A Semi-fragile Video Watermarking Algorithm Based On Chromatic Residual DCT

  • Lihua TianEmail author
  • Hangtao Dai
  • Chen Li


In this paper, a semi fragile video watermarking scheme based on chromatic DCT is proposed, which can protect copyright and tamper detection simultaneously. Firstly, through the experiment, it is found that the chroma block has a more stable prediction mode relative to the luminance block, which can effectively reduce the asynchronous probability brought by the change of the prediction mode. At the same time, blocks contains more the number of nonzero (NNZ) coefficients, the less the prediction mode changes. Therefore, for each macroblock, the algorithm sort its 4 × 4 sub macroblock according to the NNZ of chroma DCT coefficients, then select the sub block which has most NNZ residual coefficients. According to the secret key K and medium frequency stability of Intra 4 × 4 coefficients, modulate the relationship of three DCT coefficients near medium frequency. Secondly, the sensitivity of the prediction mode to malicious attacks and recompression operations is different. Therefore, the algorithm classifies the prediction mode of the macroblock and generates the authentication code using the prediction mode. The experimental results show that the video quality is negligible affected after watermark embedding, and the change of video bit rate is basically constant. At the same time, the chromatic DCT algorithm can also use the authentication code of the prediction mode to detect and locate the tampering at the 4 × 4 sub block level with good robustness.


H.264 Chromatic DCT Video watermark Prediction mode Tamper detection 



This work is supported by the National Natural Science Foundation of China under Grant No. 61901356 and the HPC Platform of Xi’an Jiaotong University.


  1. 1.
    Afanasyeva A, Ivanov D, Linsky E et al (2014) A method of H.264 video watermarking robust to attack on I and P frames by removal. International Conference on Image Processing Theory, TOOLS and Applications, IEEE:1–6Google Scholar
  2. 2.
    Bhattacharya A, Palit S, Sarkar D (2013) A blind quality assessment of video using fragile watermarking. International Conference of Image and Vision Computing New Zealand:489–493Google Scholar
  3. 3.
    Chen XL, Zhao HM (2012) A novel video content authentication algorithm combined semi-fragile watermarking with compressive sensing, In Proc. 2nd Int. Conf. Intell. Syst. Des. Eng. Appl., Sanya, Hainan, pp. 134–137Google Scholar
  4. 4.
    Dutta T, Sur A, Nandi S (2013) A Robust Compressed Domain Video Watermarking in P- Frames with Controlled Bit Rate Increase. Proceeding of Communications, New Delhi, pp 1–5Google Scholar
  5. 5.
    Fallahpour M, Shirmohammadi S, Semsarzadeh M, Zhao J (2014) Tampering Detection in Compressed Digital Video Using Watermarking. IEEE Trans Instrum Meas 63(5):1057–1072CrossRefGoogle Scholar
  6. 6.
    Farfoura ME, Horng S, Guo J et al (2016) Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed Tools Appl 75(13):7465–7493CrossRefGoogle Scholar
  7. 7.
    Horng SJ, Farfoura ME, Fan P et al (2014) A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimed Tools Appl 72(3):2469–2495CrossRefGoogle Scholar
  8. 8.
    Horng SJ, Rosiyadi D, Fan P et al (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72(3):3085–3103CrossRefGoogle Scholar
  9. 9.
    Horng SJ, Rosiyadi D, Li T et al (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105CrossRefGoogle Scholar
  10. 10.
    Jadhav A, Kolhekar M (2014) Digital Watermarking in Video for Copyright Protection. International Conference on Electronic Systems, Signal Processing and Computing Technologies:140–144Google Scholar
  11. 11.
    Li Q, Wang R (2013) Watermarking in H. 264/AVC Compressed Domain Using CAVLC. J Comput 8(12):3126–3133Google Scholar
  12. 12.
    Li X, Wang X, Yang W, Wang X (2016) A robust video watermarking scheme to scalable recompression and transcoding. 2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, pp 257–260Google Scholar
  13. 13.
    Mairgiotis AK, Ventzas D (2015) Video watermark detection in DCT domain for H.264/AVC and extensions through a hierarchical prior. 2nd IET International Conference on Intelligent Signal Processing 2015 (ISP), London, pp 1–6Google Scholar
  14. 14.
    Manikandan VM, Masilamani V (2016) An efficient visually meaningful image encryption using Arnold transform. 2016 IEEE Students’ Technology Symposium (TechSym), Kharagpur, pp 266–271Google Scholar
  15. 15.
    Mansouri A, Aznaveh AM, Torkamani-Azar F et al (2010) A Low Complexity Video Watermarking in H.264 Compressed Domain. IEEE Transactions on Information Forensics and Security 5(4):649–657CrossRefGoogle Scholar
  16. 16.
    Shen J, Hu Q, Qiao P, Zhang W, Liu R (2013) A Blind Watermarking Method in H. 264 Compressed Domain. Advances in Image and Graphics Technologies 363:109–116CrossRefGoogle Scholar
  17. 17.
    Shuzhi L, Xiang Z, Deng X, Wu X (2016) A recompression resistant H.264/AVC video watermarking algorithm. Computer Application Research 33(02):521–525Google Scholar
  18. 18.
    Stankowski J, Grajek T, Domanski M (2012) Fast watermarking of MPEG-4 AVC/H.264 encoded HDTV video bitstreams. In Proceedings of PCS, pp. 265–268Google Scholar
  19. 19.
    Tew Y, Wong KS (2014) An Overview of Information Hiding in H.264/AVC Compressed Video. IEEE Transactions on Circuits & Systems for Video Technology 24(2):305–319CrossRefGoogle Scholar
  20. 20.
    Wang D, Huang S, Feng G, Wang S (2012) Perceptual differential energy watermarking for H.264/AVC. Multimed Tools Appl 60(3):537–550CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Software EngineeringXi’an Jiaotong UniversityXi’anChina

Personalised recommendations