Advertisement

Multimedia Tools and Applications

, Volume 73, Issue 3, pp 1545–1573 | Cite as

Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model

  • Sherin M. YoussefEmail author
  • Ahmed Abou ElFarag
  • Noha M. Ghatwary
Article

Abstract

An adaptive Fuzzy Inference Perceptual model has been proposed for watermarking of video streams. The model is designed to be adaptive to the human visual characteristics to attest the owner identification and discourage the unauthorized copying. The proposed model integrates the human visual characteristics of video motion sub-regions, in the frequency multi-resolution wavelet domain, with multi-dimensional fuzzy inference perceptual model. The designed fuzzy multi-variable input system inherits luminance, texture and gradient to generate an adaptive watermark embedding strength factor. Interacting motion estimation is applied for the selection of the candidate frames and sub-blocks. A fuzzy-based scheme has been proposed to generate a perceptual membership degree for strength watermark embedding factor for the selected candidate motion blocks. Experiments have been carried out with different benchmark test videos of different sizes, visual characteristics and sampling rates. Various sizes of watermark signatures have been applied on the model. Several experimental attacks have been applied such as frame dropping, frame averaging, JPEG compression, Gaussian noises. It manifests considerable robustness against various geometric and signal processing attacks. Several attacks have been applied to the proposed scheme and the experiments revealed promising results in terms of visual quality and extracted watermark distortion. In addition, the model has been compared with different other watermarking schemes in literature. The proposed model showed superior performance in terms of fidelity, robustness to attacks and high level of imperceptibility.

Keywords

Video watermarking Fuzzy inference Human visual system Wavelet decomposition Motion estimation 

References

  1. 1.
    Al-Taweel SAM, Sumari P, Alomari SAK, Husain AJA (2009) Digital video watermarking in the discrete cosine transform domain. J Comput Sci 5(8):536–543CrossRefGoogle Scholar
  2. 2.
    Chetan KR, Raghavendra K (2010) DWT based blind digital video watermarking scheme for video authentication. International Journal of Computer Applications 4(10):19–26CrossRefGoogle Scholar
  3. 3.
    Chimienti A, Ferraris C, Pau D (2002) A complexity-bounded motion estimation algorithm. IEEE Trans Image Process 11(4):387–392Google Scholar
  4. 4.
    Coria LE, Pickering MR, Nasiopoulos P, Ward RK (2008) A video watermarking scheme based on the dual-tree complex wavelet transform. IEEE Transactions on Information Forensics and Security 3(3):466–474CrossRefGoogle Scholar
  5. 5.
    Den X (2007) “A blind video watermarking algorithm based on 3D wavelet transform”, International Conference on Computational Intelligence and SecurityGoogle Scholar
  6. 6.
    Ejim M, Miyazaki A (2000) “A wavelet-based watermarking for digital images and video”, International Conference on Image Processing. ICIP 00(3):678–681Google Scholar
  7. 7.
    Essaouabi A, Regragui F, Ibnelhaj E (2009) “A blind wavelet-based digital watermarking for video”, International Journal of Video & Image Processing and Network Security 9(9):37–41Google Scholar
  8. 8.
    Gaikwad M (2012) Implementation of four step search algorithm of motion estimation using FPGA. International Journal of Advanced Research in Computer Science and Electronics Engineering 1(3):68–71Google Scholar
  9. 9.
    Gose E, Johnsonbaug R, Jost S (1996) Pattern recognition and image analysis, prentice-hall. Englewood cliffs, NJ, p 298Google Scholar
  10. 10.
    Huang H, Yang C, Hsu W (2009) Video watermarking algorithm based on pseudo 3D DCT and quantization index moudlation, Confrence on Machine Vision Applications, pp. 207–210Google Scholar
  11. 11.
    Inoue H, Mizazki A, Araki T (2000) “A digital watermark method using the wavelet transform for video data”, IEECE Trans. Fundamentals E83-A(1):90–96Google Scholar
  12. 12.
    Jayamalar T, Radha V (2010) Survey on digital video watermarking techniques and attacks on watermarks. Int J Eng Sci Technol 2(12):6963–6967Google Scholar
  13. 13.
    Kucukgoz M, Harmanci O, Mihcak MK, Venkatesan R (2005) Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. In: Delp EJ III, Wong PW (eds) Proceedings of the SPIE. Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp 363–369Google Scholar
  14. 14.
    Lande PU (2010) A fuzzy logic approach to encrypted watermarking for still images in wavelet. International Journal of Signal Processing, Image Processing, and Pattern Recognition 3(2):1–10Google Scholar
  15. 15.
    Liang LR, Looney CG (2003) Competitive fuzzy edge detection. Appl Soft Comput 3(2):123–137Google Scholar
  16. 16.
    Lin Q, Liu Z, Feng G (2008) DWT based on watermarking algorithm and its implementing with DSP, IEEE Xplore, pp. 229–232Google Scholar
  17. 17.
    Marr D (1982) Vision: A computational investigation into the human representation and processing of visual information. Freeman, San FranciscoGoogle Scholar
  18. 18.
    Masoumi M, Amiri S (2012) “A blind video watermarking scheme based on 3D discrete wavelet transform”, International Journal of Innovation. Manag Technol 3(4):487–490Google Scholar
  19. 19.
    Ojala T, Pietikäinen M, Mäenpää T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans PAMI 24:971–987CrossRefGoogle Scholar
  20. 20.
    Pietikäinen M (2005) “Image analysis with local binary patterns”, pp 115–118Google Scholar
  21. 21.
    Rajab L, Al-Haj TA-KA (2009) Video watermarking algorithms using the SVD transform. Eur J Sci Res 30(3):389–401Google Scholar
  22. 22.
    Saade JJ, Diab HB (2004) Defuzzification methods and new techniques for fuzzy controllers. Iranian Journal Of Electrical And Computer Engineering 3(2):161–174Google Scholar
  23. 23.
    Sanghavi MR, Rajurkar AM, Mathur R, Kotecha KS (2011) A robust scheme for digital video watermarking based on scrambling of watermark. International Journal of Computer Applications 35(2):33–38Google Scholar
  24. 24.
    Schyndel RG, Tirkel AZ, Osborne CF (2004) “A digital watermark”, Proceedings of 1st International Conference on Image Processing. IEEE 2:86–90Google Scholar
  25. 25.
    Tao P, Eskicioglu AM (2004) A robust multiple watermarking scheme in the discrete wavelet transform domain. Proc SPIE 5601:133–144CrossRefGoogle Scholar
  26. 26.
    Vassaux B, Nguyen P, Baudry S, Bas P, Chassery J (2002) “Scrambling technique for video object watermarking resisting to mpeg-4”, Proceedings Video/Image Processing and Multimedia Communications 4th EURASIP-IEEE Region 8 International Symposium on VIPromCom, pp. 239–244Google Scholar
  27. 27.
    Wandell AB (1995) Foundations of vision. Sinauer Associates, MAGoogle Scholar
  28. 28.
    Wang L, Ling HF, Zou FH, Lu Z-DD (2012) Real-time compressed- domain video watermarking resistance to geometric distortions. Multi Media, IEEE, pp 70–79Google Scholar
  29. 29.
    Wanson MS, Zhu B, Chau B, Tewfik A (2006) “Object-based transparent video watermarking”, on Multimedia Signal Processing. Princeton, New Jersey, USA, pp 369–374Google Scholar
  30. 30.
    www.jgrcs.info, Improving security and reducing effect of attacks on. (2011), 2(7), 111–113
  31. 31.
    Yassin NI, Salem NM, El Adawy MI (2012) Block based video watermarking scheme using wavelet transform and principle component analysis. International Journal of Computer Science Issues 9(Issue 1, No. 3):296–301Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Sherin M. Youssef
    • 1
    Email author
  • Ahmed Abou ElFarag
    • 1
  • Noha M. Ghatwary
    • 1
  1. 1.Department of Computer Eng., Arab Academy for Sceince and TechnologyCollege of Computer EngineeringAbu KeerEgypt

Personalised recommendations