Multimedia Tools and Applications

, Volume 77, Issue 7, pp 8603–8627 | Cite as

A robust and secure key-frames based video watermarking system using chaotic encryption

Article
  • 119 Downloads

Abstract

Currently we are facing a wide interest in multimedia security and copyright protection due to the explosion of data exchange in the Internet and the extensive use of digital media. In this paper, we propose a video watermarking method in which watermark information are encrypted using a new chaotic encryption, and then, embedded in the key-frames extracted from the video stream. Under this framework, a simple and fast key-frames extraction algorithm based on gradient magnitude similarity deviation (GMSD) is used. This algorithm can significantly decrease the complexity of video watermarking systems. In order to insert the watermark in a blind manner, new insertion and extraction functions are designed by means of a quantization process. A double transformation domain based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is adopted to robustly embed the watermark with low visual distortion. Evaluation study is conducted to verify the performance through a series of experiments. The proposed system outperforms several recent algorithms found in the literature in terms of the robustness and imperceptibility under potential attacks. Furthermore, the security requirement of the proposed algorithm is achieved with the proposed chaotic encryption procedure.

Keywords

Video watermarking Shot detection Key-frames Chaotic encryption Blind DWT-SVD 

References

  1. 1.
    Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, Dessouky MI, El-Fishawy NA, Alshebeili SA, Abd El-samie FE (2014) Homomorphic image watermarking with a singular value decomposition algorithm. Inf Process Manag 50(6):909–923CrossRefGoogle Scholar
  2. 2.
    Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14):8745–8780CrossRefGoogle Scholar
  3. 3.
    Avila SEF, Lopes APB (2011) VSUMM: a mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn Lett 32(1):56–68CrossRefGoogle Scholar
  4. 4.
    Chen H, Zhu Y (2014) A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique. Multimed Tools Appl 71(3):991–1012CrossRefGoogle Scholar
  5. 5.
    Cisco visual networking index (2012) Forecast and methodology, 2011–2016, Cisco Systems Inc.Google Scholar
  6. 6.
    Cox IJ, Miller ML, Bloom JA, Kalker T, Fridrich J (2008) Digital watermarking and steganography. Morgan KaufmannGoogle Scholar
  7. 7.
    Dang C, Radha H (2015) RPCA-KFE: key frame extraction for video using robust principal component analysis. IEEE Trans Image Proc 24(11):3742–53MathSciNetCrossRefGoogle Scholar
  8. 8.
    Dawen X, Rangding W, Shi YQ (2014) Data hiding in encrypted h.264/AVC video streams by codeword substitution. IEEE Trans Inf Forensics Security 9(4):596–606CrossRefGoogle Scholar
  9. 9.
    Dutta T, Sur A, Nandi S (2013) Mcrd: motion coherent region detection in h.264 compressed video. In: Proceedings international conference on multimedia and expo (ICME). San Jose, CA, USA, pp 1–6Google Scholar
  10. 10.
    Ejaz N, Mehmood I, Baik SW (2014) Feature aggregation based visual attention model for video summarization. Comput Electr Eng 40:993–1005CrossRefGoogle Scholar
  11. 11.
    El’Arbi M, Koubaa M, Charfeddine M, Ben Amar C (2011) A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimed Tools Appl 55(3):579–600CrossRefGoogle Scholar
  12. 12.
    Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. Int J Electron Commun (AEÜ) 67(3):189–196CrossRefGoogle Scholar
  13. 13.
    FIPS PUB 197 (2001) Advanced encryption standard. New YorkGoogle Scholar
  14. 14.
    FIPS PUB 46 (1977) Data encryption standardGoogle Scholar
  15. 15.
    Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378CrossRefGoogle Scholar
  16. 16.
    Furini M, Geraci F, Montangero M, Pellegrini M (2010) STIMO: STILl and MOving video storyboard for the web scenario. Multimed Tools Appl 46(1):47–69CrossRefGoogle Scholar
  17. 17.
    Gaj S, Patel AS, Sur A (2016) Object based watermarking for h.264/AVC video resistant to rst attacks. Multimed Tools Appl 75(6):3053–3080CrossRefGoogle Scholar
  18. 18.
    Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings the workshop on multimedia and security (MM&Sec). Magdeburg, Germany, pp 166–174Google Scholar
  19. 19.
    Himeur Y, Ait-Sadi K (2015) Joint color and texture descriptor using ring decomposition for robust video copy detection in large databases. In: Proceedings the 15th IEEE international symposium on signal processing and information technology (ISSPIT). Abu Dhabi, UAE, pp 495–500Google Scholar
  20. 20.
    Himeur Y, Ait-Sadi K, Ouamane A (2014) A fast and robust key-frames based video copy detection using BSIF-RMI. In: Proceedings the 11th international conference on signal proceedings and multimedia application (SIGMAP). Vienna, Austria, pp 40–47Google Scholar
  21. 21.
    Himeur Y, Boudraa B (2012) Secure and robust audio watermarking system for copyright protection. In: Proceedings the 24th international conference on microelectronics (ICM). Algiers, Algeria, pp 1–4Google Scholar
  22. 22.
    Hu HT, Hsu LY (2015) Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression. Comput Electr Eng 41(1):52–63CrossRefGoogle Scholar
  23. 23.
    Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjustedSine map. Inf Sci 339:237–53CrossRefGoogle Scholar
  24. 24.
    Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94CrossRefGoogle Scholar
  25. 25.
    Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063CrossRefGoogle Scholar
  26. 26.
    Langelaar G, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Proc Mag 17(5):20–43CrossRefGoogle Scholar
  27. 27.
    Li Z, Chen XW, Ma J (2015) Adaptively imperceptible video watermarking based on the local motion entropy. Multimed Tools Appl 74(8):2781–2802CrossRefGoogle Scholar
  28. 28.
    Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722CrossRefMATHGoogle Scholar
  29. 29.
    Lin W, Sun MT, Li H, Chen Z, Li W, Zhou B (2012) Macroblock classification method for video applications involving motions. IEEE Trans Broadcast 58(1):34–46CrossRefGoogle Scholar
  30. 30.
    Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT–SVD and firefly algorithm. Expert Syst Appl 41(17):7858–7867CrossRefGoogle Scholar
  31. 31.
    Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40:114CrossRefGoogle Scholar
  32. 32.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (m-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867–893CrossRefGoogle Scholar
  33. 33.
    Muhammad N, Bibi N (2015) Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Proc 9(9):795–803CrossRefGoogle Scholar
  34. 34.
    Mundur P, Rao Y, Yesha Y (2006) Keyframe-based video summarization using Delaunay clustering. Int J Digit Libr 6(2):219–232CrossRefGoogle Scholar
  35. 35.
    Preda RO, Vizireanu DN (2011) Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J Electron Imaging 20(1):13–22CrossRefGoogle Scholar
  36. 36.
    Ren J, Jiang J, Chen J (2009) Shot boundary detection in MPEG videos using local and global indicators. IEEE Trans Circuits Syst Video Techn 19(8):1234–1238CrossRefGoogle Scholar
  37. 37.
    Sarkar A, Singh V, Ghosh P, Manjunath B, Singh A (2010) Efficient and robust detection of duplicate videos in a large database. IEEE Trans Circuits Syst Video Techn 20(6):870–885CrossRefGoogle Scholar
  38. 38.
    Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215CrossRefGoogle Scholar
  39. 39.
    Shahid Z, Chaumont M, Puech W (2013) H.264/AVC video watermarking for active fingerprinting based on Tardos code. Signal Image Video Proc 7(4):679–694CrossRefGoogle Scholar
  40. 40.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715MathSciNetCrossRefMATHGoogle Scholar
  41. 41.
    Singh RT, Manglem Singh K, Roy S (2013) Video watermarking scheme based on visual cryptography and scene change detection. Int J Electron Commun (AEÜ) 67(8):645–651CrossRefGoogle Scholar
  42. 42.
    Sprott JC (2003) Chaos and time-series analysis. Oxford University Press, LondonMATHGoogle Scholar
  43. 43.
    Stinson DR (2006) Cryptography: theory and practice. Chapman and Hall CRC, Boca RatonMATHGoogle Scholar
  44. 44.
    Wu Y, Zhou Y, Noonan JP, Agaianc S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339MathSciNetCrossRefMATHGoogle Scholar
  45. 45.
    Xiang-yang W, Yu-nan L, Shuo L, Hong-ying Y, Pan-pan N, Yan Z (2015) A new robust digital watermarking using local polar harmonic transform. Comput Electr Eng 46:403–418CrossRefGoogle Scholar
  46. 46.
    Xue W, Zhang L, Mou X, Bovik A (2014) Gradient magnitude similarity deviation: a highly efficient perceptual image quality index. IEEE Trans Image Proc 23(2):684–695MathSciNetCrossRefMATHGoogle Scholar
  47. 47.
    Xuemei J, Quan L, Qiaoyan W (2013) A new video watermarking algorithm based on shot segmentation and block classification. Multimed Tools Appl 62(3):545–560CrossRefGoogle Scholar
  48. 48.
    Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483CrossRefGoogle Scholar
  49. 49.
    Youssef SM, Abou ElFarag A, Ghatwary NM (2014) Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model. Multimed Tools Appl 73(3):1545–1573CrossRefGoogle Scholar
  50. 50.
    Youtube: Statistics, [online]. Available: http://www.youtube.com/yt/press/statistics.html
  51. 51.
    Zhang M, Tong X (2014) A new chaotic map based image encryption schemes for several image formats Original. J Syst Softw 98:140–154CrossRefGoogle Scholar
  52. 52.
    Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150–157CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Telecom DivisionCenter for Development of Advanced Technologies (CDTA)Baba HassenAlgeria
  2. 2.Department of ElectronicsUniversity of MSB JijelOuled AissaAlgeria

Personalised recommendations