Skip to main content
Log in

Hybrid pyramid-DWT-SVD dual data hiding technique for videos ownership protection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a hybrid pyramid Discrete-Wavelet-Transform (DWT) Singular-Value-Decomposition (SVD) data hiding scheme for video authentication and ownership protection. The data being hidden will be in the shape of a main color logo image watermark and another secondary Black and White (B&W) logo image. The color watermark will be decomposed to Bit-Slices. A pyramid transform is performed on the Y-frames of a video stream resulting in error images; then, a Discrete Wavelet Transform (DWT) process is implemented using orthonormal filter banks on these error images, and the Bit-Slices watermarks are inserted in one or more of the resulting subbands in a way that is fully controlled by the owner; then, the watermarked video is reconstructed. SVD will be performed on the color watermark Bit-Slices. A secondary B&W watermark will be inserted in the main color watermark using another SVD process. An enhanced detection technique is developed to estimate the Singular Values to reconstruct the original color watermark image. The overall robustness of this scheme is measured when common attacks are applied to the test videos. A main contribution in this research is that the original host video is not required for the extraction process, the good robustness against different attacks specifically compression, transcoding, temporal and geometrical attacks and the duality in the hiding process. The simulation results show that the proposed algorithm achieves well under both the visual and the metric tests. Furthermore, it performed well against intentional and unintentional attacks. The reconstruction was perfect without attacks, while the average Bit-Error-Rates (BER’s) achieved under attacks are in the limits of 2% for the color watermark and 5% for the secondary watermark; meanwhile, the mean Peak Signal-to-Noise Ratio (PSNR) is 57 dB.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30

Similar content being viewed by others

References

  1. Abdallah EE, Hamza AB, Bhattacharya P (2010) Video watermarking using wavelet transform and tensor algebra. Signal Image Video Process 4(2):233–245

    Article  MATH  Google Scholar 

  2. Al-Asmari AK (1995) Optimum bit rate pyramid coding with low computational and memory requirements. IEEE Trans Circuits Syst Video Technol 5(3):182–192

    Article  Google Scholar 

  3. Al-Asmari AK, Al-Enizi FA (2009) A pyramid-based watermarking technique for digital color images copyright protection. In: International conference on computing, engineering and information ICC’09. IEEE, pp 44–47

  4. Agarwal P, Kumar A, Choudhary A (2015) A secure and reliable video watermarking technique. In: 2015 International Conference on computer and computational sciences (ICCCS). IEEE, pp 151–156

  5. Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14):8745–8780

    Article  Google Scholar 

  6. Bhattacharya S, Chattopadhyay T, Pal A (2006) A survey on different video watermarking techniques and comparative analysis with reference to h. 264/avc. In: ISCE’06 IEEE Tenth international symposium on consumer electronics, 2006. IEEE, pp 1–6

  7. Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Standards Interfaces 31(5):1002–1013

    Article  Google Scholar 

  8. Burt P, Adelson E (1983) The Laplacian pyramid as a compact image code. IEEE Trans Commun 31(4):532–540

    Article  Google Scholar 

  9. Frieze A, Kannan R, Vempala S (2004) Fast Monte-Carlo algorithms for finding low-rank approximations. J ACM (JACM) 51(6):1025–1041

    Article  MathSciNet  MATH  Google Scholar 

  10. Guzmán VVH, Miyatake MN, Meana HMP (2004) Analysis of a wavelet-based watermarking algorithm. In: 14th International conference on electronics, communications and computers CONIELECOMP 2004. IEEE, pp 283–287

  11. Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, 1998, vol 5. IEEE, pp 2969–2972

  12. Kutter M, Petitcolas FA (1999) Fair benchmark for image watermarking systems. In: Electronic imaging’99. International Society for Optics and Photonics, pp 226–239

  13. Lee M-S (2003) Image compression and watermarking by wavelet localization. Int J Comput Math 80(4):401–412

    Article  MathSciNet  MATH  Google Scholar 

  14. Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371

    Article  Google Scholar 

  15. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Article  Google Scholar 

  16. Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical jpeg image steganography based on preserving inter-block dependencies. Comput Electrical Eng 67:320–329

    Article  Google Scholar 

  17. Liu Y, Zhao J (2010) A new video watermarking algorithm based on 1d dft and radon transform. Signal Process 90(2):626–639

    Article  MATH  Google Scholar 

  18. Martinez R, Reyes R, Cruz C, Nakano M, Perez H (2008) A dwt-based video watermarking scheme resilient to mpeg-2 compression and collusion attacks. In: ISITA International symposium on information theory and its applications, 2008. IEEE, pp 1–5

  19. Meerwald P, Uhl A (2001) Survey of wavelet-domain watermarking algorithms. In: Photonics West 2001-electronic imaging. International Society for Optics and Photonics, pp 505–516

  20. Mohan BC, Kumar SS (2008) A robust image watermarking scheme using singular value decomposition. J Multimed 3(1):7–15

    Article  Google Scholar 

  21. Panyavaraporn J (2011) Wavelet based video watermarking scheme for h. 264/avc. In: 2011 International symposium on intelligent signal processing and communications systems (ISPACS). IEEE, pp 1–5

  22. Panyavaraporn J (2013) Multiple video watermarking algorithm based on wavelet transform. In: 2013 13th International Symposium on communications and information technologies (ISCIT). IEEE, pp 397–401

  23. Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: 2005 3rd IEEE International conference on industrial informatics, 2005 INDIN’05. IEEE, pp 709–716

  24. Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466

    MathSciNet  MATH  Google Scholar 

  25. Sullivan GJ, Ohm J-R, Han W-J, Wiegand T (2012) Overview of the high efficiency video coding (hevc) standard. IEEE Trans CircuitsSyst Vid Technol 22 (12):1649–1668

    Article  Google Scholar 

  26. Sullivan GJ, Boyce JM, Chen Y, Ohm J-R, Segall CA, Vetro A (2013) Standardized extensions of high efficiency video coding (hevc). IEEE J Selected Topics Signal Process 7(6):1001–1016

    Article  Google Scholar 

  27. Vetterli M (1995) J. kova cevi c wavelets and subband coding

  28. Vinod P, Bora P (2005) A new inter-frame collusion attack and a countermeasure. In: International workshop on digital watermarking. Springer, pp 147–157

  29. Wang S-H, Lin Y-P (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154–165

    Article  MathSciNet  Google Scholar 

  30. Wu X, Sun W (2013) Robust copyright protection scheme for digital images using overlapping dct and svd. Appl Soft Comput 13(2):1170–1182

    Article  Google Scholar 

  31. Xu D, Wang R, Wang J (2008) Video watermarking based on spatio-temporal jnd profile. In: International Workshop on digital watermarking. Springer, pp 327–341

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farhan Alenizi.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alenizi, F., Kurdahi, F., Eltawil, A.M. et al. Hybrid pyramid-DWT-SVD dual data hiding technique for videos ownership protection. Multimed Tools Appl 78, 14511–14547 (2019). https://doi.org/10.1007/s11042-018-6723-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6723-9

Keywords

Navigation