Next Article in Journal
Identifying the Lack of Energy-Conscious Behaviour in Clinical and Non-Clinical Settings: An NHS Case Study
Next Article in Special Issue
Robust Burst Detection Algorithm for Distributed Unique Word TDMA Signal
Previous Article in Journal
Multi-Connectivity Enhanced Communication-Incentive Distributed Computation Offloading in Vehicular Networks
Previous Article in Special Issue
A Novel Zero Watermarking Based on DT-CWT and Quaternion for HDR Image
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

MPEG and DA-AD Resilient DCT-Based Video Watermarking Using Adaptive Frame Selection

School of Computing, Hallym University, Chuncheon 24252, Korea
Electronics 2021, 10(20), 2467; https://doi.org/10.3390/electronics10202467
Submission received: 13 August 2021 / Revised: 22 September 2021 / Accepted: 28 September 2021 / Published: 11 October 2021
(This article belongs to the Special Issue Theory and Applications in Digital Signal Processing)

Abstract

:
We present a robust video watermarking scheme and report the detailed robustness of the video watermarking assessed based on standard criteria obtained from Information Hiding and its Criteria (IHC) Committee. Using discrete cosine transform domain spread-spectrum watermarking, our system achieves robustness under various non-hostile video processing techniques, including MPEG compression and digital/analog–analog/digital (DA-AD) conversion. The proposed system ensures that a 16-bit embedded sequence can be extracted through adaptive frame selection in any 15-s interval, even with a long video clip. To evaluate the performance of the proposed watermarking scheme, we conducted robustness tests under a DA-AD conversion environment, based on the MPEG-4 part 10 (H.264) codec. The experiment results obtained indicate that, in addition to being robust against non-hostile video processes, the proposed method achieves invisibility. The assessment of the developed watermarking scheme also satisfies the third edition of the IHC video watermarking evaluation criteria.

1. Introduction

Digital technology has completely changed our lifestyles by providing several convenient digital tools; however, it has also created a plethora of problems, one of which is digital copyright infringement. Today, with the wide variety of available digital tools, digital content can be copied extremely easily, thereby facilitating the rapid spread of illegal digital content globally. Consequently, digital copyright protection has become an important issue. Digital watermarking is a process that changes a cover work invisibly to insert a secret message [1]. A major application of digital watermarking is the protection of intellectual property. In particular, digital watermarking provides robustness against analog hole piracy [2] when it is infeasible to protect original works of authorship using other protection techniques such as digital rights management (DRM).
Several studies have been conducted on digital watermarking, and there have been several benchmarking attempts at creating watermarking systems [3,4,5,6,7]. The Information Hiding and its Criteria (IHC) Committee has been working to improve this situation by promoting the development of digital watermarking technology [7]. Specifically, its objective is to develop standard evaluation criteria and sponsor watermark competitions based on these criteria. As a part of this objective, a benchmarking study was conducted on various types of image, video, and audio watermarking, based on standardized criteria [8,9,10,11,12].
This paper is a follow-up to our previous research [8], which described a robust video watermarking scheme based on discrete cosine transform (DCT) watermarking methodology. Herein, we present a robust watermarking system for video data and evaluate it based on standard criteria from IHC. The watermarking scheme achieves robustness against temporal desynchronization by adopting the adaptive selection of video frames for watermarking. In the adaptive frame selection, a secure watermark message is inserted, and the watermarked frame sequence is compressed based on the MPEG-4 part 10 codec (H.264). Subsequently, frames that are robust to lossy video compression are selected for the watermark message embedding. Herein, we adopt a DCT based watermarking based on a spread-spectrum methodology that is robust to lossy compression such as MPEG and JPEG, the addition of Gaussian and white noise, digital/analog–analog/digital (DA-AD) conversion, and uniform scaling. Thus, the inserted watermark message and bit sequences can resist various video processes. The evaluation results indicate that our watermarking scheme achieves not only perceptual invisibility but also robustness against non-hostile processes. The assessment of the developed watermarking scheme satisfies the 3rd edition of the IHC video watermarking evaluation criteria [7].
The rest of this paper is organized as follows. In Section 2, we describe the background of this study, and in Section 3, the proposed watermarking method is provided. The experimental setup and results are presented in Section 4, and finally, in Section 5, we present some concluding remarks.

2. Background

Digital-to-analog conversion is the process of transforming a signal from the digital to the analog domain. After this process, the receiver can receive digital information through an analog-to-digital conversion. When outputting this intermediate transmission channel or video, a problem called an analog-hole might be encountered. An analog hole (also known as an analog loophole) is the perceived fundamental and inevitable vulnerability inherent in copyright protection schemes for non-interactive works in digital format. Digital multimedia can be exploited to duplicate a copy-protected work that is ultimately reproduced through analog means [2]. Once digital content has been converted into a human-perceptible format, it is relatively simple to digitally recapture an analog copy in an unrestricted format, thereby fundamentally circumventing all protections on copyrighted digital distribution and reproduction.
Digital watermarking provides robustness against analog hole piracy [2] when it is infeasible to protect original works of authorship through other protection techniques such as digital rights management (DRM). Owing to these characteristics, the application of digital watermarks as a technology in complementing DRM has been steadily receiving attention. A digital watermark is a technology that hides data in noise-resistant signals such as multimedia content. Many studies on watermarking technology applied to various contents have been conducted, such as watermarking based on neural networks [13], 3D meshes and prints [14,15], and spherical panoramic images [16].
Robust video watermarking methods based on various methodologies have been studied [17,18,19,20,21,22] Robustness against non-hostile video processing must be ensured to achieve copyright protection in video distribution cases. To provide robustness of the embedding patterns against lossy compression, various watermarking domain and primitives have been adopted, including a contourlet transform and a principal component analysis [17], gradient magnitude similarity deviation [18], and a hyperchaotic Lorentz system [19]. BhaBhardway et al. [23] proposed a significant frame selection and a quantization of the lifting wavelet transform coefficient difference based method for robust video watermarking. Huan et al. [22] demonstrated that the dual tree-complex wavelet (DT CWT) domain is effective for achieving a high robustness. For enhancing the robustness against lossy video compression, Barani et al. [21] used the coefficients of a contourlet transform to embed an encrypted watermark pattern using a singular value decomposition.
In the case of video watermarking, a pattern embedded as a secret message should be retrieved after applying various non-hostile and common video processes [24]. Video editing, photometric attacks, and spatial and temporal shifts (or desynchronization) are included in non-hostile video processes [25]. Photometric attacks are a process for modifying the pixel intensities in a frame. Noise addition and DA-AD conversions belong to this category. Another common treatment involves applying gamma correction to increase the contrast. To reduce the storage and transmission requirements, content owners re-encode their digital videos to a different compression ratio using a video compression algorithm. Video compression algorithms are based on a lossy compression on spatial and temporal domains of the media, such that the loss of information induced easily alters the performance of the watermarking algorithm. Similarly, customers can choose from standard video formats such as MPEG-1, MPEG-2, or MPEG-4. Spatial filtering and inter-frame filtering also have to be considered. A spatial shift or desynchronization can occur with changes in the display and spatial resolution. Primarily, temporal desynchronization occurs because of changes in the frame rate. In addition, video editing includes various methods from video editing tools, such as fade-and-dissolve, copy-and-paste, and splicing.

3. Proposed Method

3.1. Methodology

In our proposed scheme, we adopted DCT domain spread-spectrum watermarking [26] to work in a video frame watermarking and digital/analog–analog/digital (DA-AD) environment. A pseudo-random sequence of length N with zero-mean and unit variance was adopted as the watermark pattern. The general process of the watermarking method is summarized in Figure 1.
The frames were adaptively selected for embedding the secret message. A 1-s interval was selected for watermarking for every 7500 ms of the video content. Before embedding into the selected frames, a total of 512 pseudo-random patterns were generated to encode 16 bits of information, i.e., 256 pseudo-random patterns for encoding the front 8 bits of information, and another 256 pseudo-random patterns for the back 8 bits. The pseudo-random patterns are stored as a watermark pattern and will be used for the extraction step. Therefore, two watermark patterns are inserted into the selected video frames. Because the variations in the blue channel are less perceptible for the human visual system than those in the red and green channels [27], the pseudo-random patterns are inserted into the blue channel. In the watermark extraction stage, the primitive vectors that include the watermark pattern were extracted from the complete frames. If two watermark patterns are accurately detected, we decode 16 bits of information from these patterns using cross-correlation values with the 512 generated pseudo-random patterns.

3.2. Adaptive Frame Selection

With the proposed watermark embedding, pseudo-random patterns as a watermark are inserted into video frames that are robust against MPEG compression. The details of the adaptive frame selection process are summarized below.
To observe the compression effect of H.264 on a watermark extractor, we conducted a simple experiment. Using the algorithm introduced in Section 3.4, a sample pseudo-random pattern was repeatedly embedded into each frame. The modified frames were then compressed using the MPEG-4 part 10 codec algorithm. Subsequently, the correlation responses in each video frame image were computed by adopting the extraction process described in Section 3.5. Figure 2 presents a sample of the H.264 compression effect on the correlation values as an extractor response. The watermark detector correlations are decreased in the middle frame section, which includes several video motions. Moreover, a degradation of the extractor responses becomes quite severe in a compressed video. In the case of a compressed video, the extractor responses are entirely degraded, and periodic peaks occur in the sequence of the extractor responses. These peaks generally appear in the intra-coded picture (I-frame) in a group of pictures (GOP) [28]. I-frames in GOP are more robust against lossy compression than other of video frames such as P and B-frames because they are less affected by intra-frame encoding with a motion estimation.
In our research, watermarks were efficiently embedded using this property. For example, the embedding of watermark patterns into video frames that are not robust to MPEG compression is inefficient. Thus, as shown in Figure 3, 1-s intervals with the highest correlation responses were selected from a 7.5-s interval. The selected video frames were watermarked during the embedding step, and the other frames remained unchanged to achieve a higher imperceptibility score.
A watermarked frame exists in any 15-s frame intervals in the video after the adaptive frame selection because the maximum interval of the time between two consecutive watermarked frame intervals is 13 s. Therefore, the proposed watermarking system ensures that 16 bits of secret data can be extracted from any 15-s interval in the compressed video frames.

3.3. Data Bit Encoding Step

For the proposed watermarking scheme, two pseudo-random sequences X and Y were adopted for the watermark pattern. Here, 256 ( = 2 8 ) unique codes were generated to represent 8 bits of information. Sequence X for encoding the front 8 bits of information, and sequence Y for encoding the back 8 bits, were used. From this, 16 bits of data were encoded using two sets, X and Y , of 256 zero-mean/unit-variance pseudo-random sequences as a watermark pattern.
X = { X 0 , X 1 , X 2 , . . . , X 255 } , Y = { Y 0 , Y 1 , Y 2 , . . . , Y 255 } .
Therefore, two pseudo-random sequences X i and Y j were selected in each sequence set for data encoding. Indexes i and j correspond to the input data bit information. For example, if the input bit code is 0 xFF 00 , two sequences, X i and Y j , are selected, where i = 0 xFF and j = 0 x 00 .

3.4. Watermark Pattern Embedding

For the watermark pattern embedding, the DCT of frame F was computed. Subsequently, the N coefficients in the selected location were adopted to form watermark embedding vector V. The watermark embedding vector of the original DCT coefficients V = { v 1 , v 2 , v 3 , . . . , v N } was modified, and it became a vector of modified watermarked coefficients V = { v 1 , v 2 , v 3 , . . . , v N } , based on the following embedding rule:
v i = v i + α | v i | x i + y i 2 , ( 1 i N ) ,
where X = { x 1 , x 2 , x 3 , . . . , x N } and Y = { y 1 , y 2 , y 3 , . . . , y N } are the selected watermarks. The watermark strength α denotes the scaling factor as the strength of the embedded pattern signal. As we described in a previous section, two watermarks X and Y were embedded in each selected video frame to encode 16 bits of information. The DCT coefficients in the mid-band spectrum were selected for the pattern embedding, such that a trade-off between perceptual invisibility and robustness against video compression was achieved. After the DCT coefficient embedding process, the watermarked frame F was obtained using an inverse DCT.

3.5. Extraction of the Embedded Watermark

The extraction process of the embedded watermark pattern was carried out as follows. The DCT coefficients of a possibly corrupted watermarked frame F * were computed, and vector V * was extracted from the DCT coefficients in the pre-selected position during the embedding step. Next, the cross-correlation between the watermarks from the predefined sets X and Y and vector V * were calculated and adopted as a measure of the presence of the watermark. The correlation z was defined as follows:
z = X · V * N = 1 N i = 1 N x i · v i * .
The presence of watermark X was determined through a comparison between the threshold T and the calculated correlation z. Here, the threshold T was computed using
T = 1 20 · N i = 1 N | v i * | .
To minimize the false-positive rate, the threshold value from the equation was obtained experimentally based on the evaluation results. The presence of each watermark among the watermark pattern sets X and Y in the target frame F * was decided through thresholding. Accordingly, the presence of watermarks in all frames was checked. Subsequently, each detected watermark was matched to the proper 8 bits of data information, and all 16 bits of data were recovered. If there are more or fewer than two extracted watermarks, the data cannot be accurately recovered.

4. Experimental Results

4.1. Experimental Setup

In this section, the experimental setup used for the proposed method is described. We evaluated the proposed scheme based on standard criteria from IHC [7]. Figure 4 illustrates the general process of our evaluation for the benchmarking of our watermarking system. The evaluation included the processes of watermark pattern embedding, pattern extraction, video frame compression (MPEG-4 part 10), and digital/analog–analog/digital (DA-AD) conversion. Finally, the average bit error rate (BER) of the extracted bit information was calculated. The proposed algorithm was implemented in a MATLAB environment (ver 2012b), and on a computer platform consisting of an Intel i7-3770 (3.40 GHz) CPU with a 16-GB main memory employed to assess the performance.

4.1.1. Benchmark Data Preparation

For our evaluation set, we used five benchmark video clips, i.e., ITE/ARIB Hi-Vision Test Sequence numbers 2, 8, 20, 23, and 46 [29]. First, we converted raw YPbPr data into an RGB uncompressed video using the following equation:
R = Y + 1.576 P r G = Y ( 0.159 P b + 0.334 P r ) / 0.701 B = Y + 1.826 P b .
The original 600 video frames of each clip had a duration of 20 s. The display resolution of the original frames is 1920 × 1035. We cropped the last three rows because the MPEG-4 part 10 codec (H.264) in MATLAB automatically resizes the video resolution to 1920 × 1032. To obtain a 15-s video, we removed the first 150 frames. Finally, we obtained uncompressed AVI videos with a display resolution of 1920 × 1032 at 30 frames per second with a 15-s length. The total size of each video is 2.49 GB ( 1 , 430 , 826 kbps).

4.1.2. Experimental Setup

The evaluation was conducted as follows. First, we embedded 16-bit data information into the original video sequences through the watermark embedding process. Next, the watermarked video clips were encoded with various compression quality factors using the MPEG-4 part 10 (H.264) codec.
Using a digital-to-analog (DA) converter, the compressed video sequences were converted into an analog signal. To process the DA conversion, a ‘Fosmon HDMI to component video (YPbPr)/VGA & SPDIF output converter box’ was adopted, as shown in Figure 5a. An analog component video (YPbPr) was selected as the format for the analog signal because YPbPr accommodates a full-HD display resolution (1080p).
The analog YPbPr signal was reconverted into a digital signal. In addition, the converted digital video was saved in an uncompressed YUV422 video format. For this process, we adopted `skyHD captureX HDMI’ as the AD converter, as shown in Figure 5b. The frame rate and display resolution of the converted digital video (1280 × 720) differed from those of the input video. Finally, we detected the embedded watermarks in the video frames using a watermark extraction algorithm. The extracted watermark patterns were decoded into 16-bit data based on the indices of the predefined pseudo-random patterns, and the bit error rate (BER) of the bit data was computed.
To optimize the invisibility and robustness of the watermarked frames, several parameters of the proposed algorithm should be carefully set. Here, we selected a length of N = 25 , 000 from the fixed location of the DCT coefficient. It was empirically determined that this choice yields the maximum MPEG robustness while preserving the imperceptibility.

4.2. Results

4.2.1. Image Quality Assessment

To evaluate the image quality of the watermarked frame, we inserted 16 bits of data into the original video clips under various scale factors α . The watermarked frames were generated to yield an average peak signal-to-noise ratio (PSNR) of more than 36 dB. Here, the PSNR was defined using the mean squared error between the m × n image I and watermarked image W as follows.
P S N R = 10 · l o g 10 ( 255 2 M S E )
where M S E = 1 m n i m j n [ I ( i , j ) W ( i , j ) ] 2 . Figure 6 shows an example of the compressed original and watermarked frames.
To compensate for the limitations of the PSNR metric, regarding the watermark invisibility evaluation, we also evaluated the imperceptibility based on the SSIM metric [30].
After the watermark embedding, the video clips generated were compressed using the MPEG-4 codec (part 10 H.264), with quality factors of between 56 and 59, as depicted in Table 1.
The compressed video clips with quality factors of between 56 and 59 satisfied the bit rate of 0.01 better than the uncompressed video frame. In addition, using the same quality factor, the unwatermarked video clips were encoded. Both the watermarked video frames and the original video frames were decoded, and the PSNR was computed for each pair of luminance values as follows:
Y = 0.7152 G + 0.0722 B + 0.2126 R .
Table 2 and Figure 7 present the perceptual quality assessment results for various watermark strengths α , i.e., the bit error rate (BER), PNSR, and SSIM. No errors occurred in our assessment at α 0.4 according to the results. The resulting clip #2 exhibited the best detection performance with the highest perceptual score. However, the evaluation of video clip #23 showed the worst detection score because it contained a large number of motion objects throughout the entire playback. In addition, the PSNR and SSIM values of the uncompressed original and watermarked frames are shown in Table 3. These metric scores demonstrate a visual degradation of the video sequences when applying MPEG compression.

4.2.2. Robustness Assessment

A watermarking scheme must be robust, which implies that an embedded pattern should be difficult to damage through a non-hostile signal process, such as MPEG compression or digital/analog–analog/digital conversion. Thus, an embedded watermark pattern must incur little damaged from these non-hostile signal processes. Tolerance is demonstrated through the calculation of the average BER for the extracted watermark information after undergoing video processes. Evaluations were conducted with various watermarking factors, i.e., α = 0.4 , 0.9 , and 1.5 .
Table 4 lists the robustness results for the benchmark Set-4, where the watermark strength α = 0 , the PSNR is 44.02 dB, and the SSIM is 0.9945. With an MPEG quality factor of zero, all watermarks were damaged and no data were detected. It is important to note that video compression with a factor of zero triggers a substantially strong level of content loss, and the factor is not adopted, except under extremely unique circumstances. Regarding the test conducted with an MPEG quality factor of 10, regardless of the negligible watermark strength, we succeeded in detecting the watermark in both experimental videos #2 and #8. This is because the motion was relatively small in these videos; hence, the watermark damage owing to MPEG compression also appeared to be small. At a certain level of MPEG compression (qf > 40), all watermark bits were successfully detected. Note that a PSNR of 44.08 dB is more than 6 dB higher than 38.0 dB, which is generally regarded as the minimum distortion value for which a human can detect a watermark, and thus no distortion can be detected by the human eye.
Table 5 and Table 6 list the robustness results and compressibility of the various MPEG quality factors. In the evaluation with a watermark strength of 0.9 , the embedded data bits were successfully detected from four videos, #2, #8, #20, and #23, whereas the mean compressibility was 1 / 604 . At a watermark strength of 1.5 , the embedded watermark information was accurately detected for all evaluated quality factors, as shown in Table 6.

5. Conclusions

In this study, we proposed a robust video watermarking system, and presented detailed results based on a public video benchmark. The assessment of the developed watermarking scheme satisfied the 3rd edition of the IHC video watermarking evaluation criteria. The proposed system achieved robustness against non-hostile video processes. To evaluate the performance of the proposed watermarking, experiments based on video watermarking evaluation criteria were conducted under a DA-AD conversion setup. The experimental results showed that, in addition to being robust against non-hostile video processes, the proposed method also achieves invisibility. However, because spread spectrum watermarking is sensitive to attacks, the security of the proposed scheme is limited in a few aspects [31]. Enhancing the security of our watermarking is an important research direction for future studies. In this research, we focused solely on photometric distortions, such as the compression of video and DA-AD conversion. Regarding the robustness of the watermark, a geometric transformation or collusion attack will also be needed in our future studies.

Author Contributions

Conceptualization, methodology, software, writing—review and editing, funding acquisition, J.-U.H. The author has read and agreed to the published version of the manuscript.

Funding

This research was supported by a Hallym University Research Fund, 2020 (HRF-202011-010).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Acknowledgments

This research was supported by a Hallym University Research Fund, 2020 (HRF-202011-010). The author would like to express special thanks to Jinseok Park, Seung-Hun Nam, and Do-Guk Kim for their assistance with the initial setup of the experiment and the data preprocessing.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Cox, I.J.; Miller, M.L.; Bloom, J.A.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography; Elsevier Science Limited: Burlington, MA, USA, 2008. [Google Scholar]
  2. Diehl, E.; Furon, T. Watermark: Closing the analog hole. In Proceedings of the 2003 IEEE International Conference on Consumer Electronics, Los Angeles, CA, USA, 17–19 June 2003; pp. 52–53. [Google Scholar] [CrossRef]
  3. Wang, K.; Lavoué, G.; Denis, F.; Baskurt, A.; He, X. A benchmark for 3D mesh watermarking. In Proceedings of the 2010 Shape Modeling International Conference, Aix-en-Provence, France, 21–23 June 2010; pp. 231–235. [Google Scholar]
  4. Van Walree, P.A.; Socheleau, F.X.; Otnes, R.; Jenserud, T. The watermark benchmark for underwater acoustic modulation schemes. IEEE J. Ocean. Eng. 2017, 42, 1007–1018. [Google Scholar] [CrossRef] [Green Version]
  5. Petitcolas, F.A.; Steinebach, M.; Raynal, F.; Dittmann, J.; Fontaine, C.; Fates, N. Public Automated Web-Based Evaluation Service for Watermarking Schemes: Stirmark Benchmark; International Society for Optics and Photonics: San Jose, CA, USA, 2001; Volume 4314, pp. 575–584. [Google Scholar]
  6. Steinebach, M.; Petitcolas, F.A.; Raynal, F.; Dittmann, J.; Fontaine, C.; Seibel, S.; Fates, N.; Ferri, L.C. StirMark benchmark: Audio watermarking attacks. In Proceedings of the international conference on information technology: Coding and computing, Las Vegas, NV, USA, 2–4 April 2001; pp. 49–54. [Google Scholar]
  7. Iwamura, K.; Kawamura, M.; Kuribayashi, M.; Iwata, M.; Kang, H.; Gohshi, S.; Nishimura, A. Information hiding and its criteria for evaluation. IEICE Trans. Inf. Syst. 2017, 100, 2–12. [Google Scholar] [CrossRef] [Green Version]
  8. Hou, J.U.; Park, J.S.; Kim, D.G.; Nam, S.H.; Lee, H.K. Robust video watermarking for MPEG compression and DA-AD conversion. In Proceedings of the 1st International Workshop on Information Hiding and its Criteria for Evaluation, New York, NY, USA, 3 June 2014; pp. 2–8. [Google Scholar] [CrossRef]
  9. Tozuka, H.; Yoshida, M.; Fujiwara, T. Salt-and-pepper image watermarking system for IHC evaluation criteria. In Proceedings of the 1st International Workshop on Information Hiding and its Criteria for Evaluation, New York, NY, USA, 3 June 2014; pp. 31–36. [Google Scholar] [CrossRef]
  10. Kang, H.; Iwamura, K. Information hiding method using best DCT and wavelet coefficients and its watermark competition. Entropy 2015, 17, 1218–1235. [Google Scholar] [CrossRef] [Green Version]
  11. Sakuma, R.; Kang, H.; Iwamura, K.; Echizen, I. Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Matsue, Japan, 12–15 August 2017; pp. 370–380. [Google Scholar] [CrossRef]
  12. Hamamoto, I.; Kawamura, M. Neural watermarking method including an attack simulator against rotation and compression attacks. IEICE Trans. Inf. Syst. 2020, 103, 33–41. [Google Scholar] [CrossRef] [Green Version]
  13. Kim, W.H.; Kang, J.; Mun, S.M.; Hou, J.U. Convolutional neural network architecture for recovering watermark synchronization. Sensors 2020, 20, 5427. [Google Scholar] [CrossRef] [PubMed]
  14. Hou, J.U.; Yu, I.J.; Lee, H.K. Collusion attack resilient 3d mesh watermarking based on anti-collusion fingerprint code. Appl. Sci. 2018, 8, 1040. [Google Scholar] [CrossRef] [Green Version]
  15. Hou, J.U.; Kim, D.G.; Lee, H.K. Blind 3D mesh watermarking for 3D printed model by analyzing layering artifact. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2712–2725. [Google Scholar] [CrossRef]
  16. Kang, J.; Hou, J.U.; Ji, S.; Lee, H.K. Robust spherical panorama image watermarking against viewpoint desynchronization. IEEE Access 2020, 8, 127477–127490. [Google Scholar] [CrossRef]
  17. Chen, L.; Zhao, J. Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimed. Tools. Appl. 2018, 77, 7187–7204. [Google Scholar] [CrossRef]
  18. Himeur, Y.; Boukabou, A. A robust and secure key-frames based video watermarking system using chaotic encryption. Multimed. Tools. Appl. 2018, 77, 8603–8627. [Google Scholar] [CrossRef]
  19. Cao, Z.; Wang, L. A secure video watermarking technique based on hyperchaotic Lorentz system. Multimed. Tools. Appl. 2019, 78, 26089–26109. [Google Scholar] [CrossRef]
  20. Mareen, H.; De Praeter, J.; Van Wallendael, G.; Lambert, P. A novel video watermarking approach based on implicit distortions. IEEE Trans. Consum. Electron. 2018, 64, 250–258. [Google Scholar] [CrossRef] [Green Version]
  21. Barani, M.J.; Ayubi, P.; Valandar, M.Y.; Irani, B.Y. A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed. Tools. Appl. 2020, 79, 2127–2159. [Google Scholar] [CrossRef]
  22. Huan, W.; Li, S.; Qian, Z.; Zhang, X. Exploring Stable Coefficients on Joint Sub-bands for Robust Video Watermarking in DT CWT Domain. IEEE Trans. Circuits Syst. Video Technol. 2021. [Google Scholar] [CrossRef]
  23. Bhardwaj, A.; Verma, V.S.; Jha, R.K. Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed. Tools. Appl. 2018, 77, 19659–19678. [Google Scholar] [CrossRef]
  24. Asikuzzaman, M.; Pickering, M.R. An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. 2017, 28, 2131–2153. [Google Scholar] [CrossRef]
  25. Doërr, G.; Dugelay, J.L. A guide tour of video watermarking. Signal Process. Image Commun. 2003, 18, 263–282. [Google Scholar] [CrossRef]
  26. Barni, M.; Bartolini, F.; Cappellini, V.; Piva, A. A DCT-domain system for robust image watermarking. Signal Process. 1998, 66, 357–372. [Google Scholar] [CrossRef]
  27. Jain, A.K. Fundamentals of Digital Image Processing; Prentice Hall: Englewood Cliffs, NJ, USA, 1988. [Google Scholar]
  28. Bhaskaran, V.; Konstantinides, K. Image and Video Compression Standards: Algorithms and Architectures; Springer: Berlin, Germany, 1997. [Google Scholar]
  29. Matsuda, I.; Ikegawa, H. ITE/ARIB hi-vision test sequence 2nd edition: Production notes and tips for use (part II). Kyokai Joho Imeji Zasshi/J. Inst. Image Inf. Telev. Eng. 2010, 64, 201–204. [Google Scholar]
  30. Wang, Z.; Bovik, A.; Sheikh, H.; Simoncelli, E. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 12, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  31. Chaumont, M. Ensuring Security of H.264 Videos by Using Watermarking; International Society for Optics and Photonics: Orlando, FL, USA, 2011; Volume 8063, p. 806303. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Overall process of the proposed watermarking scheme: (a) Watermarking embedding step, and (b) extraction step.
Figure 1. Overall process of the proposed watermarking scheme: (a) Watermarking embedding step, and (b) extraction step.
Electronics 10 02467 g001
Figure 2. H.264 compression effect on correlation values as an extractor response (test sequence #2 from ITE/ARIB video).
Figure 2. H.264 compression effect on correlation values as an extractor response (test sequence #2 from ITE/ARIB video).
Electronics 10 02467 g002
Figure 3. Sample of video sequence for watermarking. Embedding intervals are selected from every 7.5 s.
Figure 3. Sample of video sequence for watermarking. Embedding intervals are selected from every 7.5 s.
Electronics 10 02467 g003
Figure 4. Overall test procedure of the proposed video watermarking system.
Figure 4. Overall test procedure of the proposed video watermarking system.
Electronics 10 02467 g004
Figure 5. Converters for DA-AD conversion. (a) Fosmon HDMI to component video converter box, (b) skyHD captureX HDMI, and (c) DA-AD conversion testing environment.
Figure 5. Converters for DA-AD conversion. (a) Fosmon HDMI to component video converter box, (b) skyHD captureX HDMI, and (c) DA-AD conversion testing environment.
Electronics 10 02467 g005
Figure 6. (Left) Compressed original frames based on H.264, and (Right) watermarked frames from evaluation Set-4 ( α = 0.4 , SSIM 0.9945, PSNR 44.03 dB).
Figure 6. (Left) Compressed original frames based on H.264, and (Right) watermarked frames from evaluation Set-4 ( α = 0.4 , SSIM 0.9945, PSNR 44.03 dB).
Electronics 10 02467 g006
Figure 7. Quality assessment result for various watermark scale factor α . (a) PSNR, and (b) SSIM.
Figure 7. Quality assessment result for various watermark scale factor α . (a) PSNR, and (b) SSIM.
Electronics 10 02467 g007
Table 1. Quality factor to generate less than 1/100 of the original bit rate.
Table 1. Quality factor to generate less than 1/100 of the original bit rate.
ITE/ARIB Test NumberQuality Factor
ITE/ARIB sequence #258
ITE/ARIB sequence #859
ITE/ARIB sequence #2058
ITE/ARIB sequence #2358
ITE/ARIB sequence #4656
Table 2. Evaluation result for various scale factor α .
Table 2. Evaluation result for various scale factor α .
Test Set No.Set-1Set-2Set-3Set-4Set-5Set-6Set-7Set-8
WM Strength α 0.10.30.350.40.91.535
PSNR(dB)53.5350.4850.4350.4049.2647.1745.3243.82
#2SSIM0.99940.99870.99870.99870.99830.99740.99490.9912
BER×0.0000.0000.0000.0000.0000.0000.000
PSNR(dB)48.3546.6246.5946.5841.6641.2239.4037.80
#8SSIM0.99860.99800.99800.99790.99340.99200.98460.9710
BER×0.0000.0000.0000.0000.0000.0000.000
PSNR(dB)45.0644.9444.9144.8935.6235.6136.8736.21
#20SSIM0.99580.99410.99540.99530.96110.96060.96260.9436
BER××0.0000.0000.0000.0000.0000.000
PSNR(dB)40.7533.733.733.6932.2832.3131.9330.82
#23SSIM0.99730.98650.98650.98640.97800.97710.97050.9346
BER×××0.0000.0000.0000.0000.000
PSNR(dB)41.7944.6644.6344.5841.0641.2235.6535.41
#46SSIM0.98780.99440.99440.99430.98510.98570.94280.9360
BER×0.0000.0000.0000.0000.0000.0000.000
PSNR(dB)45.8944.0844.0544.0339.9839.5037.8336.81
averageSSIM0.99570.99460.99460.99450.98310.98250.97100.9552
BER×0.4000.2000.0000.0000.0000.0000.000
Compression quality factor—#2 : 58, #8 : 59, #20 : 58, #23 : 58, #46 : 56; ×: watermark is not detected (BER is considered as 1.000).
Table 3. Evaluation result without video compression for original and watermarked video.
Table 3. Evaluation result without video compression for original and watermarked video.
Test Set No.Set-1Set-2Set-3Set-4Set-5Set-6Set-7Set-8
WM Strength α 0.10.30.350.40.91.535
AveragePSNR(dB)76.9470.2869.7068.9165.0763.1757.5654.00
SSIM1.00001.00001.00001.00000.99990.99980.99940.9984
Table 4. Robustness results for the benchmark Set-4 with the watermark strength α = 0.4 (PSNR 44.03 dB, SSIM 0.9945, α = 0.4 ).
Table 4. Robustness results for the benchmark Set-4 with the watermark strength α = 0.4 (PSNR 44.03 dB, SSIM 0.9945, α = 0.4 ).
MPEG Quality Factor50403020100
#2BER0.0000.0000.0000.0000.000×
compressibility1/1391/1911/2321/3071/4321/1029
#8BER0.0000.0000.0000.0000.0000.000
compressibility1/1391/1931/2531/3211/4451/606
#20BER0.0000.0000.0000.000××
compressibility1/1391/1901/2531/3211/4441/460
#23BER0.0000.000×0.000××
compressibility1/1381/1931/2491/3221/4001/395
#46BER0.0000.0000.000×××
compressibility1/1291/1831/2361/2961/3861/443
AverageBER0.0000.0000.2000.2000.6000.800
compressibility1/1371/1901/2451/3131/4221/587
×: watermark is not detected (BER is considered as 1.000).
Table 5. Robustness results for the benchmark Set-5 with the watermark strength α = 0.9 (PSNR 39.98 dB, SSIM 0.9831).
Table 5. Robustness results for the benchmark Set-5 with the watermark strength α = 0.9 (PSNR 39.98 dB, SSIM 0.9831).
MPEG Quality Factor50403020100
#2BER0.0000.0000.0000.0000.0000.000
compressibility1/1391/1881/2361/3101/4441/1001
#8BER0.0000.0000.0000.0000.0000.000
compressibility1/1391/1921/2531/3211/4461/631
#20BER0.0000.0000.0000.0000.0000.000
compressibility1/1391/1901/2391/3171/4381/501
#23BER0.0000.0000.0000.0000.0000.000
compressibility1/1381/1911/2501/3221/4191/413
#46BER0.0000.0000.0000.0000.000×
compressibility1/1301/1861/2361/2971/4071/473
AverageBER0.0000.0000.0000.0000.0000.200
compressibility1/1371/1891/2431/3131/4311/604
×: watermark is not detected (BER is considered as 1.000).
Table 6. Robustness results for the benchmark Set-6 with the watermark strength α = 1.5 (PSNR of 39.50 dB, SSIM of 0.9825).
Table 6. Robustness results for the benchmark Set-6 with the watermark strength α = 1.5 (PSNR of 39.50 dB, SSIM of 0.9825).
MPEG Quality Factor50403020100
#2BER0.0000.0000.0000.0000.0000.000
compressibility1/1361/1941/2481/3151/4131/1029
#8BER0.0000.0000.0000.0000.0000.000
compressibility1/1401/1941/2531/3231/4461/603
#20BER0.0000.0000.0000.0000.0000.000
compressibility1/1341/1931/2541/3171/4461/460
#23BER0.0000.0000.0000.0000.0000.000
compressibility1/1371/1931/2531/3201/3831/380
#46BER0.0000.0000.0000.0000.0000.000
compressibility1/1311/1841/2371/2971/3871/443
AverageBER0.0000.0000.0000.0000.0000.000
compressibility1/1361/1921/2491/3141/4151/583
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hou, J.-U. MPEG and DA-AD Resilient DCT-Based Video Watermarking Using Adaptive Frame Selection. Electronics 2021, 10, 2467. https://doi.org/10.3390/electronics10202467

AMA Style

Hou J-U. MPEG and DA-AD Resilient DCT-Based Video Watermarking Using Adaptive Frame Selection. Electronics. 2021; 10(20):2467. https://doi.org/10.3390/electronics10202467

Chicago/Turabian Style

Hou, Jong-Uk. 2021. "MPEG and DA-AD Resilient DCT-Based Video Watermarking Using Adaptive Frame Selection" Electronics 10, no. 20: 2467. https://doi.org/10.3390/electronics10202467

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop