Professional Documents
Culture Documents
1
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
Step 1: Divide the video scene into frames , RGB to color matrix format.
i = 1, 2, 3…………n. Step 3: Compute the steps 4 to 8 for the Y matrix in each
frame of .
2
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
Apply
Watermark
DCT-SVD/
Frame f (YCbCr) Embedding
DWT-SVD/
Process
DWT-DCT-SVD
Original video
Video frames Inverse
SVD Transforms
Watermark Frame f
Image (RGB)
Extraction Apply
Process DCT-SVD/
Extracted DWT-SVD/ Video frames
Watermarked
Watermark DWT-DCT-SVD YCbCr
Watermarked Image
Image frames
Step 5: Find out the spatial frequency of all blocks, denoted Step 10: Perform inverse SVD,
by SFFl.
( )
Step 6: Significant blocks are found out based on their
spatial frequency. Spatial frequencies of each block are stored
Step 11: Perform inverse DWT to construct the modified
in descending order. Then make a threshold on spatial
frequency. Those blocks, which have spatial frequency less reference image, denoted by . Again is segmented
than or equal to threshold, are considered as significant blocks into blocks of size p1 × p2 and mapped onto their original
and are used for making reference image, which is a size positions for constructing the watermarked image.
of m × n.
3
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
Step 12: Convert the video frames from to RGB Step 7: Perform DWT on the reference image. It divides
the image into four sub bands, LL, LH, HL and HH. Select
color matrix.
the LL band, which is denoted by . Perform DCT on the
Step 13: Reconstruct frames into final watermarked video
scene , which is denoted by .
Watermark Extraction Procedure Step 8: Perform SVD transform on both and watermark
image,W.
Step 1: Divide the watermarked video scene into frames ,
( )
i = 1, 2, 3…………n.
( )
Step 2: Convert every watermarked video frame from
Step 9: Modify the single values of reference image with
RGB to color matrix format. the singular values of watermark as
4
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
4. EXPERIMENTAL RESULTS rotation, noise attacks (Gaussian and salt & pepper), cropping,
resize, histogram equalization, motion blur, average and
We evaluated the performance of proposed video median filtering.
watermarking algorithms with host video clips of size xxx.
The video clip is divided into number of frames. The
watermark used in our experiment was a gray scale image.
Snapshot from the video and the watermark are shown in
Figure 2 (a) and (b) respectively.
[ ( ) ( )]
√ ( )
∑ ̃ 4.3 ATTACKS
( ̃) ( )
√∑ √∑ ̃ 4.3.1 JPEG compression
Where N is the number of pixels in watermark, w and is the The watermarked video frames were compressed with different
original and extracted watermarks respectively. The quality factors. As shown in figure 6 the correlation values
indicate clearly the high robustness of the proposed algorithms.
correlation factor , may take values between -1 and 1. DWT-DCT-SVD method has shown high robustness when
compared with other two methods. But at 20 and 54
We evaluated robustness of the algorithm against the
compression ratios the DWT-SVD was showing good
following video attacks: JPEG compression, video frame robustness.
5
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
0.95
0.9
NCC values
0.85
0.9691
0.9668
0.9196
0.9573
0.9554
0.9542
0.9537
0.9501
0.9445
0.9366
0.9193
0.9167
0.8973
0.8901
0.8
0.8682
0.8565
0.8374
0.8014
0.75
0.7
10 20 36 43 54 80
compression ratios
4.3.2 Video Frame Rotation robustness of the algorithms against the video frames rotation.
The DCT-SVD algorithm has shown good robustness against
The watermarked video frames were rotated with different other two algorithms.
angles. As shown in figure 7. The correlation values indicate
.
1
0.8
0.6
0.77
0.8418
0.7471
0.7099
0.7033
0.6551
NCC values
0.4
0.5359
0.5249
0.3958
0.4129
0.2
0
-0.3924
-0.2992
-0.3007
-0.3299
-0.3049
-0.2
-0.4
-0.6
10 17 20 33 45
rotation degree values
4.3.3 Additive Gaussian and Salt & Pepper generally indicate robustness of the proposed algorithms
against addition of Gaussian and Salt and Pepper noise. The
Two kinds of common attacks were Additive Gaussian, Salt & DWT - SVD algorithm has shown high robustness against
pepper noise. Each noise was tested separately with other two algorithms. But at 75% of Salt & Pepper noise the
varying intensities to the watermarked video frames. As DCT-SVD has shown good robustness.
shown in Figure8 and figure 9respectively. These results
6
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
0.8
0.7
0.6
NCC values
0.5
0.7917
0.7625
0.7492
0.6284
0.7105
0.6578
0.6386
0.4
0.6119
0.5985
0.5793
0.5773
0.5655
0.5469
0.4531
0.3
0.3616
0.2
0.1
10% 33% 61% 75% 82%
Salt&pepper noise value
4.3.4 Average filtering and Median mask values. This has sown in figure 10 and figure 11
respectively. We got good robustness values for these masks.
filtering
For average filtering and median filtering DWT-DCT-SVD
Other important attacks on video were average filtering and algorithm has good robustness values against other two
median filtering. We tried to mask the video by different algorithms.
7
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
0.7
0.6
0.5
0.4
0.633
NCC values
0.4917
0.3
0.2515
0.3121
0.2
0.0645
0.1375
0.0687
0.1
0
-0.0362
-0.0128
-0.0961
-0.103
-0.035
-0.1371
-0.1689
-0.102
-0.1
-0.2
-0.3
3 x3 5 x5 7 x7 9 x9 11 x 11
average filter values
0.9
0.8
0.7
0.6
NCC values
0.5
0.8583
0.7974
0.4
0.5178
0.6028
0.3
0.4349
0.3225
0.2
0.2716
0.2431
0.1168
0.0777
0.249
0.2067
0.2102
0.213
0.057
0.1
0
3 x3 5 x5 7 x7 9 x9 11 x 11
Median Filter values
4.3.5 Cropping and resizing resizing. The resizing was performed from 512-> 128-> 512.
The DWT-DCT-SVD algorithm showed high robustness
Another important attack was cropping. Here we cropped the against other two algorithms. The robustness values of
video such that 25% area was reaming. It showed that DWT- cropping and resizing were shown in figure 12 (a) and figure
DCT-SVD algorithm was good robustness against other two 12 (b) respectively.
algorithms. The other prime image processing attack was
8
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
0.9 0.75
0.7
0.85
0.65
0.8 0.6
NCC values
NCC values
0.9179
0.55
0.7391
0.8921
0.75
0.5
0.6293
0.7 0.45
0.5036
0.4
0.704
0.65
0.35
0.6 0.3
Cropping (25% area remaining) Resizing (512 -> 128 -> 512)
4.3.6 Histogram equalization and Motion robustness against these attacks. For both the attacks the
blur DWT-DCT-SVD algorithm provided good robustness than
other two algorithms.
Histogram equalization and motion blur attacks were shown
in figure 13. It showed that the proposed algorithms had high
0.99
0.12
0.98
0.97 0.1
0.96 0.08
NCC values
NCC values
0.95
0.1199
0.06
0.9724
0.94
0.9617
0.93 0.04
0.9457
0.0319
0.92 0.02
0.91
0
0.9 Motion blur
Histogram equalization -0.02
9
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
[1] V.Potdar, S. Han, and E. Chang, 2005. "A Survey of [15]. H. Andrews and C. Patterson, “Singular Value
Digital Image Watermarking Techniques", in decompositions and Digital Image Processing,” IEEE
Proceedings of the 2005 IEEE International Conference Transactions on Acoustics, Speech and Signal
on Industrial Informatics, pp. 709-716. Processing, vol. 24, no. 1, pp. 26-53, Feb. 1976.
[2] F. Hartung and M. Kutter, “Multimedia Watermarking [16]. Ke-feng He, “Watermarking for images using the
Techniques,” in Proceedings of the IEEE, vol. 87, no.7, HVSand SVD in the wavelet domain” Proceedings of
pp. 1079-1107, July 1999 IEEEInternational Conference on Mechatronics
andAutomation, pp. 2352- 2356, 2006.
[03]. Chi-Kwong Chan , L.M. Cheng “Hiding data in
images by simple LSB substitution “Pattern [17]. Liu Quan, and AI Qingsong “A combination of DCT
Recognition 37 (2004) 469– 474 , based and SVD based watermarking,” ICSPproceedings
ww.elsevier.com/locate/patcog of IEEE International conference on signalprocessing,
pp. 873-876, 2004.
[4]. Dr.M.A.Dorairangaswamy “A Robust Blind Image
Watermarking Scheme in Spatial Domain for [18]. Alexander Sverdlov, Scott Dexter, Ahmet M. Eskicioglu
Copyright Protection” International Journal of “Robust SVD DCT based watermarking for copyright
Engineering and Technology Vol. 1, No.3, August, 2009 protection“, IEEE Transactions on Image Processing,
, ISSN: 1793-8236 10(5), May 2001, pp. 724-735.
[5] I. Pitas,”A method for signature casting on digital [19]. Feng Liu, and Yangguang Liu, “A Watermarking
images,”Proceedings of IEEE International Conference Algorithm for Digital Image Based on DCT and
on Image Processing,” Vol. 3, pp.215-318 ,1996. SVD,”Congress on Image and Signal Processing, pp.
380-383, 2008.
[6]. R. Wolfgang and E. Delp, ” A watermark for digital
images,” Proceeding of IEEE International Conference [20]. Liu Liang and Sun Qi, “A new SVD-DWT composite
on Image Processing, Vol. 2, pp.319-222, 1996. watermarking,” ICSP proceedings of IEEE International
conference on signal processing, 2006.
[7]. Sanghyun Joo, Youngho Suh, Jaeho Shin, and Hisakazu
Kikuchi “A New Robust Watermark Embedding into [21]. Gaurav Bhatnagar and Balasubramanian Raman, “Anew
Wavelet DC Components ” ETRI Journal, Volume 24, robust reference watermarking scheme based onDWT-
Number 5, October 2002. SVD,” Computer Standards and Interfaces, vol.31, no. 5,
pp. 1002-1013, 2009.
[8]. Sadi Vural, Hiromi Tomii, Hironori Yamauchi “DWT
Based Robust Watermarking Embed Using CRC-32 [22]. E.Ganic and A.M. Eskiciogulu et.al., Robust embedding
Techniques” World Academy of Science, Engineering of Visual Watermarks using DWT-SVD Journal of
and Technology 5 2005. Electronic Imaging, October-December, 2005.
[9]. Kundur D., and Hatzinakos, D., ‘A Robust [23]. Q. Li, C. Yuan, and Y. Zhong, “Adaptive DWT-SVD
Digital Image Water- marking Scheme using Wavelet- Domain Image Watermarking Using Human Visual
Based fusion,’ Proc. IEEE Int. Conf. On Image Model,” proceedings of 9th international conference on
Processing, Santa Barbara, California, vol. 1, pp. 544- advanced communication Technology, vol. 3, pp. 1947-
547, October 1997. 1951, Feb.2007.
[10]. V. Padmanabha Reddy and Dr. S. Varadarajan “ An [24]. Ali Al-Haj, and T. Manasrah, “Non-Invertible Copyright
Effective Wavelet-Based Watermarking Scheme Using Protection of Digital Images Using DWTand SVD,”
Human Visual System for Protecting Copyrights of Proceedings of International Conference on Digital
Digital Images “International Journal of Computer and Information Management, vol. 1, pp. 448 – 453,2007.
Electrical Engineering, Vol. 2, No. 1, February, 2010 [25]. S. Rezazadeh, and M. Rahmati, “A robust watermarking
,pp1793-8163. scheme based on wavelet transform and block SVD,” 9th
[11]. X. Xia, C.G. Boncelet, and G.R. Arce, “A International Symposium on Signal Processing and Its
Multiresolution Watermark for Digital Images,” Proc. Applications, pp. 1-4, 2007.
Of IEEE ICIP, Santa Barbara, CA, USA, Oct. [26]. Swanirbhar Majumder, Madhusudhan Mishra, A.
1997, pp. 548-551. Dinamani Singh” A Hybrid SVD and Wavelet based
[12]. J.R. Kim and Y.S. Moon, “A Robust Wavelet- Watermarking “2nd National Conference Mathematical
Based Digital Watermarking Using evel-Adaptive Techniques: Emerging Paradigms for Electronics and IT
Thresholding,” Proc. Of IEEE ICIP, vol. 2, Kobe, Industries, September 26-28, 2008, pp. 197-205.
Japan, Oct. 1999, pp. 226-230. [27]. Humberto Ochoa , K.R. Rao “A Hybrid DWT-SVD
[13]. S. D. Lin and C.-F. Chen,“A Robust DCT-Based Image-Coding System (HDWTSVD) for Color Images
Watermarking for Copyright Protection,” IEEE “systemics, cybernetics and informatics volume 1 -
Transactions on Consumer Electronics, 46(3), August number 2, pp.64-70.
2000, pp. 415-421. [28]. T.Sridevi, Y.Ramadevi,V.Vijaya Kumar “SECURE
[14]. Gengming Zhu, and Nong Sang “Watermarking WATERMARKING BASED ON SVD AND
Algorithm Research and Implementation Based on DCT WAVELETS “ICGST-GVIP Journal, Volume 10, Issue
Block “ proceedings of world academy of science, 5, December 2010.
engineering and technology volume 35 november 2008 [29]. Satyanarayana Murty . P, M.Uday Bhaskar, P.Nanna
10
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012
Babu, P. Rajesh Kumar “A Semi-Blind Reference [37]. Voloshynovskiy, S., S. Pereira, and T. Pun, 2001.
Watermarking Scheme Using DWT-SVD for Copyright “Attacks on Digital Watermarks:
Protection “The International Journal of Multimedia & Classification,Estimation-Based Attacks, and
Its Applications (IJMA) Vol.3, No.3,pp.61-70. Benchmarks”. Communications Magazine 39, pp.118-
126.
[30]. Saryanarayana Murty. P, Laxmi.V ,
Rajesh Kumar.P “Performance of Semi-Blind Reference [38]. Fabien A.P. Petitcolas, Ross J. Anderson, 1999.
Watermarking Scheme Using DWT-SVD for Copyright “Evaluation of Copyright Marking Systems”, IEEE
Protection” (IJCSIT) International Journal of Computer International Conference on Multimedia Computing and
Science and Information Technologies, Vol. 3 (2) , Systems (ICMCS'99) 1, pp. 574-579.
2012,3321-3327
[31]. Langelaar, G., I. Setyawan, and R. Lagendijk, 2000.
“Watermarking Digital Image and Video Data: A State- AUTHOR’S PROFILE
of-Art Overview”, IEEE Signal Processing Magazine 17,
pp. 20-46. P. Satyanarayana Murty is currently working as
[32]. D. Kundur, K. Su and D. Hatzinakos, 2004. “Digital Sr.Associate Professor in ECE Department, GIITS,
Video Watermarking: Techniques, Technology and Engineering College, Vishakapatnam, and Andhra Pradesh,
Trends”, in Intelligent Watermarking Techniques, India. He is working towards his Ph.D.at AU College of
Chapter 10, P. J.-S. Pan, H.-C. Huang and L. Jain, eds., Engineering, Vishakapatnam, India. He received his M.Tech
World Scientific Publishing Company. pp. 265-314. from Jawaharlal Nehru Technological University, Hyderabad,
India. He has fifteen years experience of teaching
[33]. Lama Rajab, Tahani Al-Khatib, Ali Al-Haj “Video undergraduate students and post graduate students. His
Watermarking Algorithms Using the SVD Transform” research interests are in the areas of image watermarking, and
European Journal of Scientific Research ISSN 1450- image compression
216X Vol.30 No.3 (2009), pp.389-401.
[34]. Aditi Agarwal , Ruchika Bhadana and Satishkumar Dr. P. Rajesh Kumar is currently Associate Professor in ECE
Chavan, “A Robust Video Watermarking Scheme using Department, AU College of Engineering, Vishakapatnam,
DWT and DCT” (IJCSIT) International Journal of India. He received his M.Tech and Ph.D. from
Computer Science and Information Technologies, Vol. 2 AndhraUniversity, Vishakapatnam, India. He has eleven years
(4) , 2011, 1711-1716. experience of teaching undergraduate and postgraduate
students and guided number of post-graduate theses. He has
[35]. Sanjana Sinha, Prajnat Bardhan, Swarnali Pramanick, published 10 research papers in National and International
“Digital Video Watermarking using Discrete Wavelet journals. Presently he is guiding six Ph.D students in the area
Transform and Principal Component Analysis” of digital signal processing and Image processing. His
International Journal of Wisdom Based Computing, Vol. research interests are in the areas of digital image processing
1 (2), August 2011. and digital signal processing.
[36]. Emad E. Abdallah , A. Ben Hamza , Prabir Bhattacharya
“Video watermarking using wavelet transform and tensor
algebra” Published online: 24 April 2009 © Springer-
Verlag London Limited 2009.
11