Advertisement

Nonlinear Dynamics

, Volume 93, Issue 4, pp 1875–1897 | Cite as

A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map

  • Elhameh Farri
  • Peyman Ayubi
Original Paper
  • 81 Downloads

Abstract

In the modern world, high-bandwidth internet access has led to the theft of all types of digital data, including digital video, and their illegal distribution. The digital video watermarking technique was introduced late last century to enforce video copyright protection. In this paper, a robust blind and secure video watermarking method is presented based on integer wavelet transform and the generalized chaotic sine map. In this method, integer wavelet transform is applied to each main frame of the standard video. Basically, watermarking techniques are evaluated based on three concepts of content quality, data resilience and data capacity. Therefore, in order to guarantee the quality of the watermarked video, the watermark is inserted in low-frequency coefficients. An appropriate security level is added to increase the efficiency and functionality by chaotic map to watermark. In addition, the normalized correlation coefficient (NCC) between the main watermark and extraction watermark is used as the main criterion of resistance measurement. The results show that the proposed method is good in terms of both quality and resistance to a variety of attacks, and the NCC values obtained in most cases are 1 or very close to 1.

Keywords

Video watermarking Copyright protection Integer wavelet transform (IWT) Singular value decomposition (SVD) Generalized chaotic sine map 

References

  1. 1.
    Liu, Y., Zhao, J.: A new video watermarking algorithm based on 1D DFT and Radon transform. Sig. Process. 90(2), 626 (2010)CrossRefzbMATHGoogle Scholar
  2. 2.
    Petitcolas, F.A., Anderson, R.J., Kuhn, M.G.: Information hiding—a survey. Proc. IEEE 87(7), 1062 (1999)CrossRefGoogle Scholar
  3. 3.
    Huang, J., Shi, Y.Q.: Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Technol. 12(10), 916 (2002)CrossRefGoogle Scholar
  4. 4.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)Google Scholar
  5. 5.
    Arab, F., Zamani, M.: In Multimedia Forensics and Security, pp. 193–221. Springer, Berlin (2017)CrossRefGoogle Scholar
  6. 6.
    Van Huyssteen, R.H.: Comparative evaluation of video watermarking techniques in the uncompressed domain. Ph.D. thesis, Stellenbosch: Stellenbosch University (2012)Google Scholar
  7. 7.
    Behnia, S., Teshnehlab, M., Ayubi, P.: Multiple-watermarking scheme based on improved chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2469 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Behnia, S., Ahadpour, S., Ayubi, P.: Design and implementation of coupled chaotic maps in watermarking. Appl. Comput. 21(Supplement C), 481 (2014)Google Scholar
  9. 9.
    Mane, G.V., Chiddarwar, G.: Review paper on video watermarking techniques. Int. J. Sci. Res. Publ. 3(4), 1 (2013)Google Scholar
  10. 10.
    Hao, P., Shi, Q.: In Pattern Recognition, 2000. Proceedings. 15th International Conference On, vol. 3 (IEEE, 2000), 3, pp. 224–227Google Scholar
  11. 11.
    Rao, C.R.S., Prasad, M.V.: Digital Watermarking Techniques in Curvelet and Ridgelet Domain. Springer, Berlin (2016)CrossRefGoogle Scholar
  12. 12.
    Su, Q., Niu, Y., Zou, H., Liu, X.: A blind dual color images watermarking based on singular value decomposition. Appl. Math. Comput. 219(16), 8455 (2013)MathSciNetzbMATHGoogle Scholar
  13. 13.
    Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B.: Watermarking Security: Fundamentals, Secure Designs and Attacks. Springer, Berlin (2016)CrossRefGoogle Scholar
  14. 14.
    Buhari, A.M., Ling, H.C., Baskaran, V.M., Wong, K.: Fast watermarking scheme for real-time spatial scalable video coding. Signal Process. Image Commun. 47, 86 (2016)CrossRefGoogle Scholar
  15. 15.
    Asikuzzaman, M., Pickering, M.R.: An overview of digital video watermarking. In: IEEE Transactions on Circuits and Systems for Video Technology (2017)Google Scholar
  16. 16.
    Fung, C., Gortan, A., Junior, W.G.: In: The Tenth International Conference on Networks, pp. 24–28 (2011)Google Scholar
  17. 17.
    Tao, H., Chongmin, L., Zain, J.M., Abdalla, A.N.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol. 12(1), 122 (2014)CrossRefGoogle Scholar
  18. 18.
    Doerr, G., Dugelay, J.L.: A guide tour of video watermarking. Signal Process. Image Commun. 18(4), 263 (2003)CrossRefGoogle Scholar
  19. 19.
    Hasnaoui, M., Mitrea, M.: Multi-symbol QIM video watermarking. Signal Process. Image Commun. 29(1), 107 (2014)CrossRefGoogle Scholar
  20. 20.
    Oishi, S., Inoue, H.: Pseudo-random number generators and chaos. IEICE Trans. (1976–1990) 65(9):534 (1982)Google Scholar
  21. 21.
    Hu, H., Liu, L., Ding, N.: Pseudorandom sequence generator based on the Chen chaotic system. Comput. Phys. Commun. 184(3), 765 (2013)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Deng, Y., Hu, H., Xiong, W., Xiong, N.N., Liu, L.: Analysis and design of digital chaotic systems with desirable performance via feedback control. IEEE Trans. Syst. Man Cybern. Syst. 45(8), 1187 (2015)CrossRefGoogle Scholar
  23. 23.
    Deng, Y., Hu, H., Xiong, N., Xiong, W., Liu, L.: A general hybrid model for chaos robust synchronization and degradation reduction. Inf. Sci. 305, 146 (2015)CrossRefzbMATHGoogle Scholar
  24. 24.
    Liu, L., Miao, S.: Delay-introducing method to improve the dynamical degradation of a digital chaotic map. Inf. Sci. 396, 1 (2017)CrossRefGoogle Scholar
  25. 25.
    Lei, B., Ni, D., Chen, S., Wang, T., Zhou, F.: Optimal image watermarking scheme based on chaotic map and quaternion wavelet transform. Nonlinear Dyn. 78(4), 2897 (2014)CrossRefGoogle Scholar
  26. 26.
    Liu, H., Chen, N., Huang, J., Huang, X., Shi, Y.Q.: In: Circuits and Systems, 2002. ISCAS 2002. IEEE International Symposium on, vol. 3 (IEEE, 2002), 3, pp. III–IIIGoogle Scholar
  27. 27.
    Yassin, N.I., Salem, N.M., El Adawy, M.I.: Block based video watermarking scheme using wavelet transform and principle component analysis. IJCSI Int. J. Comput. Sci. Issues 9(1), 296 (2012)Google Scholar
  28. 28.
    Faragallah, O.S.: Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU Int. J. Electr. Commun. 67(3), 189 (2013)CrossRefGoogle Scholar
  29. 29.
    Mohammadi, S.: In: 2015 International Symposium on Artificial Intelligence and Signal Processing (AISP) (IEEE, 2015), pp. 188–191Google Scholar
  30. 30.
    Agilandeeswari, L., Ganesan, K.: An efficient hilbert and integer wavelet transform based video watermarking. J. Eng. Sci. Technol. 11(3), 327 (2016)Google Scholar
  31. 31.
    Kadu, S., Naveen, C., Satpute, V., Keskar, A.: In: 2016 International Conference on Microelectronics, Computing and Communications (MicroCom) (IEEE, 2016), pp. 1–6Google Scholar
  32. 32.
    Gao, Q., Li, Z., Chen, S.: In: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy (ACM, 2017), pp. 33–37Google Scholar
  33. 33.
    Layek, G.: An Introduction to Dynamical Systems and Chaos. Springer, Berlin (2015)CrossRefzbMATHGoogle Scholar
  34. 34.
    Levy, D.: Chaos theory and strategy: Theory, application, and managerial implications. Strateg. Manag. J. 15(S2), 167 (1994)CrossRefGoogle Scholar
  35. 35.
    Silva, C.P., Young, A.M.: In: Aerospace Conference Proceedings, 2000 IEEE, vol. 1 (IEEE, 2000), 1, pp. 279–299Google Scholar
  36. 36.
    Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dyn. 73(3), 1469 (2013)MathSciNetCrossRefGoogle Scholar
  37. 37.
    Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237 (2016)CrossRefGoogle Scholar
  38. 38.
    Griffin, J.: The Sine Map (2013). https://people.maths.bris.ac.uk/~macpd/ads/sine.pdf
  39. 39.
    Belazi, A., El-Latif, A.A.A.: A simple yet efficient S-box method based on chaotic sine map. Optik Int. J. Light Electr. Opt. 130, 1438 (2017)CrossRefGoogle Scholar
  40. 40.
    Cencini, M., Cecconi, F., Vulpiani, A.: Chaos: From Simple Models to Complex Systems. World Scientific, Singapore (2010)zbMATHGoogle Scholar
  41. 41.
    Feldman, D.P.: Chaos and Fractals: An Elementary Introduction. Oxford University Press, Oxford (2012)CrossRefzbMATHGoogle Scholar
  42. 42.
    Strogatz, S.H.: Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering. Westview press, Boulder (2014)zbMATHGoogle Scholar
  43. 43.
    Sundararajan, M., Yamuna, G.: In: 2013 International Conference on Communications and Signal Processing (ICCSP) (IEEE, 2013), pp. 460–464Google Scholar
  44. 44.
    Ramani, G., Prasad, E., Varadarajan, S., SVUCE, T., JNTUCE, K.: Steganography using BPCS to the integer wavelet transformed image. IJCSNS 7(7), 293 (2007)Google Scholar
  45. 45.
    Stewart, G.W.: On the early history of the singular value decomposition. SIAM Rev. 35(4), 551 (1993)MathSciNetCrossRefzbMATHGoogle Scholar
  46. 46.
    Agilandeeswari, L., Muralibabu, K.: A novel block based video in video watermarking algorithm using discrete wavelet transform and singular value decomposition. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(4) (2013)Google Scholar
  47. 47.
    Agilandeeswari, L., Ganesan, K.: A robust color video watermarking scheme based on hybrid embedding techniques. Multimed. Tools Appl. 75(14), 8745 (2016)CrossRefGoogle Scholar
  48. 48.
    Thind, D.K., Jindal, S.: A semi blind DWT-SVD video watermarking. Procedia Comput. Sci. 46, 1661 (2015)CrossRefGoogle Scholar
  49. 49.
    Kahaner, D., Moler, C., Nash, S.: Numerical Methods and Software. Prentice Hall, Englewood Cliffs (1989)zbMATHGoogle Scholar
  50. 50.
    Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060 (2010)CrossRefGoogle Scholar
  51. 51.
    Chang, C.C., Tsai, P., Lin, C.C.: SVD-based digital image watermarking scheme. Pattern Recognit. Lett. 26(10), 1577 (2005)CrossRefGoogle Scholar
  52. 52.
    Navas, K., Ajay, M.C., Lekshmi, M., Archana, T.S., Sasikumar, M.: In: 3rd International Conference on Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008 (IEEE, 2008), pp. 271–274Google Scholar
  53. 53.
    Sverdlov, A., Dexter, S., Eskicioglu, A.M.: Robust SVD DCT based watermarking for copyright protection. IEEE Trans. Image Process. 10(5), 724 (2001)CrossRefGoogle Scholar
  54. 54.
    Dabas, P., Khanna, K.: A study on spatial and transform domain watermarking techniques. Int. J. Comput. Appl. 71(14),38 (2013)Google Scholar
  55. 55.
    Bhardwaj, A., Verma, V.S., Jha, R.K.: Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimedia Tools and Applications, pp. 1–20 (2017)Google Scholar
  56. 56.
    Himeur, Y., Boukabou, A.: A robust and secure key-frames based video watermarking system using chaotic encryption. Multimedia Tools and Applications, pp. 1–25 (2017)Google Scholar
  57. 57.
    Chen, L., Zhao, J.: Contourletbased image and video watermarking robust to geometric attacks and compressions. Multimedia Tools and Applications. Multimedia Tools and Applications. pp. 1–18 (2017)Google Scholar
  58. 58.
    Akhlaghian, F., Bahrami, Z.: In: 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), (IEEE, 2015), pp. 122–127Google Scholar
  59. 59.
    Yassin, N.I., Salem, N.M., El Adawy, M.I.: QIM blind video watermarking scheme based on Wavelet transform and principal component analysis. Alex. Eng. J. 53(4), 833 (2014)CrossRefGoogle Scholar
  60. 60.
    Joshi, A.M., Mishra, V., Patrikar, R.M.: FPGA prototyping of video watermarking for ownership verification based on H. 264/AVC. Multimed. Tools Appl. 75(6), 3121 (2016)CrossRefGoogle Scholar
  61. 61.
    Mane, G.V., Chiddarwar, G.: In: 2013 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (IEEE, 2013), pp. 1–7Google Scholar
  62. 62.
    Mostafa, S.A., Tolba, A., Abdelkader, F., Elhindy, H.M.: Video watermarking scheme based on principal component analysis and wavelet transform. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(8), 45 (2009)Google Scholar
  63. 63.
    Mohammadi, S.: A chaos-based video watermarking in wavelet domain. Ciência e Natura 37(6–2) (2015)Google Scholar
  64. 64.
    Naved, A., Rajesh, Y.: Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking In Video. Int. J. Sci. Res. (IJSR), India Online ISSN pp. 2319–7064 (2013)Google Scholar
  65. 65.
    Huang, H.Y., Yang, C.H., Hsu, W.H.: A video watermarking technique based on pseudo-3-D DCT and quantization index modulation. IEEE Trans. Inf. Forens. Secur. 5(4), 625 (2010)CrossRefGoogle Scholar
  66. 66.
    Bayoudh, I., Jabra, S.B., Zagrouba, E.: Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications. Multimedia Tools and Applications, pp. 1–19 (2017)Google Scholar
  67. 67.
    Fu, C., Chen, Jj, Zou, H., Meng, Wh, Zhan, Yf, Yu, Yw: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Expr. 20(3), 2363 (2012)CrossRefGoogle Scholar
  68. 68.
    Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52(11–12), 2028 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  69. 69.
    Akhshani, A., Akhavan, A., Mobaraki, A., Lim, S.C., Hassan, Z.: Pseudo random number generator based on quantum chaotic map. Commun. Nonlinear Sci. Numer. Simul. 19(1), 101 (2014)CrossRefzbMATHGoogle Scholar
  70. 70.
    Liu, H., Wang, X., et al.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457 (2012)CrossRefGoogle Scholar
  71. 71.
    Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600 (2004)CrossRefGoogle Scholar
  72. 72.
    Hore, A., Ziou, D.: In: 2010 20th international conference on Pattern recognition (icpr)(IEEE, 2010), pp. 2366–2369Google Scholar
  73. 73.
    Walker, J., Ent, A.: Pseudorandom Number Sequence Test Program, 1998. http://www.fourmilab.ch/random (2013)
  74. 74.
    Lee, M.: Investigating Modern Cryptography (2013). https://scholar.uwindsor.ca/cgi/viewcontent.cgi?article=5919&context=etd
  75. 75.
    Marsaglia, G.: The diehard test suite, 1995. http://stat.fsu.edu/~geo/diehard.html
  76. 76.
    L’Ecuyer, P., Simard, R.: TestU01: AC library for empirical testing of random number generators. ACM Trans. Math. Softw. (TOMS) 33(4), 22 (2007)MathSciNetCrossRefzbMATHGoogle Scholar
  77. 77.
    L’Ecuyer, P., Simard, R.: TestU01: A Software Library in ANSI C for Empirical Testing of Random Number Generators-Users Guide. ACM Transactions on Mathematical Software 33(4), 22 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  78. 78.
    McCullough, B.: A review of TESTU01. J. Appl. Econom. 21(5), 677 (2006)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media B.V., part of Springer Nature 2018

Authors and Affiliations

  1. 1.Young Researchers and Elite Club, Urmia BranchIslamic Azad UniversityUrmiaIran
  2. 2.Department of Computer Engineering, Urmia BranchIslamic Azad UniversityUrmiaIran

Personalised recommendations