DOI QR코드

DOI QR Code

Robust Digital Watermarking for High-definition Video using Steerable Pyramid Transform, Two Dimensional Fast Fourier Transform and Ensemble Position-based Error Correcting

  • Jin, Xun (Dept. of Copyright Protection, Sangmyung University) ;
  • Kim, JongWeon (Dept. of Electronics Engineering, Sangmyung University)
  • 투고 : 2017.08.01
  • 심사 : 2018.01.13
  • 발행 : 2018.07.31

초록

In this paper, we propose a robust blind watermarking scheme for high-definition video. In the embedding process, luminance component of each frame is transformed by 2-dimensional fast Fourier transform (2D FFT). A secret key is used to generate a matrix of random numbers for the security of watermark information. The matrix is transformed by inverse steerable pyramid transform (SPT). We embed the watermark into the low and mid-frequency of 2D FFT coefficients with the transformed matrix. In the extraction process, the 2D FFT coefficients of each frame and the transformed matrix are transformed by SPT respectively, to produce two oriented sub-bands. We extract the watermark from each frame by cross-correlating two oriented sub-bands. If a video is degraded by some attacks, the watermarks of frames contain some errors. Thus, we use an ensemble position-based error correcting algorithm to estimate the errors and correct them. The experimental results show that the proposed watermarking algorithm is imperceptible and moreover is robust against various attacks. After embedding 64 bits of watermark into each frame, the average peak signal-to-noise ratio between original frames and embedded frames is 45.7 dB.

키워드

참고문헌

  1. J. Kim, N. Kim, D. Lee, S. Park and S. Lee, "Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents," Signal Processing: Image Communication, vol. 25, no. 8, pp. 559-576, September, 2010. https://doi.org/10.1016/j.image.2010.07.004
  2. G. RoslineNesaKumari, B. VijayaKumar, L. Sumalatha and V. V. Krishna, "Secure and Robust Digital Watermarking on Grey Level Images," International Journal of Advanced Science and Technology, vol. 11, pp. 1-8, October, 2009.
  3. D. Li and J. Kim, "Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain," Applied Mathematics & Information Sciences, vol. 6, no. 2, pp. 513-520, January, 2012.
  4. J. Nah, J. Kim and J. Kim, "Video Forensic Marking Algorithm Using Peak Position Modulation," Applied Mathematics & Information Sciences, vol. 7, no. 6, pp. 2391-2396, November, 2013. https://doi.org/10.12785/amis/070632
  5. S. Kim, S. H. Lee, and Y. M. Ro, "Rotation and flipping robust region binary patterns for video copy detection," Journal of Visual Communication and Image Representation, vol. 25, no.2, pp. 373-383, February, 2014. https://doi.org/10.1016/j.jvcir.2013.12.003
  6. M. M. Sathik and S. S. Sujatha, "Wavelet Based Blind Technique by Espousing Hankel Matrix for Robust Watermarking," International Journal of Advanced Science and Technology, vol. 26, pp. 57-72, January, 2011.
  7. X. Jin and J. Kim, "Robust Digital Watermarking for High-Definition Video using Steerable Pyramid Transform and Fast Fourier transformation," in Proc. of Proceedings of the 4th International Conference on Digital Contents and Applications, Jeju, Korea, vol. 120, December 16-19, 2015.
  8. C. Qin, X. Chen, D. Ye, J. Wang and X. Sun, "A Novel Image Hashing Scheme with Perceptual Robustness Using Block Truncation Coding," Information Sciences, vol. 361-362, no. 20, pp. 84-99, September, 2016. https://doi.org/10.1016/j.ins.2016.04.036
  9. C. Qin, P. Ji, X. Zhang, J. Dong and J. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, September, 2017. https://doi.org/10.1016/j.sigpro.2017.03.033
  10. C. Qin and X. Zhang, "Effective Reversible Data Hiding in Encrypted Image with Privacy Protection for Image Content," Journal of Visual Communication and Image Representation, vol. 31, pp. 154-164, August, 2015. https://doi.org/10.1016/j.jvcir.2015.06.009
  11. R. B. Narute and S. R. Patil, "Invisible Video Watermarking for Secure Transmission Based on DWT and PCA Mechanism," International Journal of Innovative Research in Science, Engineering and Technology, vol. 6, no. 6, pp. 12128-12135, June, 2017.
  12. R. Srivastava, "Dwt based Invisible Watermarking on Images," International Journal of Advance Research, Ideas and Innovations in Technology, vol. 3, no. 1, pp. 70-74, January, 2017.
  13. N. Asha and P. Bhagya, "Video Watermarking using DWT and Alpha Blending Technique," International Journal of Advanced Research in Computer and Communication Engineering, vol. 6, no. 5, pp. 348-352, May, 2017.
  14. G. Gupta and H. Aggarwal, "Digital image Watermarking using Two Dimensional Discrete Wavelet Transform, Discrete Cosine Transform and Fast Fourier Transform," International Journal of Recent Trends in Engineering, vol. 1, no. 1, pp. 616-618, May, 2009.
  15. C. V. Loan, "Computational Frameworks for the Fast Fourier Transform," Society for Industrial and Applied Mathematics, USA, 1992.
  16. D. N. Rockmore, "The FFT: an algorithm the whole family can use," Computing in Science & Engineering, vol. 2, no. 1, pp. 60-64, January, 2000. https://doi.org/10.1109/5992.814659
  17. I. H. Sarker, M. I. Khan, K. Deb and F. Faruque, "FFT-Based Audio Watermarking Method with a Gray Image for Copyright Protection," International Journal of Advanced Science and Technology, vol. 47, pp. 65-76, October, 2012.
  18. A. Hossaini, M. Aroussi, K. Jamali, S. Mbarki, and M. Wahbi, "A New Robust Blind Watermarking Scheme Based on Steerable pyramid and DCT using Pearson product moment correlation," Journal of Computers, vol. 9, no. 10, pp. 2315-2327, October, 2014.
  19. F. Drira, F. Denis, and A. Baskurt, "Image watermarking technique based on the steerable pyramid transform," in Proc. of 2004 SPIE, pp. 165-176, November, 2004.
  20. A. Karasaridis and E. P. Simoncelli, "A Filter Design Technique for Steerable Pyramid Image Transforms," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Atlanta, GA, May 9-9, 1996.
  21. W. T. Freeman and E. H. Adelson, "The Design and Use of Steerable Filters," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 13, no. 9, pp. 891-906, September, 1991. https://doi.org/10.1109/34.93808
  22. E. P. Simoncelli and W. T. Freeman, "The steerable pyramid: a flexible architecture for multi-scale derivative computation," in Proc. of International Conference on Image Processing, Washington, DC, October 23-26, 1995.
  23. T. Kajdanowicz and P. Kazienko, "Multi-label classification using error correcting output codes," Int. J. Appl. Math. Comput. Sci., vol. 22, no. 4, pp. 829-840, December, 2012. https://doi.org/10.2478/v10006-012-0061-2
  24. S. Amornsamankul, J. Promrak, and P. Kraipeerapun, "Solving Multiclass Classification Problems using Combining Complementary Neural Networks and Error-Correcting Output Codes," International Journal of Mathematics and Computers in Simulation, vol. 5, no. 3, pp. 266-273, January, 2011.
  25. T. Li, S. Zhu and M. Ogihara, "Using discriminant analysis for multi-class classification: an experimental investigation," Knowledge and Information Systems, vol. 10, no. 4, pp. 453-472, November, 2006. https://doi.org/10.1007/s10115-006-0013-y
  26. C. Moulin, C. Largeron, C. Ducottet, M. Gery and C. Barat, "Fisher Linear Discriminant Analysis for text-image combination in multimedia information retrieval," Pattern Recognition, vol. 47, no. 1, pp. 260-269, January, 2014. https://doi.org/10.1016/j.patcog.2013.06.003
  27. H. Fleyeh and E. Davami, "Multiclass Adaboost Based on an Ensemble of Binary AdaBoosts," American Journal of Intelligent Systems, vol. 3, no, 2, pp. 57-70, September, 2013.
  28. R. Appel, T. Fuchs, P. Dollar and P. Perona, "Quickly Boosting Decision Trees - Pruning Underachieving Features Early," in Proc. of Proceedings of the 30th International Conference on Machine Learning, Atlanta, USA, vol. 28, pp. 594-602, June 16-21, 2013.