonly used transformation in digital watermarking, but most of the images used 2D-DCT to obtain their spectrum. Using 3D-DCT, the video stream can be processed using DCT along the three dimensions (x, y, t) to obtain the spectral distribution of the video in space and time. Fu et al. embedded the watermark into the feature matrix after 3D-DCT, and the experimental data show that the 3D-DCT coefficient is more suitable for watermark embedding than the 2D-DCT coefficient.
As for a video of the size M × N × K (image size is M × N , image frame is K ), its 3D-DCT is shown in Equation (1).
F ( u , v , w ) = 8 M N K c ( u ) c ( v ) c ( w ) m = 0 M 1 n = 0 N 1 k = 0 K 1 f ( m , n , k )        cos ( 2 m + 1 ) u π 2 M cos ( 2 n + 1 ) v π 2 N cos ( 2 k + 1 ) w π 2 K c u = c v = c w = 1 / 2 u = 0 , v = 0 , w = 0 1   others   ;
where u , m = 0 , 1 , , M 1 ; v , n = 0 , 1 , , N 1 ;   w , k = 0 , 1 , , K 1 .
As a matter of fact, the 3D-DCT algorithm has a large complexity and calculation amount. In this paper, pseudo 3D-DCT is adopted to replace 3D-DCT, which greatly reduces the computational complexity and improves the real-time performance of the algorithm. In this paper, the principle of pseudo 3D-DCT is to perform 2D-DCT on the image first. Then, 1D-DCT is performed on the timeline [22]. The transform steps of the pseudo 3D-DCT principle are as follows:
(1)
Divide every four keyframes into a group, where each frame is a sub-block of 8 × 8 , and perform a 2D-DCT on each of these blocks.
(2)
The DC coefficients of sub-blocks at the same position in each group are connected along the time axis to form a sequence, upon which 1D-DCT is carried out. The result is the pseudo 3D-DCT coefficient.
The pseudo 3D-DCT principle is shown in Figure 1. Every four keyframes were divided into groups, and each keyframe was divided into 32 × 32 blocks to obtain 4096 sub-images. 2D-DCT was performed on each sub-image to obtain the DCT spectrum. Four DC coefficients of the DCT results of the sub-image at the same position were arranged in chronological order and 1D-DCT was performed; that is, the pseudo 3D-DCT was completed. Cox et al. [23] and Huang et al. [24] proposed that the embedding region of the watermark should be the most important component of the visual system, namely the low-frequency coefficient. The DC component of the DCT domain is robust and suitable for embedding the watermark, so this algorithm chooses to embed the watermark in the DC component.

2.2. NMF Decomposition of Images

NMF is a non-negative matrix factorization proposed by Lee et al. [25] It decomposes any non-negative matrix into two new non-negative matrices by dimensionality reduction. According to NMF, any non-negative matrix B of M × N can be decomposed into the product of the basis matrix W and the coefficient matrix H, as shown in Equation (2); that is, the column vectors of matrix B can be regarded as the sum of all column vectors in W multiplied by the corresponding column vectors in H.
B m × n = W m × r H r × n
where r represents the dimension of NMF decomposition, and satisfies r < m n / m + n .
The essence of non-negative matrix decomposition is a process of constrained optimization solution [26], and the iterative rule can be used to solve the basis matrix W and coefficient matrix H. The key to NMF decomposition is the selection of an objective function and an iteration rule [27]. The objective function and iteration rule selected in this paper are shown in Equations (3) and (4), respectively.
min B W H 2 W , H 0
H H W T B W T W H W W B H T B T B H
where “T” represents the transpose.
When the video is subjected to a malicious shearing attack, the damage to watermark information is irreversible; the dimension reduction effect achieved by NMF, and the feature of partial perception of the whole, can be applied to the watermark technology to improve its ability to resist shearing attack. Furthermore, its non-negative decomposition form and decomposition result has practical and explicable physical significance.

2.3. NSCT of Images

NSCT is a multiscale and multi-decomposition geometric analysis algorithm proposed by da Cunha et al. [28]. It is mainly composed of an NSP (Non-Subsampled Pyramid) and NSDFB (Non-Subsampled Directional Filter Bank) [29]. The two-level NSCT block diagram is shown in Figure 2.
The multiscale characteristics of NSCT are realized by the NSP, and the direction decomposition is based on the NSDFB. The two sets of two-channel filter banks remove upsampling and subsampling from the decomposition process, and the direction sub-bands at all scales are the same size as the original image, and translation invariance is obtained. Applying the NSCT to the digital watermarking algorithm can improve the algorithm’s ability to resist translation and rotation on the one hand, and guarantee the embedding capacity of the watermark on the other hand [30].

3. Video Watermark Embedding Algorithm and Embedding Intensity Selection

3.1. Video Watermark Embedding Algorithm

The video watermark embedding algorithm framework flowchart based on the pseudo 3D-DCT proposed in this paper is shown in Figure 3. The algorithm combines private copyright information with QR coding technology to generate a QR code watermark, and then scrambles and encrypts the watermark by chaotic mapping to improve the robustness and security of the watermark.
Embedding the watermark on the luminance component Y not only has good robustness, but also has the smallest visual impact [31]; thus, the algorithm in this paper chooses to embed the watermark in the Y component of the image. The embedding algorithm first extracts the keyframes of the video and converts them from RGB to YCoCg color space. The keyframes are grouped in units of four, and the Y components of each group are decomposed by NSCT, pseudo 3D-DCT and NMF in turn, and the watermark is embedded in the base matrix obtained by NMF.
Figure 4 is an example of the video watermark embedding algorithm of the video Foreman. Four images are obtained as a keyframes group. Both the process of obtaining W i   by NSCT, pseudo 3D-DCT and NMF, and the process of returning a watermarked image, are operated. Finally, the watermarked video is produced, and the secret key and basis matrix are saved in the third party.
The process of watermark embedding is as follows:
(1)
Extract the keyframe of the video and save the frame number as the key.
(2)
Transform the keyframe image into YCoCg color space, and group its Y components into a group every four frames.
(3)
Perform two-level NSCT on four Y-component graphs of the group, denoted as Y i = Y i 1 , Y i 2 , Y i 3 , Y i 4 , and take their low-frequency sub-bands, denoted as L L i = L L i 1 , L L i 2 , L L i 3 , L L i 4 , where L L i 1 , L L i 2 , L L i 3 , L L i 4 , respectively, are the low-frequency sub-bands of the two-level NSCT of the four Y-component graphs.
(4)
In the pseudo 3D-DCT of L L i , the DC coefficient matrix with the DC coefficient raised dimension is denoted as B i .
(5)
NMF with r = 31 was performed on the B i matrix of group i, and the basis matrix W i was saved. The decomposition error is:
E i = B i W i H i
where E i is the error matrix; W i and H i are the basis matrix and coefficient matrix after NMF, respectively.
(6)
The encrypted watermark S is additive embedded into W i to obtain a new basis matrix W i . The embedding method is:
W i = W i + q S
where q is the embedding strength of the watermark.
(7)
Synthesize E i , W i , H i into a non-negative matrix:
B i = W i H i + E i
(8)
Perform inverse pseudo 3D-DCT on the B i to obtain the low-frequency sub-band L L i containing the watermark, and then perform inverse NSCT to obtain the brightness component containing the watermark Y i .
(9)
Y i is combined with Co and Cg components to obtain a watermarked keyframe image.
(10)
Place the keyframe back into the video according to the frame number to obtain the video sequence embedded with a watermark.

3.2. Watermark Embedding Strength Choice

The embedding strength of the watermark directly affects the performance of the watermarking algorithm. The robustness of the watermark algorithm will increase with increasing embedding strength, but its invisibility will decrease. The selection of embedding strength should balance the robustness with the invisibility of the watermark.
We conducted multiple experiments on classic test videos (Bus, Claire and Akiyo), and determined the embedding strength of watermarks according to the experimental results. Experimental results show that when the PSNR value of the image containing the watermark is above 40, the invisibility of the watermark is better; that is, the embedded watermark has no obvious influence on the visual effect of the image. In the embedded-strength test experiment, when the value is above 55, the video picture quality will be significantly affected, which may be caused by uneven brightness and spots, etc., and the greater the embedded-strength is, the more obvious the spots will be. Figure 5b,c are the pictures of the Claire video when the imprint embedding strength is 65 and 110 respectively. It can be seen from the partial enlargement that bright spots appear on the background beside the host’s shoulder.
We further quantitatively evaluate the influence of embedding intensity on image quality. Figure 6 shows the PSNR value of images under different embedding intensity. It can be seen that when the embedding intensity is between 10–55, the PSNR values of the images are all higher than 40, indicating good image quality. Therefore, we examine the changes of watermark robustness in the range of 10–55, and determine the final embedding strength value. Generally, the robustness of video watermarking to shear, rotation and noise attacks is poor. This paper focuses on the robustness of experimental algorithms for these three attacks. Under the attack of Gaussian noise 0.2, central shear 1/4 and rotation 90°, the relationship between watermark embedding strength and watermark extraction NC values are shown in Figure 7. On the whole, the NC values increase with the increase in watermark embedding strength, but the video picture quality decreases with the increase in embedding strength. In combination with the embedding strength, PSNR and robustness relationship, the embedding strength is determined as 50.

4. Video Watermark Extraction Algorithms

Video watermark extraction algorithm is the inverse process of watermark embedding, and its process is shown in Figure 8. The specific steps of the algorithm are as follows:
(1)
Find the video keyframe according to the frame number saved by the key.
(2)
According to the video watermark embedding algorithm, the NMF of the B ^ i of group i is decomposed into:
B ^ i = W ^ i H ^ i
where W ^ i and H ^ i are the basis matrix and coefficient matrix of B ^ i , respectively.
(3)
Using the saved base matrix W i , extract watermark W ^ i from S ^ as:
S ^ = ( W ^ i W i ) / q
(4)
Decrypt S ^ to obtain copyright watermark information s ^ , which can be used for copyright authentication.
Figure 8. Video watermark extraction flowchart.
Figure 8. Video watermark extraction flowchart.
Sensors 22 04752 g008
Figure 9 is an example of the video watermark extraction algorithm. Using a secret key, keyframes are obtained from the video. Through the process of obtaining W i   by NSCT, pseudo 3D-DCT and NMF, one obtains matrix W i   ^ . Via the basis matrix, which is saved in the third party, the watermark is extracted.

5. Experimental Results and Analysis

The experiments in this paper were carried out on the platform of Matlab 2017b, and the classic test videos (Foreman, Claire, Akiyo, Bus) were used as the experimental videos. The video frame size of Foreman, Akiyo and Bus is 352 × 288, and the frame rate is 29 fps; the frame size of Claire is 176 × 144, and the frame rate is 29 fps. Except for the Bus video, which is 5 s, the other three videos are all 10 s. In order to unify the period, the size of the video frame was first redefined as 512 × 512 in the experiment, and the original size was restored after the watermark embedding was completed. The experiment used ‘Shandong University of Science and Technology’ as copyright protection to generate QR code watermark. The watermark size is 64 × 31, the parameters of logistic chaotic encryption in the experiment are x 0 = 0.1 , μ = 4 , and the watermark embedding strength value is 50. The robustness and invisibility of the algorithm were evaluated by the PSNR value and the NC value.

5.1. Invisibility Experiment Results and Analysis

Four classical test videos were embedded and extracted with watermarks. The number of keyframes extracted by the algorithm and CPU running time are shown in Table 1.
Table 2 shows the PSNR value of the four experimental videos after embedding the watermark and the NC value of the extracted watermark. It can be seen from the experimental results that when the video is not attacked, the PSNR values of the watermarked keyframe images are all close to 50, indicating that the algorithm in this paper has good invisibility; alternatively, the NC value of the extracted watermark is 1, indicating that, using the algorithm in this paper, the resulting watermark can be used for copyright protection.

5.2. Robustness of Experimental Results and Analysis

We used the video Akiyo as the test video, and carried out common attacks, such as Gaussian noise, salt and pepper noise, shearing, scaling, rotation, JPEG compression, Gaussian filtering, MPEG4 compression, H.264 compression, etc., and robustness tests under various combined attacks, the results of which are shown in Table 3. From the experimental data, in the case of being attacked, the NC values of the extracted watermarks are all above 0.97, indicating that the algorithm has good robustness.
In order to further investigate the performance of the algorithm under attack, this paper selected noise, rotation, shearing, filtering and combined attacks to conduct a large-scale experiment, the results of which are shown in Figure 10.
(1)
Noise attack. The added attack intensity is Gaussian and salt and pepper noise in the range of 0–0.1. The experimental results are shown in Figure 10a. It can be seen from the results in the figure that, under the noise attack, the NC values of the watermark extracted from the video keyframes are above 0.99, indicating that the algorithm has strong anti-noise ability, especially under the salt and pepper noise attack, for which the NC values are above 0.995. To a certain extent, it can be shown that the resistance of the algorithm to salt and pepper noise is better than to Gaussian noise.
(2)
Rotation attack. The added attack is a rotation of 15° in the range of 10–180°, and the result is shown in Figure 10b. It can be seen from the figure that even under a large rotation attack, the NC value of most of the watermarks can still be maintained at about 0.98, indicating that the algorithm has good robustness to rotation attacks.
(3)
Shearing attack. The added attack is to cut 1/16, 1/8 and 1/4 in the upper left and upper right corners, and 1/4 in the center. The experimental results are shown in Figure 10c. The experimental results show that, due to the characteristics of the pseudo 3D-DCT and NMF algorithms, the algorithm also shows good robustness to shearing attacks.
(4)
Filter attack. The added attack is Gaussian filtering with different window sizes and scales of Sigma = 1 and Sigma = 5. The experimental results are shown in Figure 10d. It can be seen from the figure that the mean values of the NC extracted from the watermark are above 0.98, and the algorithm has strong robustness to filtering attacks under various window sizes.
(5)
Combination attack. In this paper, three combined attacks of rotation plus salt and pepper noise, JPEG compression plus cropping, and Gaussian filtering and Gaussian noise under different windows were selected for experiments, and the results are shown in Figure 11. From the experimental results, for the first combined attack, most of the watermark NC values extracted by the algorithm in this paper are above 0.90, which has a good anti-attack ability for the combined attack, and the algorithm is more sensitive to rotation attacks than salt and pepper noise. For the second combined attack, the algorithm in this paper has strong robustness under small-scale cropping and JPEG compression attacks, the extracted watermark NC values can reach more than 0.98, and the sensitivity to cropping attacks is higher than that of JPEG compression. For the third combined attack, the NC values of the watermark extracted by the algorithm in this paper under different window Gaussian filtering and Gaussian noise attacks are all above 0.90, which indicates good resistance, and that it is sensitive to both Gaussian filtering and Gaussian noise attack.

5.3. Comparative Experimental Analysis

The algorithm in this paper is compared with two similar algorithms in the literature [32,33]. The algorithm in [32] is a video watermarking algorithm based on the low-frequency sub-band of the Contourlet domain, which performs 1D-DCT on the time dimension for the low-frequency part. For the study of [33], the researchers chose DC coefficients and 2D-DWT low-frequency LL sub-bands for watermark embedding. The watermarks used in the two methods are 32 × 32 binary images, and the algorithm used in the two papers are a binary watermark based on QR coding.
In this paper, the same attack test was carried out on the literature-derived algorithms together with the proposed algorithm. Table 4 lists the experimental results of the Foreman and Bus videos. The table shows that the NC values of the watermark extracted by this algorithm are above 0.9, and the robustness of the proposed algorithm against attacks is better than that of the comparative algorithms. Compared with the literature-derived algorithms, the robustness of the proposed algorithm under shearing, rotation and scaling attack is better, especially for rotation and shearing attacks.

6. Conclusions

The video watermarking algorithm presented in this paper combines the advantages of NSCT, pseudo 3D-DCT and NMF to achieve both invisibility and robustness, and can be used in video copyright protection. It can be seen from the experimental results that the algorithm in this research successfully achieves real-time performance and invisibility of video watermarking, and shows high robustness against various attacks, such as noise, shearing, filtering, JPEG compression, etc. Under all kinds of attacks in the experiment, the average NC values of the extracted watermark were above 0.90. Compared with the algorithm using 3D-DCT, the proposed algorithm has high real-time performance and strong anti-attack ability, especially in anti-rotation and anti-shearing attacks. Under rotation attacks in the range of 0–180°, the average NC values were about 0.98; under shearing attacks, the average NC values were above 0.9. In addition, the anti-attack effect under the other attacks also exhibited outstanding performance.
The algorithm presented in this paper improves upon existing approaches in terms of robustness and comprehensive attack resistance. On the one hand, the algorithm presented in this paper will serve as a copyright authentication basis for multimedia that is vulnerable to most single or combined attacks, providing high robustness and comprehensive copyright protection for media publishers and organizations, as well as serving as a credential source for authentication agencies to certify high trustworthiness. The ideas and innovation of this algorithm, on the other hand, have implications for future research, and can be utilized as a useful research direction for high-performance copyright protection algorithms that can be further developed and optimized on this basis.
It should be noted that, with the development of society, researchers will have higher requirements for the real-time performance, robustness, and invisibility of the algorithm. Consequently, in future applications, there is a need to further improve the real-time and robustness of the algorithm. An optional solution is to optimize the NMF and pseudo 3D-DCT algorithms. Beyond that, this algorithm is conditional for saving the secret key and the basis matrix so that the algorithm can be improved in the future, to realize the blinding or semi-blinding of the algorithm. Furthermore, the proposed algorithm is based on the original video in an uncompressed format, but in some application scenarios, the video needs to be compressed for storage and transmission. Therefore, the study of the video watermarking algorithm, combined with the encoding format, is a research direction that needs attention.

Author Contributions

D.F.: conceptualization and methodology; X.Z.: software and writing—original draft preparation; W.K.: validation, writing—review and editing; H.Z.: validation, writing—review and editing; Y.L.: methodology and formal analysis. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Language Commission, project number is YB135-125.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

References

  1. Agarwal, H.; Husain, F. Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF. J. Inf. Secur. Appl. 2021, 59, 102846. [Google Scholar] [CrossRef]
  2. Sun, J.; Jiang, X.; Liu, J.; Zhang, F.; Li, C. An Anti-Recompression Video Watermarking Algorithm in Bitstream Domain. Tsinghua Sci. Technol. 2021, 26, 154–162. [Google Scholar] [CrossRef]
  3. Xuecheng, S.; Zheming, L.; Zhe, W.; Yongliang, L. A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT. Multimed. Tools Appl. 2021, 80, 13491–13511. [Google Scholar]
  4. Sahu, A.K. A logistic map based blind and fragile watermarking for tamper detection and localization in images. J. Ambient. Intell. Humaniz. Comput. 2021, 237902713. [Google Scholar] [CrossRef]
  5. Munir, R. A Secure Fragile Video Watermarking Algorithm for Content Authentication Based on Arnold Cat Map. In Proceedings of the 4th International Conference on Information Technology (InCIT), IEEE, Bangkok, Thailand, 24–25 October 2019; pp. 32–37. [Google Scholar]
  6. Arab, F.; Zamani, M.; Poger, S.; Manigault, C.; Yu, S. A Framework to Evaluate the Performance of Video Watermarking Techniques. In Proceedings of the 2nd International Conference on Information and Computer Technologies (ICICT), Kahului, HI, USA, 14–17 March 2019; pp. 114–117. [Google Scholar]
  7. Ahuja, R.; Singh Bedi, S. Video watermarking scheme based on IDR frames using MPEG-2 structure. Int. J. Inf. Comput. Secur. 2019, 11, 585–603. [Google Scholar] [CrossRef]
  8. Ahuja, R.; Sharma, M.; Haque, M.J. A Compressed domain Based Robust and Imperceptible Digital Video Watermarking Scheme. In Proceedings of the Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India, 6–8 November 2020; pp. 313–317. [Google Scholar]
  9. Sun, Y.; Wang, J.; Huang, H.; Chen, Q. Research on scalable video watermarking algorithm based on H.264 compressed domain. Opt. Int. J. Light Electron Opt. 2020, 227, 165911. [Google Scholar] [CrossRef]
  10. Li, C.; Yang, Y.; Liu, K.; Tian, L. A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC. Wirel. Commun. Mob. Comput. 2020, 2020, 8848553. [Google Scholar] [CrossRef]
  11. Dhevanandhini, G.; Yamuna, G. An effective and secure video watermarking using hybrid technique. Multimed. Syst. 2021, 27, 953–967. [Google Scholar] [CrossRef]
  12. Gaj, S.; Sur, A.; Bora, P.K. Prediction mode based H. 265/HEVC video watermarking resisting re-compression attack. Multimed. Tools Appl. 2020, 79, 18089–18119. [Google Scholar] [CrossRef]
  13. Darabkh, K.A.; Al-Sheikh, R.M.; Haddad, R.F.; Khalifeh, A.F. Scene Change Based Video Watermarking Algorithm. In Proceedings of the International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), Sakheer, Bahrain, 20–21 December 2020; pp. 1–6. [Google Scholar]
  14. Sun, W.; Zhao, H.; Zhang, X.; Sun, Y.; Liu, X.; Lv, X.; Fan, D. Zero-watermarking Algorithm for Audio and Video Matching Verification. Optim. Algorithms Dyn. Syst. 2022, 7, 8390–8407, (Accepted, SCI Source Journal). [Google Scholar] [CrossRef]
  15. Fan, D.; Li, Y.; Gao, S.; Wang, G.; Chi, C.; LV, C. A Novel Zero Watermark Optimization Algorithm Based on Gabor Transform and Discrete Cosine Transform. Concurr. Comput. Pract. Exp. 2020, 34, e5689. [Google Scholar] [CrossRef]
  16. Sharma, C.; Amandeep, B.; Sobti, R.; Kumar Lohani, T.; Shabaz, M. A secured frame selection based video watermarking technique to address quality loss of data: Combining graph based transform, singular valued decomposition, and hyperchaotic encryption. Secur. Commun. Netw. 2021, 2021, 5536170. [Google Scholar] [CrossRef]
  17. Fu, Y. Robust image watermarking scheme based on 3D-DCT. 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, IEEE, Tianjin, China, 14–16 August 2009; pp. 437–441. [Google Scholar]
  18. Yiming, L.; Chongxiong, Z. Video zero-watermarking algorithm in pseudo 3D-DCT domain. Electron. Meas. Technol. 2019, 42, 157–161+166. [Google Scholar]
  19. Huang, H.Y.; Yang, C.H.; Hsu, W.H. A video watermarking algorithm based on pseudo 3D DCT. IEEE Symposium on Computational Intelligence for Image Processing, Nashville, TN, USA, 30 March–2 April 2009; pp. 76–81. [Google Scholar]
  20. Li, D.; Cui, L.H. Robust Animation Zero Watermarking Based on Visual Cryptography and Complete Complementary Code. Lect. Notes Electr. Eng. 2017, 474, 60–65. [Google Scholar]
  21. Liu, X. Research on Digital Watermarking Algorithm for Audio and Video Matching. Master’s Thesis, Shandong University of Science and Technology, Qingdao, China, 2020. [Google Scholar]
  22. Li, D.; Yang, S.; Zuo, Y.; Zheng, Z.; Cui, L. Animation Zero Watermarking Algorithm Based on Edge Feature. In Lecture Notes in Electrical Engineering; Springer: Cham, Switzerland, 2018; Volume 518, pp. 565–571. [Google Scholar]
  23. Cox, I.J.; Kilina, J.; Leighton, T.; Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 1997, 6, 1673. [Google Scholar] [CrossRef]
  24. Huang, J.W.; Shi, Y.Q.; Shi, Q. Embedding Image Watermarks in DC Components. IEEE Trans. Circuits Syst. Video Technol. 2000, 10, 974–979. [Google Scholar] [CrossRef] [Green Version]
  25. Lee, D.D.; Seung, H.S. Learning the parts of objects with nonnegative matrix factorization. Nature 1999, 401, 788–791. [Google Scholar] [CrossRef]
  26. Medimegh, N.; Belaid, S.; Atri, M.; Werghi, N. Statistical 3D watermarking algorithm using non-negative matrix factorization. Multimed. Tools App. 2020, 79, 35–36. [Google Scholar] [CrossRef]
  27. Chen, Z.; Li, L.; Peng, H.; Liu, Y.; Yang, Y. A novel digital watermarking based on General non-negative matrix factorization. IEEE Trans. Multimed. 2018, 20, 1973–1986. [Google Scholar] [CrossRef]
  28. Da Cunha, A.L.; Zhou, J.; Do Minh, N. The Nonsubsampled Contourlet Transform: Theory, Design, and Applications. IEEE Trans. Image Processing 2006, 15, 3089–3101. [Google Scholar] [CrossRef] [Green Version]
  29. Amiri, A.; Mirzakuchaki, S. A digital watermarking method based on NSCT transform and hybrid evolutionary algorithms with neural networks. SN Appl. Sci. 2020, 2, 1669. [Google Scholar] [CrossRef]
  30. Narasimhulu, C.V. A robust hybrid video watermarking algorithm using NSCT and SVD. In Proceedings of the IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India, 21–22 September 2017; pp. 1495–1501. [Google Scholar]
  31. Madenda, S.; Darmayantie, A. Adaptive color space model based on dominant colors for image and video compression performance improvemen. Comput. Opt. 2021, 45, 405–417. [Google Scholar] [CrossRef]
  32. Jiang, Y.; Cai, M.; Song, C.H. Contourlet domain anti-attack video watermarking algorithm based on SIFT. Comput. Simul. 2018, 35, 314–320. [Google Scholar]
  33. Sang, J.; Liu, Q.; Song, C.L. Robust video watermarking using a hybrid DCT-DWT approach. J. Electron. Sci. Technol. 2020, 18, 100052. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of the pseudo 3D-DCT principle.
Figure 1. Schematic diagram of the pseudo 3D-DCT principle.
Sensors 22 04752 g001
Figure 2. Two-level NSCT decomposition block diagram.
Figure 2. Two-level NSCT decomposition block diagram.
Sensors 22 04752 g002
Figure 3. Video watermark embedding algorithm framework flowchart.
Figure 3. Video watermark embedding algorithm framework flowchart.
Sensors 22 04752 g003
Figure 4. An example of a video watermark embedding algorithm.
Figure 4. An example of a video watermark embedding algorithm.
Sensors 22 04752 g004
Figure 5. Video images under different embedding strengths.
Figure 5. Video images under different embedding strengths.
Sensors 22 04752 g005
Figure 6. Relationship between PSNR and embedded strength.
Figure 6. Relationship between PSNR and embedded strength.
Sensors 22 04752 g006
Figure 7. Relationship between watermark NC values and embedding strength under different attacks.
Figure 7. Relationship between watermark NC values and embedding strength under different attacks.
Sensors 22 04752 g007aSensors 22 04752 g007b
Figure 9. An example of video watermark extraction.
Figure 9. An example of video watermark extraction.
Sensors 22 04752 g009
Figure 10. NC values of watermarks under noise, rotation, shear, filter attacks.
Figure 10. NC values of watermarks under noise, rotation, shear, filter attacks.
Sensors 22 04752 g010
Figure 11. NC values under different combined attacks.
Figure 11. NC values under different combined attacks.
Sensors 22 04752 g011aSensors 22 04752 g011b
Table 1. Watermark embedding extraction time of four classical videos.
Table 1. Watermark embedding extraction time of four classical videos.
Video NameVideo
Length (s)
Number of Keyframes Embedded with WatermarksCPU Time (s)
Akiyo1012<75
Bus516<96
Claire1028<103
Foreman104<25
Table 2. Invisibility experiment results without attack.
Table 2. Invisibility experiment results without attack.
Video NameForemanClaireAkiyoBus
Some video frames with watermark Sensors 22 04752 i001 Sensors 22 04752 i002 Sensors 22 04752 i003 Sensors 22 04752 i004
PSNR47.167948.135248.019349.0118
NC1.00001.00001.00001.0000
Table 3. Robustness experimental results of the algorithm.
Table 3. Robustness experimental results of the algorithm.
Attack TypeAttack
Parameter
PSNRNCAttack TypeAttack
Parameter
PSNRNC
Gaussian noise0.0120.40670.9968rotation10°13.56210.9943
0.0514.25190.995020°11.18960.9939
Salt and pepper noise0.0124.74490.997845°8.97300.9871
0.0517.75920.9966JPEG compression7040.46860.9989
ShearingUpper left shear 1/37.17230.99213036.88520.9984
Down shear 1/310.04800.9732526.71720.9942
Scaling1/240.38440.9987Combined attackJPEG10 + scaling 1/231.95840.9973
247.99810.9996Upper left shear 1/16 + Gaussian noise 0.0211.31360.9945
Gaussian filtering3 × 338.52500.9965JPEG10 +
salt and pepper noise 0.1
17.31470.9936
7 × 736.59730.9958Median filtering + center shear 1/49.47940.9881
RecompressionMpeg440.9780.9995Gaussian filtering 3 × 3
+ Mpeg4 compression
13.61110.9902
H.26439.57140.999Scaling 2
+ H.264 compression
20.43270.9923
Table 4. Comparison of experimental results (NC value).
Table 4. Comparison of experimental results (NC value).
Experiment VideoAttack TypeAlgorithm [32]
Algorithm
Algorithm [33]
Algorithm
Proposed
Algorithm
ForemanRotation (10°)0.82260.82090.9910
Rotation (30°)0.85910.80960.9941
Rotation (45°)0.83300.79920.9884
Scaling (1/2)0.97570.92900.9992
Scaling (2)0.63480.90410.9995
Rotation (10°) + Scaling (2)0.85910.80420.9803
Rotation (30°) + Scaling (1/2)0.84350.79240.9909
Shearing (1/8)0.90780.52920.9953
Scaling (1/4)0.80700.39360.9913
Scaling (1/2)0.60000.32350.9309
Median filtering0.99650.92950.9972
BusRotation (10°)0.88870.85620.9912
Rotation (30°)0.78610.82080.9911
Rotation (45°)0.70780.79610.9871
Scaling (1/2)0.98430.94730.9991
Scaling (2)10.91380.9996
Rotation (10°) + Scaling (2)0.89040.82790.9817
Rotation (30°) + Scaling (1/2)0.78090.79470.9851
Shearing (1/8)0.90610.59450.9973
Shearing (1/4)0.81570.47890.9894
Shearing (1/2)0.59650.45600.9477
Median filtering0.98260.94690.9965
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Fan, D.; Zhang, X.; Kang, W.; Zhao, H.; Lv, Y. Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF. Sensors 2022, 22, 4752. https://doi.org/10.3390/s22134752

AMA Style

Fan D, Zhang X, Kang W, Zhao H, Lv Y. Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF. Sensors. 2022; 22(13):4752. https://doi.org/10.3390/s22134752

Chicago/Turabian Style

Fan, Di, Xiao Zhang, Wenshuo Kang, Huiyuan Zhao, and Yingjun Lv. 2022. "Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF" Sensors 22, no. 13: 4752. https://doi.org/10.3390/s22134752

APA Style

Fan, D., Zhang, X., Kang, W., Zhao, H., & Lv, Y. (2022). Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF. Sensors, 22(13), 4752. https://doi.org/10.3390/s22134752

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop