A blind video watermarking scheme resistant to rotation and collusion attacks

In this paper, Discrete Cosine Transform (DCT) based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks. To make the scheme resistant against rotation, watermark is embedded within the square blocks, placed on the middle position of every luminance channel. Then Zernike moments of those square blocks are calculated. The rotation invariance property of the Complex Zernike moments is exploited to predict the rotation angle of the video at the time of extraction of watermark bits. To make the scheme robust against collusion, design of the scheme is done in such a way that the embedding blocks will vary for the successive frames of the video. A Pseudo Random Number (PRN) generator and a permutation vector are used to achieve the goal. The experimental results show that the scheme is robust against conventional video attacks, rotation attack and collusion attacks.

[1]  Ephraim Feig,et al.  Fast scaled-DCT algorithm , 1990, Other Conferences.

[2]  Amit Phadikar,et al.  Quality access control of compressed color images using data hiding , 2010 .

[3]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[5]  Liang Huang,et al.  Research on the MPEG-2 Video Watermarking Scheme Based on Spread Spectrum Technology , 2009, 2009 International Conference on Computer Engineering and Technology.

[6]  Mohammad Ghanbari,et al.  MIKEY for keys management of H.264 scalable video coded layers , 2012, J. King Saud Univ. Comput. Inf. Sci..

[7]  Santi P. Maity,et al.  Subcarrier PIC Scheme for High Capacity CI/MC-CDMA System with Variable Data Rates , 2009, 2009 IEEE Mobile WiMAX Symposium.

[8]  Amit Phadikar Multibit quantization index modulation: A high-rate robust data-hiding method , 2013, J. King Saud Univ. Comput. Inf. Sci..

[9]  Yong Huang,et al.  Texture decomposition by harmonics extraction from higher order statistics , 2004, IEEE Trans. Image Process..

[10]  C.-C. Jay Kuo,et al.  Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks , 2009, IEEE Transactions on Information Forensics and Security.

[11]  Chao Chen,et al.  A Compressed Video Watermarking Scheme with Temporal Synchronization , 2008, 2008 Congress on Image and Signal Processing.

[12]  S.P. Maity,et al.  Robust image watermarking using multiresolution analysis , 2004, Proceedings of the IEEE INDICON 2004. First India Annual Conference, 2004..

[13]  Wang Rang-ding,et al.  A Blind Video Watermarking Algorithm Resisting to Rotation Attack , 2009, 2009 International Conference on Computer and Communications Security.

[14]  B. B. Amberker,et al.  The Image Watermarking Scheme Using Edge Information in YCbCr Color Space , 2022 .

[15]  Deepa Kundur,et al.  Novel approach to collusion-resistant video watermarking , 2002, IS&T/SPIE Electronic Imaging.

[16]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[17]  V. Saxena,et al.  Collusion Attack Resistant Watermarking Scheme for Colored Images using DCT , 2007 .

[18]  Li Jing A Novel Scheme of Robust and Blind Video Watermarking , 2009, 2009 International Forum on Information Technology and Applications.

[19]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[21]  Zhong Wang,et al.  Robust Watermarking Based on Norm Quantization Singular Value Decomposition and Zernike Moments , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[22]  S. A. Khayam The Discrete Cosine Transform ( DCT ) : Theory and Application 1 , 2003 .

[23]  Tomas Kanocz,et al.  Robust frame by frame video watermarking resistant against collusion attacks , 2009, 2009 19th International Conference Radioelektronika.