Enhanced Digital Video Watermarking Technique Using 2-Level DWT

  • Rashmi JakhmolaEmail author
  • Rajneesh Rani
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 713)


“Watermarking” is the strategy for camouflage digital information in an exceptionally carrier signal; the shrouded information should, however does not need to be constrained for holding a reference to the carrier signal. They can also be used to verify or to recognize the house owner’s actual real identity or then again to confirm the validity or respectability of the carrier signal. It is prominently utilized for following copyright encroachments and for paper cash verification. This paper proposes an improved system of video watermarking which maximizes the normalized correlation coefficient, making the system tougher, so that they can bear common attacks. The suggested algorithm applies 2-level DWT for embedding watermark in the video, frame by frame along with a Gaussian filter, which further improves the features of suggested algorithm’s watermarked content with less deterioration of visual quality of the video. After applying the algorithm, the result shows that the suggested algorithm is sturdier against most of the common attacks with improved PSNR and imperceptibility level.


Digital watermarking DWT PSNR NCC Image enhancement filters 


  1. 1.
    Rewani, R., Kumar, M., Pundir, A.K.S.: Digital image watermarking: a survey. Int. J. Eng. Res. Appl. 3, 1750–1753 (2013)Google Scholar
  2. 2.
    Poljičak, A., Mandić, L., Kurečić, M.S.: The influence of image enhancement filters on a watermark detection rate. Influ. Image Enhanc. Acta Graphica 22(3–4), 53–60 (2011)Google Scholar
  3. 3.
    Bouslimi, D., Coatrieux, G.: A crypto-watermarking system for ensuring reliability control and traceability of medical images. Signal Process. Image Commun. 47, 160–169 (2016)Google Scholar
  4. 4.
    Azeem, N., Ahmad, I., Jan, S.R., Tahir, M., Ullah, F., Khan, F.: A new robust video watermarking technique using H.264/AAC codec Luma components based on DCT. In: Int. J. Adv. Res. Innov. Ideas Educ. 2, 2395–4396 (2016)Google Scholar
  5. 5.
    Buhari, A.M., Ling, H.C., Baskaran, V.M., Wong, K.S.: Fast watermarking scheme for real-time spatial scalable video coding. Signal Process. Image Commun. 47, 86–95 (2016)Google Scholar
  6. 6.
    Rasti, P., Samiei, S., Agoyi, M., Escalera, S., Anbarjafari, G.: Robust non-blind color video watermarking using QR decomposition and entropy analysis. J. Vis. Commun. Image R. 38, 838–847 (2016)CrossRefGoogle Scholar
  7. 7.
    Karmakar, A., Phadikar, A., Phadikar, B.S., Maity, G.K.: A blind video watermarking scheme resistant to rotation and collusion attacks. J. King Saud Univ. Comput. Inf. Sci. 28, 199–210 (2016)CrossRefGoogle Scholar
  8. 8.
    Thomasa, N., Thomasb, S.: A low distortion reversible data hiding technique using improved PPVO predictor. In: International Conference on Emerging Trends in Engineering, Science and Technology. Procedia Technol. 24, 1317–1324 (2016)CrossRefGoogle Scholar
  9. 9.
    Swaraja, K., Madhaveelatha, Y., Reddy, V.S.K.: Robust video watermarking by amalgamation of image transforms and optimized firefly algorithm. Int. J. Appl. Eng. Res. 11, 216–225 (2016)Google Scholar
  10. 10.
    Haribabu, M., Bindu, C.H., Swamy, K.V.: A secure and invisible image watermarking scheme based on wavelet transform in HSI color space. In: International Conference on Advances in Computing and Communications, pp. 6–8 (2016)CrossRefGoogle Scholar
  11. 11.
    Chung, K.L., Yang, W.N., Huang, Y.H., Wu, S.T., Hsu, Y.C.: On SVD-based watermarking algorithm. Appl. Math. Comput. 188, 54–57 (2007)MathSciNetzbMATHGoogle Scholar
  12. 12.
    Loganathan, A., Kaliyaperumal, G.: A robust color video watermarking scheme based on hybrid embedding techniques. Multimed. Tools Appl. · (2015)Google Scholar
  13. 13.
    Maharjan, R., Alsadoon, A., Prasad, P.W.C., Rahma, A.M.S., Elchouemi, A., Senanayake, S.A.: A proposed robust video watermarking algorithm: enhanced extraction from geometric attacks. In: International Conference on Multimedia and Image Processing (2016)Google Scholar
  14. 14.
    Huang, H.C., Chang, F.C., Chen, Y.H., Chu, S.C.: Survey of bio-inspired computing for information hiding. J. Inf. Hid. Multimed. Signal Process. 6 (2015)Google Scholar
  15. 15.
    Mohammad, A.A., Alhaj, A., Shaltaf, S.: An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Process. 88, 2158–2180 (2008)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringDr. B. R. Ambedkar National Institute of TechnologyJalandharIndia

Personalised recommendations